Sett 2 Flashcards

1
Q

Which is not a formal position in a forensics lab?

Investigator, manager, analyst, legal manager

A

Legal manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the CERT standards for a forensic laboratory?

A

ASCLD (American Society of Crime Laboratory Directors) does the test and their process is based on ISO 17025:2005.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which role develops and forces lab policies?

A

lab manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What role is testifying the facts of data gathered?

A

Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is not a service offered by a forensics lab?

A

Adversary emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Parking lot security and biometric authentication are what level security?

A

Lab level 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical control, neither, or tech control?

Fencing
ballards
identity management
firewalls
security
training
procedures

A

Fencing, ballards phys

identity management, firewalls, security tech

training, procedures neutral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cc television is what physical security control?

Preventative, detective, corrective, recovery, deterrent, or compensate

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

George needs a forensics package that is free to use and can examine images of hard drives. What should he use?

A

Autopsy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ken is a lead investigator, he surveys a crime scene. What tool will not contaminate digital evidence?

A

Write Blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Company is closing, highly sensitive data is on their systems what sanitization method must be used?

A

Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is not a santitization term?

A

Wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Maintained by SANS to help with forensic issues?

A

SIFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What company does specification for data sanitization standards?

A

NIST (National Institute of Standards Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which org certifies free tools to examine images on a hard drive?

A

CFTT (The Computer Forensics Tool Testing) Handbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Before you seize any evidence what must you have?

A

A warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

As a member of her organization’s IS team, Larissa is performing a data forensic investigation involving 3 members of the corporate finance team. Before Larissa can seize any evidence from the suspects employee’s computer, she must have an active warrant? True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5th amendment is search and seizure? True or False

A

False/4th amendment is search and seizure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Going to a judge with a request to seize digital evidence the request must provide what?

A

Probable cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Evidence may be seized without a warrant if people are in danger, these are called what?

A

Exigent circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Seize evidence if you see incriminating evidence?

A

Plain view doctrine

22
Q

Cyber policy employee system might be monitored, this policy is called what?

A

Login banner

23
Q

Michelle is completing an affidavit for review with a judge. Which of the following would she not include in the document?

A

A reference number to the approved warrant

24
Q

What does the dd command do? sudo dd command?

A

Used to make a forensic bit-by-bit copy of a drive to a number of locations.
Disk to disk
disk to image
disk to network

sudo runs that shit with admin priv maybe idk

25
Which of the following is not considered an aspect used to define a crime scene?
Locations where witnesses are located
26
Which of the following would not be considered an obligation to a first responder to a crime scene?
Allow all individuals to leave the scene
27
Which is not considered a key to securely packaging evidence?
Contain arson evidence in a porous container
28
Data forensic analyst who does not follow the appropriate evidence collection procedure can complete a statement of admissibility so any evidence that was potentially contaminated can still be considered admissible in a court of law? True or False
False
29
Which of the following employee activities is considered most suspicious?
User appears to have connected to an FTP site in a residential ISP
30
Which tool in windows can be used to create,delete, or manage disk volume?
Disk Part
31
What could you use to prevent a running process on Linux from potentially destroying a corrupting digital evidence?
Pull the plug
32
Command choice?
Halt
33
Beau is a data forensic investigator for the FBI. A murder occurred in a large-scale office building in downtown Atlanta where Beau is called as a first responder. A suspect is at the scene with his laptop while Beau waits for a warrant to be approved by a judge. What steps could he take in order to seize and search the suspect's laptop immediately?
Have the suspect sign a consent form
34
When discussing numbered surveillance, which 2 layers of the OSI model contain addressing information which could be monitored and collected as metadata under various electronic surveillance laws?
Network and Transport
35
Which of the following types of drives is not considered magnetic media?
Solid State
36
Both flash memory such as SD cards, micro SD come with a switch that allows them to be place into read only mode to prevent corruption of evidence? True or False
True
37
Which of the following systems would not be windows based?
Extension 4 (Linux)
38
Two techniques used to compress graphics files?
Hoffman & LZW
39
When a computer is first powered on the first phase which checks to ensure basic communication exist between critical parts of the system is called?
Post
40
When referring to MACE properties, M means what?
Modified
41
In a standard magnetic hard drive, concentric circles are written into platters and they're referred to as?
Tracks
42
Which of the following is not considered a standard interface for hard drives?
ISCA
43
Which of the following raid configurations does not offer full tolerance?
Raid 0
44
Which part of the sleuth kit commands could be used to recover deleted files from a hard drive?
iCat
45
Which of the following processes is used by data forensic analyst to determine the presence of stenography in a file?
Steganalysis
46
When using a tool such as autopsy or the sleuth kit to recover a deleted file from a hard drive you're using a process known as?
File carving
47
Which record in the MFT would have been damaged if I couldn't tell you which file blocks were in use?
Spinning Rust
48
A magnetic hard drive file system block is called a cluster. It is composed of a number of?
Sectors
49
Which action is part of contingency planning for data acquisition?
Make a copy with two different tools
50
Which of the following must be covered in a search warrant?
All of the above
51
Which of the following is a characteristic that does not belong in a computer forensics lab?
Windows that open