Test 5 Flashcards

1
Q

EnCase provides the means to create a Windows Evidence Acquisition Boot Disk to allow for network acquisition of an evidence drive.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As UNIX was never designed to work on networks, there are very few native utilities designed to access the Internet.

1) True
2) False
A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When requesting a search warrant, remotely connected systems cannot be considered part of the target system, so it may be necessary to obtain proper authorization before examining them.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it important to determine the level of network connectivity on a UNIX system as soon as possible?

1)

As UNIX Systems may be configured to store critical evidence on remote systems, network connections must be determined and exploited before any evidence stored remotely is destroyed.

2)

To keep suspects and spectators from accessing the target system during the investigation.

3)

To determine if the system administrator is a suspect.

4)

None of the above.

A

1)

As UNIX Systems may be configured to store critical evidence on remote systems, network connections must be determined and exploited before any evidence stored remotely is destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NTFS time represents time as the number of 100-nanosecond intervals since January 1, 1601 00:00:00 UTC.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet traces may be found in which of the following categories?

1)

Web browser cache

2)

Instant messenger cache

3)

Cookies

4)

All of the above

A

4)

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When examining the Windows registry key, the “Last Write Time” indicates:

1)

The last time RegEdit was run

2)

When a value in that Registry key was altered or added

3)

The current system time

4)

The number of allowable changes has been exceeded

A

2)

When a value in that Registry key was altered or added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of the difficulties in examining UNIX systems is that the file system is extremely complex, making it difficult for the examiner to recover data.

1) True
2) False
A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Given their widespread use and simple structure, FAT file systems are a good starting point for forensic analysts to understand file systems and recovery of deleted data.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The file system mount table shows local and remote file systems that are automatically mounted when the system is booted. This information is stored in:

1)

/etc/fstab

2)

/etc/mount/mtab

3)

/etc/hosts

4)

None of the above

A

1)

/etc/fstab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“File carving” is an examination technique where the beginning and end of a file are located, and the block of data spanning the two locations is copied to a new file, with the appropriate extension.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Windows NT Event log Secevent.evt:

1)

Contains a log of application usage

2)

Records activities that have security implications, such as logins

3)

Notes system events such as shutdowns

4)

None of the above

A

2)

Records activities that have security implications, such as logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When examining a UNIX system, searching for network traces is not usually necessary.

1) True
2) False
A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FireFox stores potentially notable information in:

1)

DBF format databases

2)

ASCII text files

3)

SQLite databases

4)

Proprietary format files

A

3)

SQLite databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File system traces include all of the following EXCEPT:

1)

Metadata

2)

CMOS settings

3)

Swap file contents

4)

Data object date-time stamps

A

CMOS settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EnCase can recover deleted files but does not have the capability of recovering deleted directories.

1) True
2) False
A

2) False

17
Q

The Windows environment is invasive and poses a challenge to forensic examiners.

1) True
2) False
A

1) True

18
Q

The MD5 hashing algorithm is no longer considered to be a reliable method for determining whether two blocks of text are identical.

1) True
2) False
A

2) False

19
Q

The mainstay of acquiring digital evidence using UNIX is the “icopy” command.

1) True
2) False
A

2) False

20
Q

Which tool from AccessData is completely free with no usage restrictions?

1)

EnCase 6

2)

EnCase 7

3)

FTK Imager

4)

FTK

5)

WinHex

A

3)

FTK Imager

21
Q

With the correct CMOS setting, it is possible to mount a hard drive as Read-Only in the Windows environment.

1) True
2) False
A

2) False

22
Q

It’s always more efficient to perform a full forensic acquisition of a device, rather than triage/preview first to determine if it’s relevant to the matter at hand.

1) True
2) False
A

2) False