Set 4 Flashcards

1
Q

What is Lockard’s exchange principle?

A

If something is taken than there will be a trace of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While dinner with her family, tw police officers want to search her rouse with a warrant and without consent, what is this called?

A

unreasonable search 4th amendment violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In 2020 a driver ran a light, the driver of other car must have medical care, the drunk driver is sued under ____ law.

A

tort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 5 w h?

A

who, what, when, where, how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dr cooper dark matter uses scientific method, wht is first step of scientific method?

A

Ask a question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

George is ist for company as the forensic analyst he is not responsible for,

Discovering malicious activity
Getting systems back online
Ensuring all collected evidence follows chain of custody

A

Ensuring all collected evidence follows chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Local police department, police investigated crime scene murder, the dfi goes inside victims office what two things does he do?

sean does a memory dump,
sean is performing live collection,
dead collection,
sean does not require a warrant,

A

sean is performing live collection
sean does not require a warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Convert 34 to binary

convert 1001010 to decimal

A

100010

74

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

First bytes of a file are called?

A

Magic bytes, they tell the OS what kind of file it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What isn’t an anti forensics technique?

data wiping,
physical destruction,
defragmentation,
encryption

A

defragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What must be completed each time evidence is moved?

A

chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the different phases of the forensic analyst process, 6 of them?

A

pre-investigation,
preparing the investigation,
search and seizure,
analyze,
report and testify,
post investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Certified data forensic lab has what accredited standard,

A

iso-eic-17025,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cluley works in data forensics lab, collects and retrieves digital evidence, called to testify in court. What fits him?

officer,
manager,
analyst,
investigator

A

analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Melissa works in data forensics lab, she collects and preserves digital evidence, called to testify in court. What is she?

officer,
manager,
analyst
investigator

A

investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What isn’t a Technical control?

Intrusion detection,
backups,
emergency repose procedures,

A

emergency repose procedures,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Police department team want to investigate crime scene goes into victim office and see laptop is turned on but screen is blank, what to do?

A

Move the mouse

18
Q

Data forensics analyst investigate corporate and look at suspicious, employee internet activity on watchlist, before you got further you must get permission from _____

A

hr and legal

19
Q

What equipment to use not contaminate digital evidence?

write blocker,
diode,
FTK

A

Write blocker

20
Q

Detective gets info that gang has stolen computers, before officers can enter they must get a warrant, an affidavit is needed, what does detective need to get a warrant?

A

Probable cause

21
Q

Officer spots suspects loading computers into a truck what allows officers to search truck?

A

exigent cicumstances

22
Q

Computers are outside the warehouse victims name is on the computer?

A

plain view doctrine

23
Q

Tcp and udp operate in what layer?

A

the 4th layer or transport layer

24
Q

Which is not considered a common data acquisition practice?

making a true copy,
making a copy of a copy,
ensuring mace attributes are unchanged,
downloading an application on target system,

A

downloading an application on target system,

25
Memory image can do a through analysis, mark found cracked copy to perform the analysis what part of the code of ethics did she violate?
No 5. Using illegal software
26
Julia doing hard drive analysis she knows the suspect, she notifies the lab manager what part of the code of ethics did she violate?
None
27
What would not break code of ethics? diligent work, remain neutral, will except cases beyond the level of my ability
will except cases beyond the level of my ability
28
Which of the following is the most commonly used?
web application attack
29
What nom profit organization provides common web attacks?
OWASP (Open Worldwide Application Security Project)
30
Web server log ,what is a good indicator of the address of a hacking tool?
look for geck commands or nmap, nikto
31
What commands help find file names while looking at web logs?
get, POST
32
Which is used on smartphone to store contacts emails and texts?
SIM CARD
33
Can be used to take byte by byte memory of phone that’s been damaged? j tag, chip off, static compression
j tag, chip off,
34
What are the ports? http secure web FTp SECURE SHELL Telnet
http is port 80 secure web is tcp 443 FTp IS 21 SECURE SHELL IS 22 Telnet is 23
35
What sends event log data form a host to storage? secure shell, ntp, smtp, syslog
syslog
36
Which is used to ensure system clocks are synced?
NTP (Network Time Protocol)
37
Tasklist from windows, which process is the highest PID?
Biggest number is answer
38
Which is not volatile?
Shadow volume copy
39
Pslogged on > output,txt What does this command do?
list of users that are logged on is created in a text
40
Steganography?
Hiding data inside another from or data like text or image
41
Which is better Md5 or sha1?
SHA1 is better
42
Which is not focused on an investigation of windows based host? Windows Registry, memory dump, security analyzer database,
Security analyzer database,