Deck 17: Digital Evidence on Windows Systems

ملء الشاشة (f)
exit full mode
سؤال
When examining the Windows registry key, the "Last Write Time" indicates:

A) The last time RegEdit was run
B) When a value in that Registry key was altered or added
C) The current system time
D) The number of allowable changes has been exceeded
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Forensically acceptable alternatives to using a Windows Evidence Acquisition Boot Disk include all but which of the following?

A) Linux boot floppy
B) FIRE bootable CD-ROM
C) Booting into safe mode
D) Hardware write blockers
سؤال
You find the following deleted file on a floppy disk. How many clusters does this file occupy?  Name  Ext  ID  Size Date  Time  Cluster  76 A R S H D V  _REENF 1 DOC  Erased 19968508032:34pm275A\begin{array}{ll}\text { Name } & \text { Ext } &\text { ID } &\text { Size } &\text {Date } &\text { Time }&\text { Cluster }&\text { 76 A R S H D V }\\\text { \_REENF } \sim 1 & \text { DOC }&\text { Erased }&19968&5-08-03&2:34pm&275&A----\end{array}

A) 200
B) 78
C) 39
D) 21
سؤال
Media can be accessed for examination either ________or____________ . (Choose two)

A) Logically
B) Sequentially
C) Randomly
D) Physically
سؤال
Given their widespread use and simple structure, FAT file systems are a good starting point for forensic analysts to understand file systems and recovery of deleted data.
سؤال
File system traces include all of the following EXCEPT:

A) Metadata
B) CMOS settings
C) Swap file contents
D) Data object date-time stamps
سؤال
The Windows NT Event log Appevent.evt:

A) Contains a log of application usage
B) Records activities that have security implications, such as logins
C) Notes system events such as shutdowns
D) None of the above
سؤال
When a file is moved within a volume, the Last Accessed Date Time:

A) Is unchanged
B) Changes if a file is moved to different directory
C) Changes if a file is moved to the root
D) Is unchanged; however, the Created Date-Time does change
سؤال
Before evidentiary media is "acquired," forensic examiners often______________ the media to make sure it contains data relevant to the investigation.

A) Hash
B) Preview
C) Validate
D) Analyze
سؤال
With the correct CMOS setting, it is possible to mount a hard drive as Read-Only in the Windows environment.
سؤال
Which of the following issues is NOT one that a forensic examiner faces when dealing with Windows-based media?

A) Invasive characteristics of the Windows environment
B) The facility in the standard Windows environment for mounting a hard drive as Read-Only
C) The location, organization, and content of Windows system log files
D) Available methods for recovering data from Windows media
سؤال
EnCase provides the means to create a Windows Evidence Acquisition Boot Disk to allow for network acquisition of an evidence drive.
سؤال
When examining the "news.rc," you find the following entry:
 alt.binaries.hacking.utilities! 18905,8912,8921,8924,8926,8929,8930,8932\text { alt.binaries.hacking.utilities! } 1 - 8905,8912,8921,8924,8926,8929,8930,8932
What does the "!" mean?

A) The user is subscribed to this group.
B) The user was once subscribed, but is currently unsubscribed, to this group.
C) The group is up to date.
D) The last message retrieval was aborted.
سؤال
Usenet readers store all the URLs that have been accessed, but do not record which Usenet newsgroups have been accessed and joined.
سؤال
The Windows NT Event log Secevent.evt:

A) Contains a log of application usage
B) Records activities that have security implications, such as logins
C) Notes system events such as shutdowns
D) None of the above
سؤال
The standard Windows environment supports all of the following file systems EXCEPT____________ .

A) FAT16
B) ext2
C) FAT32
D) NTFS
سؤال
6 . Which of the following software tools is NOT used for data recovery?

A) WinHex (X-Ways) Forensic
B) EnCase
C) FTK
D) Safeback
سؤال
The Windows environment is invasive and poses a challenge to forensic examiners.
سؤال
Internet traces may be found in which of the following categories?

A) Web browser cache
B) Instant messenger cache
C) Cookies
D) All of the above
سؤال
Log files are used by the forensic examiner to_________ .

