click below
click below
Normal Size Small Size show me how
Cyber_4ens_final
Chapter 6-13 multiple choice
Question | Answer |
---|---|
Data streams can obscure valuable evidentiary data, intentionally or by coincidence | true |
A ____ is a column of tracks on two or more disk platters. | cylinder |
____ is how most manufacturers deal with a platter’s inner tracks being shorter than its outer tracks. | ZBR |
____ is the file structure database that Microsoft originally designed for floppy disks. | FAT |
____ was introduced when Microsoft created Windows NT and is the primary file system for Windows Vista | NTFS |
On an NTFS disk, immediately after the Partition Boot Sector is the ____. | MFT |
Records in the MFT are referred to as ____. | metadata |
In the NTFS MFT, all files and folders are stored in separate records of ____ bytes each | 1024 |
The file or folder’s MFT record provides cluster addresses where the file is stored on the drive’s partition. These cluster addresses are referred to as ____. | data runs |
When Microsoft introduced Windows 2000, it added built-in encryption to NTFS called ____. | EFS |
The purpose of the ____ is to provide a mechanism for recovering encrypted files under EFS if there’s a problem with the user’s original private key. | recovery certificate |
When Microsoft created Windows 95, it consolidated initialization (.ini) files into the ____. | Registry |
____ is a 16-bit real-mode program that queries the system for device and configuration data, and then passes its findings to NTLDR. | NTDetect.com |
____, located in the root folder of the system partition, is the device driver that allows the OS to communicate with SCSI or ATA drives that aren’t related to the BIOS. | NTBootdd.sys |
____ contain instructions for the OS for hardware devices, such as the keyboard, mouse, and video card, and are stored in the %system-root%\Windows\System32\Drivers folder. | Device drivers |
____ is a hidden text file containing startup options for Windows 9x. | Msdos.sys |
The ____ file provides a command prompt when booting to MS-DOS mode (DPMI). | Command.com |
____ is a text file containing commands that typically run only at system startup to enhance the computer’s DOS configuration. | Config.sys |
____ is a batch file containing customized settings for MS-DOS that runs automatically. | Autoexec.bat |
A ____ allows you to create a representation of another computer on an existing physical computer. | virtual machine |
In software acquisition, there are three types of data-copying methods. | false |
To help determine what computer forensics tool to purchase, a comparison table of functions, subfunctions, and vendor products is useful. | true |
The Windows platforms have long been the primary command-line interface OSs. | false |
After retrieving and examining evidence data with one tool, you should verify your results by performing the same tasks with other similar forensics tools. | true |
Computer forensics tools are divided into ____ major categories. | 2 |
Software forensics tools are commonly used to copy data from a suspect’s disk drive to a(n) ____. | image file |
To make a disk acquisition with En.exe requires only a PC running ____ with a 12-volt power connector and an IDE, a SATA, or a SCSI connector cable. | ms-dos |
Raw data is a direct copy of a disk drive. An example of a Raw image is output from the UNIX/Linux ____ command. | dd |
____ of data involves sorting and searching through all investigation data. | Discrimination |
Many password recovery tools have a feature that allows generating potential lists for a ____ attack. | password dictionary |
The simplest method of duplicating a disk drive is using a tool that does a direct ____ copy from the original disk to the target disk. | disk-to-disk |
To complete a forensic disk analysis and examination, you need to create a ____. | report |
The first tools that analyzed and extracted data from floppy disks and hard disks were MS-DOS tools for ____ PC file systems. | IBM |
In Windows 2000 and XP, the ____ command shows you the owner of a file if you have multiple users on the system or network. | Dir |
In general, forensics workstations can be divided into ____ categories. | 3 |
A forensics workstation consisting of a laptop computer with a built-in LCD monitor and almost as many bays and peripherals as a stationary workstation is also known as a ____. | portable workstation |
____ is a simple drive-imaging station. | FIRE IDE |
____ can be software or hardware and are used to protect evidence disks by preventing you from writing any data to the evidence disk. | Write-blockers |
Many vendors have developed write-blocking devices that connect to a computer through FireWire,____ 2.0,and SCSI controllers. | USB |
The ____ publishes articles, provides tools, and creates procedures for testing and validating computer forensics software. | NIST |
The standards document, ____, demands accuracy for all aspects of the testing process, meaning that the results must be repeatable and reproducible. | ISO 5725 |
The NIST project that has as a goal to collect all known hash values for commercial software applications and OS files is ____. | NSRL |
The primary hash algorithm used by the NSRL project is ____. | SHA-1 |
One way to compare your results and verify your new forensic tool is by using a ____, such as HexWorkshop, or WinHex. | disk editor |
Although a disk editor gives you the most flexibility in ____, it might not be capable of examining a ____ file’s contents | testing, compressed |
