Test 4 Flashcards

1
Q

Which of the following is not a type of computer connector?

A)

USB

B)

SATA

C)

IDS

D)

FireWire

A

C)

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Web browsers cache web pages that the user visited recently. This cached data is referred to as a temporary Internet file, and it is stored in a folder on the user’s hard drive.

A) True

B) False
A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An e-mail header can have more than one Received field.

A) True
B) False
A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ________________ systematically tries every conceivable combination until a password is found, or until all possible combinations have been exhausted.

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______________ A technique that you can use to determine if the extension of a file has been changed.

A

(Signature analysis, Signature)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Metadata is a data component that describes other data. In other words, it’s data about data.

A) True
B) False
A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A criminal can conceal data in hidden disk partitions.

A) True
B) False
A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On a Windows 7 computer, what is the name of the feature that stores user names, passwords, and other credentials?

A)

Credential Manager

B)

Security Accounts Manager (SAM)

C)

Password Vault Manager

D)

Password.pwl

A

A)

Credential Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Linux, which directory holds the security logs?

A)

/Sec/Log/

B)

/Logs/Security/

C)

/Var/Syslog/Log/

D)

/Var/Log/

A

D)

/Var/Log/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Suspects can hide data in which of the following locations? (Choose all that apply.)

A)

White space in documents

B)

Behind graphics in documents

C)

USB port

D)

Host protected areas (HPAs) on drives

A

A)

White space in documents

B)

Behind graphics in documents

D)

Host protected areas (HPAs) on drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_________ is the process of translating an encrypted message back into the original unencrypted message.

A

___Decryption___

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following security principles assures that a message originated from the stated source?

A)

Confidentiality

B)

Integrity

C)

Authentication

D)

Nonrepudiation

A

D)

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following uses the same value to encrypt and decrypt text?

A)

Private key algorithm

B)

Public key algorithm

C)

Transposition cipher

D)

Substitution cipher

A

A)

Private key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _________ algorithm uses one key to encrypt plaintext and another key to decrypt ciphertext.

A

public key, public-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A key that is 4 bits in length can represent how many different key values? Hint: 2^4

A)

16

B)

32

C)

64

D)

128

A

A)

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ______________ attack decrypts a file characterized by comparing ciphertext to a plaintext message you chose and encrypted.

A

__plaintext_

17
Q

Of the following symmetric encryption algorithms, which one latest and strongest standard adopted by the U.S. government, with key sizes of 128, 192, or 256 bits?

A)

Blowfish

B)

Advanced Encryption Standard (AES)

C)

Serpent

D)

Twofish

A

B)

Advanced Encryption Standard (AES)

18
Q

Social engineering can be an effective method of obtaining a password.

A) True
B) False
A

A) True

19
Q

Encryption is the practice of hiding one message in another, larger message.

A) True
B) False
A

B) False

20
Q

BONUS: who designed the Blowfish cipher?

A

(Bruce Schneier, Schneier)

21
Q

BONUS: A valid definition of digital evidence is

A)

Data stored or transmitted using a computer

B)

Information of probative value

C)

Digital data of probative value

D)

Any digital evidence on a computer

A

C)

Digital data of probative value

22
Q

BONUS: Computers can be involved in which of the following types of crime?

A)

Homicide and sexual assault

B)

Computer intrusions and intellectual property theft

C)

Civil disputes

D)

All of the above

A

D)

All of the above

23
Q

BONUS: A logon record tells us that, at a specific time:

A)

An unknown person logged into the system using the account

B)

The owner of a specific account logged into the system

C)

The account was used to log into the system

D)

None of the above

A

C)

The account was used to log into the system

24
Q

BONUS: The criminological principle which states that, when anyone, or anything, enters a crime scene he/she takes something of the scene with him/her, and leaves something of himself/herself behind, is:

A)

Locard’s Exchange Principle

B)

Differential Association Theory

C)

Beccaria’s Social Contract

D)

None of the above

A

A)

Locard’s Exchange Principle