Set 1 Flashcards

1
Q

What is a forensics Lab?

A

Workspace to perform data extraction, analysis, and reporting, must be accredited such as with ISO/IEC 17025:2005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Forensics Lab Manager responsible for?

A

for the overall operation of the lab, ensures analysts have what they need, handles staffing, ensures staff receive appropriate training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a Forensics Analyst do?

A

Performs scientific analysis of collected digital evidence collected from a variety of sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a Forensics investigator.

A

Focuses on collection and retrieval of digital evidence. Similiar to Forensics Analyst.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ASCLD stand for?

A

American Society Crimes Laboratory Directors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ASCLD/Labs group do?

A

They conduct forensics lab certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do the security mechanisms Preventive, Detective, & Corrective mean?

A

Preventive - Prevents a security incident from happening
Detective - Discovers if a security event is in progress or has already occurred
Corrective - Aimed at fixing the root cause of the vulnerability that gave rise to the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do the security mechanisms Recovery, Deterrent, and Compensating mean?

A

Recovery - Restores the computing environment back to a “good known state”
Deterrent - Keeps an event from happening by creating an obstacle for the attacker
Compensating - A control inserted to compensate for lack of a permanent control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two principles of physical security?

A

Ensure the physical security of the lab.

Ensure the physical security of the evidence within the lab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why would you want two separate tables in a forensics lab?

A

One with two forensics workstations
One with one or two plain workstations for results validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is 5WH?

A

Questions used for problem solving.

They consist of who, what, when, where, why, how.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define computer forensics

A

The collection and preservation of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is used to manipulate mace attributes and how?

A

Time stomp, modifies the timestamp of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who was a Nobel Prize winner and discovered blood types?

A

Karl Landsteiner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Locard’s exchange principle?

A

A criminal will bring something and leave something that can be used as forensic evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many set of criminal laws exist in the united states?

A

51

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unreasonable search and seizure is what bill?

A

The 4th

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security control that happens in the event of a crime?

A

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is considered investigation for business use?

A

Corporate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data forensic analysis is responsible for what?

A

Collecting and preserving criminal evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which are considered two great laws of forensics?

A

Never work with the original, preserve the state it was found in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What determined the murderer of Robert eidman?

A

touch DNA from the lining of Eidman’s pocket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

People vs holcolm is a criminal case? true or false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What two departments should you get authorization from before any search and seizure?

A

Legal and HR

25
What is an example of not digital evidence?
Document from a printer
26
Chain-of-custody?
Chain of custody is a documented record of who had possession and control over a particular piece of evidence at every moment until that object is entered into evidence in the courtroom.
27
chain-of-evidence?
Includes the search and seizure of that evidence and the cataloging of that evidence, as well as the chain of custody of that evidence once it has been obtained.
28
Digital evidence is not considered fragile true or false?
False
29
What is a magic byte?
Indicators at the beginning of a hash that tell you what type of file it is.
30
Which of the following would not be considered anti forensics techniques? Encryption Disk Wiping Compression preventing mace values from changing
preventing mace values from changing
31
What is anti-forensics?
Anti-forensics is the art of destroying data
32
What are the two main types of evidence?
Relevant (what is relevant to the case) and admissible (what is used in court)
33
What are Invisible attributes called?
Meta data
34
Difference between live collection and dead collection?
Live is when system is running, dead is when system is off
35
An incident responder is not concerned with what?
Determining motive
36
What attempting to solve a crime what would you use to create a hypothesis?
the Scientific method
37
According to first responders what should not be done during a crime scene?
Turning something on if its off
38
Which of the following peripherals is most likely to contain digital evidence? Laptop Computer Printer Hard Drive
Printer The only peripheral listed.
39
What is the Magic byte of 5a4d?
An executable
40
Federal rules of evidence should be used by state level? yes or no
Yes
41
What is best evidence?
The best evidence rule applies when a party wants to admit as evidence the contents of a document at trial but the original document is not available.
42
What is a warrant?
probable cause or signed allowance for search and seizure or whatever is listed on the warrant
43
What is the HIPO (Hierarchical Input-Process-Output) diagram?
Guidelines for digital forensics investigators. 1. Pre-Investigation 2. Preparing the Investigation 3. Search and Seizure 4. Analyzing the Evidence 5. Reporting and Testifying 6. Post-Investigation
44
What do Pre-investigation, preparing the investigation, and search and seizure involve?
Pre-investigation-Learn requirements for case, build forensic capabilities, forensic hardware and methods Preparing the investigation-Info about the case, develop hypothesis and plans, plan to obtain digital evidence Search and seizure- Forensically sound seizure of evidence
45
What do Analyzing the Evidence Reporting and Testifying Post-Investigation involve?
Analyzing the Evidence- Using captured evidence and creating an analysis based on your hypotheses, getting results of an analysis that has value Reporting and Testifying- Final report is written and testimony is given Post-Investigation- Analyze notes taken and the process used to update investigative methods and risks
46
Which is used for having a smartphone not remotely wiped?
Faraday bag
47
When a system is powered on but screen is blank what should you do?
Move the mouse
48
If a warrant isn’t quick enough and it’s a dangerous circumstance can you go without a warrant?
Yes
49
A forensic image of a hard drive image is created how?
bit by bit
50
Which is not included in an investigation toolkit?
Magnets
51
Drunk driver can be sued with tort law? True or False
True
52
As a member of corporate what do you need before acting?
Authorization
53
What helps in keeping records of an investigation and writing a findings report?
photographs and sketches
54
When evidence changes hands?
Change of custody
55
What is not in the Analyzing the evidence phase?
Testifying in court
56
Who can assess what the evidence proves to the court?
expert witness
57
Before touching a laptop what should you do?
Photograph it
58
Which type of form would be completed as they collect things identified as evidence?
Chain-of-evidence