Macintosh OS X is built on a core called ____. | Darwin |
In older Mac OSs, a file consists of two parts: a data fork, where data is stored, and a ____ fork, where file metadata and application information are stored. | resource |
The maximum number of allocation blocks per volume that File Manager can access on a Mac OS system is ____. | 65,535 |
On older Macintosh OSs all information about the volume is stored in the ____. | Master Directory Block (MDB) |
With Mac OSs, a system application called ____ tracks each block on a volume to determine which blocks are in use and which ones are available to receive data. | Volume Bitmap |
On Mac OSs, File Manager uses the ____ to store any information not in the MDB or Volume Control Block (VCB). | extents overflow file |
Linux is probably the most consistent UNIX-like OS because the Linux kernel is regulated under the ____ agreement. | GPL |
The standard Linux file system is ____. | Ext2fs |
Ext2fs can support disks as large as ____ TB and files as large as 2 GB. | 4 |
Linux is unique in that it uses ____, or information nodes, that contain descriptive information about each file or directory. | inodes |
To find deleted files during a forensic investigation on a Linux computer, you search for inodes that contain some data and have a link count of ____. | 0 |
____ components define the file system on UNIX. | 4 |
The final component in the UNIX and Linux file system is a(n) ____, which is where directories and files are stored on a disk drive. | data block |
LILO uses a configuration file named ____ located in the /Etc directory. | Lilo.conf |
Erich Boleyn created GRUB in ____ to deal with multiboot processes and a variety of OSs. | 1995 |
On a Linux computer, ____ is the path for the first partition on the primary master IDE disk drive. | /dev/hda1 |
There are ____ tracks available for the program area on a CD. | 99 |
The ____ provides several software drivers that allow communication between the OS and the SCSI component. | Advanced SCSI Programming Interface (ASPI) |
All Advanced Technology Attachment (ATA) drives from ATA-33 through ATA-133 IDE and EIDE disk drives use the standard ____ ribbon or shielded cable. | 40-pin |
ATA-66,ATA-____, and ATA-133 can use the newer 40-pin/80-wire cable. | 100 |
IDE ATA controller on an old 486 PC doesn’t recognize disk drives larger than 8.4 ____. | GB |
FTK cannot analyze data from image files from other vendors. | false |
A nonsteganographic graphics file has a different size than an identical steganographic graphics file. | false |
____ increases the time and resources needed to extract,analyze,and present evidence. | scope creep |
You begin any computer forensics case by creating a(n) ____. | investigation plan |
In civil and criminal cases, the scope is often defined by search warrants or ____, which specify what data you can recover. | subpoenas |
There are ____ searching options for keywords which FTK offers. | 2 |
____ search can locate items such as text hidden in unallocated space that might not turn up in an indexed search. | Live |
The ____ search feature allows you to look for words with extensions such as “ing,”“ed,” and so forth. | stemming |
In FTK ____ search mode, you can also look for files that were accessed or changed during a certain time period. | indexed |
FTK and other computer forensics programs use ____ to tag and document digital evidence. | bookmarks |
Getting a hash value with a ____ is much faster and easier than with a(n) ____. | hexadecimal editor, computer forensics tool |
AccessData ____ compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data. | KFF |
Data ____ involves changing or manipulating a file to conceal information. | hiding |
One way to hide partitions is to create a partition on a disk, and then use a disk editor such as ____ to manually delete any reference to it. | Norton DiskEdit |
Marking bad clusters data-hiding technique is more common with ____ file systems. | FAT |
The term ____ comes from the Greek word for“hidden writing.” | steganography |
____ is defined as the art and science of hiding messages in such a way that only the intended recipient knows the message is there. | Steganography |
Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system data failure. | key escrow |
People who want to hide data can also use advanced encryption programs, such as PGP or ____. | BestCrypt |
____ recovery is a fairly easy task in computer forensic analysis. | Password |
____ attacks use every possible letter, number, and character found on a keyboard when cracking a password. | Brute-force |
____ are handy when you need to image the drive of a computer far away from your location or when you don’t want a suspect to be aware of an ongoing investigation. | Remote acquisitions |
____ is a remote access program for communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer’s file system. | HDHOST |
With many computer forensics tools, you can open files with external viewers. | true |
Steganography cannot be used with file formats other than image files. | false |
____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes. | Vector graphics |
You use ____ to create, modify, and save bitmap, vector, and metafile graphics files. | graphics editors |
____ images store graphics information as grids of individual pixels. | Bitmap |
The process of converting raw picture data to another format is referred to as ____. | demosaicing |
The majority of digital cameras use the ____ format to store digital pictures | EXIF |
____ compression compresses data by permanently discarding bits of information in the file. | Lossy |
Recovering pieces of a file is called ____. | carving |
A(n) ____ file has a hexadecimal header value of FF D8 FF E0 00 10. | JPEG |
If you can’t open an image file in an image viewer, the next step is to examine the file’s ____. | header data |
The uppercase letter ____ has a hexadecimal value of 41. | "A" |
The image format XIF is derived from the more common ____ file format. | TIFF |
The simplest way to access a file header is to use a(n) ____ editor | hexadecimal |
The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 2065 5874 656E 6465 6420 03. | XIF |
____ is the art of hiding information inside image files. | Steganography |
____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program. | Insertion |
____ steganography replaces bits of the host file with other bits of data. | Substitution |
In the following list, ____ is the only steg tool. | Outguess |
____ has also been used to protect copyrighted material by inserting digital watermarks into a file. | Steganography |
When working with image files, computer investigators also need to be aware of ____ laws to guard against copyright violations. | copyright |
Under copyright laws, computer programs may be registered as ____. | literary works |
Under copyright laws, maps and architectural plans may be registered as ____. | pictorial, graphic, and sculptural works |
A graphics program creates and saves one of three types of image files: bitmap, vector, or ____________________. | metafile |
____________________ is the process of coding of data from a larger form to a smaller form. | Data compression |
The ____________________ is the best source for learning more about file formats and their associated extensions. | internet |
All ____________________ files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 2A. | TIFF |
The two major forms of steganography are ____________________ and substitution. | insertion |
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program. | Network forensics |
____ forensics is the systematic tracking of incoming and outgoing traffic on your network. | Network |
A common way of examining network traffic is by running the ____ program. | Tcpdump |
____ is a popular network intrusion detection system that performs packet capture and analysis in real time. | Snort |
____ is the U.S. DoD computer forensics lab’s version of the dd command that comes with Knoppix-STD. | dcfldd |
____ are devices and/or software placed on a network to monitor traffic. | Packet sniffers |
Most packet sniffers operate on layer 2 or ____ of the OSI model. | 3 |
____ is the text version of Ethereal, a packet sniffer tool. | Tethereal |
The ____ Project was developed to make information widely available in an attempt to thwart Internet and network hackers. | Honeynet |
Machines used on a DDoS are known as ____ simply because they have unwittingly become part of the attack. | zombies |
E-mail messages are distributed from one central server to many connected client computers, a configuration called ____. | client/server architecture |
With many ____ e-mail programs, you can copy an e-mail message by dragging the message to a storage medium, such as a folder or disk. | GUI |
When working on a Windows environment you can press ____ to copy the selected text to the clipboard. | Ctrl+C |
To retrieve an Outlook Express e-mail header right-click the message, and then click ____ to open a dialog box showing general information about the message. | Properties |
In Microsoft Outlook, you can save sent, drafted, deleted, and received e-mails in a file with a file extension of ____. | .pst |
____ is a comprehensive Web site that has options for searching for a suspect, including by e-mail address, phone numbers, and names. | www.freeality.com |
____ contains configuration information for Sendmail, allowing the investigator to determine where the log files reside. | /etc/sendmail.cf |
Typically, UNIX installations are set to store logs such as maillog in the ____ directory. | /var/log |
In Exchange, to prevent loss of data from the last backup, a ____ file or marker is inserted in the transaction log to mark the last point at which the database was written to disk. | checkpoint |
The Novell e-mail server software is called ____. | GroupWise |
Developed during WWII, this technology,____, was patented by Qualcomm after the war. | CDMA |
The ____ digital network divides a radio frequency into time slots. | TDMA |
TDMA refers to the ____ standard, which introduced sleep mode to enhance battery life. | IS-136 |
Typically, phones store system data in ____, which enables service providers to reprogram phones without having to physically access memory chips. | EEPROM |
____ cards are found most commonly in GSM devices and consist of a microprocessor and from 16 KB to 4 MB of EEPROM. | SIM |
____ can still be found as separate devices from mobile phones. Most users carry them instead of a laptop to keep track of appointments, deadlines, address books, and so forth. | PDAs |
The file system for a SIM card is a ____ structure. | hierarchical |
The SIM file structure begins with the root of the system (____). | MF |
Paraben Software is a leader in mobile forensics software and offers several tools, including ____, which can be used to acquire data from a variety of phone models. | Device Seizure |
In a Windows environment, BitPim stores files in ____ by default. | My Documents\BitPim |