A) Associate system events with specific user accounts
B) Verify the integrity of the file system
C) Confirm login passwords
D) Determine if a specific individual is the guilty party
سؤال
The MD5 hashing algorithm is no longer considered to be a reliable method for determining whether two blocks of text are identical.
سؤال
Just like Windows NT, Windows 98 has event logs that record system activities.
سؤال
NTFS time represents time as the number of 100-nanosecond intervals since January 1, 1601 00:00:00 UTC.
سؤال
In FAT32 file systems both the directory and FAT entries are updated when a file is deleted.
سؤال
EnCase can recover deleted files but does not have the capability of recovering deleted directories.
سؤال
"File carving" is an examination technique where the beginning and end of a file are located, and the block of data spanning the two locations is copied to a new file, with the appropriate extension.
سؤال
Windows evidentiary media must be acquired and examined with Windows-based examination software.
سؤال
In the Windows environment, simply opening a file to read, without writing it back to disk, can change the date-time stamp.
سؤال
In NTFS, when a file is deleted from a directory, the last modified and accessed date-time stamps of the parent directory listing are updated.
سؤال
A forensic examiner would use logical access to examine media if the file and directory structures were to be analyzed.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 17: Digital Evidence on Windows Systems
1
When examining the Windows registry key, the "Last Write Time" indicates:

A) The last time RegEdit was run
B) When a value in that Registry key was altered or added
C) The current system time
D) The number of allowable changes has been exceeded
B
2
Forensically acceptable alternatives to using a Windows Evidence Acquisition Boot Disk include all but which of the following?

A) Linux boot floppy
B) FIRE bootable CD-ROM
C) Booting into safe mode
D) Hardware write blockers
C
3
You find the following deleted file on a floppy disk. How many clusters does this file occupy?  Name  Ext  ID  Size Date  Time  Cluster  76 A R S H D V  _REENF 1 DOC  Erased 19968508032:34pm275A\begin{array}{ll}\text { Name } & \text { Ext } &\text { ID } &\text { Size } &\text {Date } &\text { Time }&\text { Cluster }&\text { 76 A R S H D V }\\\text { \_REENF } \sim 1 & \text { DOC }&\text { Erased }&19968&5-08-03&2:34pm&275&A----\end{array}

A) 200
B) 78
C) 39
D) 21
39
4
Media can be accessed for examination either ________or____________ . (Choose two)

A) Logically
B) Sequentially
C) Randomly
D) Physically
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
Given their widespread use and simple structure, FAT file systems are a good starting point for forensic analysts to understand file systems and recovery of deleted data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
File system traces include all of the following EXCEPT:

A) Metadata
B) CMOS settings
C) Swap file contents
D) Data object date-time stamps
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Windows NT Event log Appevent.evt:

A) Contains a log of application usage
B) Records activities that have security implications, such as logins
C) Notes system events such as shutdowns
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
When a file is moved within a volume, the Last Accessed Date Time:

A) Is unchanged
B) Changes if a file is moved to different directory
C) Changes if a file is moved to the root
D) Is unchanged; however, the Created Date-Time does change
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
Before evidentiary media is "acquired," forensic examiners often______________ the media to make sure it contains data relevant to the investigation.

A) Hash
B) Preview
C) Validate
D) Analyze
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
With the correct CMOS setting, it is possible to mount a hard drive as Read-Only in the Windows environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following issues is NOT one that a forensic examiner faces when dealing with Windows-based media?

A) Invasive characteristics of the Windows environment
B) The facility in the standard Windows environment for mounting a hard drive as Read-Only
C) The location, organization, and content of Windows system log files
D) Available methods for recovering data from Windows media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
EnCase provides the means to create a Windows Evidence Acquisition Boot Disk to allow for network acquisition of an evidence drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
When examining the "news.rc," you find the following entry:
 alt.binaries.hacking.utilities! 18905,8912,8921,8924,8926,8929,8930,8932\text { alt.binaries.hacking.utilities! } 1 - 8905,8912,8921,8924,8926,8929,8930,8932
What does the "!" mean?

A) The user is subscribed to this group.
B) The user was once subscribed, but is currently unsubscribed, to this group.
C) The group is up to date.
D) The last message retrieval was aborted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
Usenet readers store all the URLs that have been accessed, but do not record which Usenet newsgroups have been accessed and joined.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Windows NT Event log Secevent.evt:

A) Contains a log of application usage
B) Records activities that have security implications, such as logins
C) Notes system events such as shutdowns
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
The standard Windows environment supports all of the following file systems EXCEPT____________ .

A) FAT16
B) ext2
C) FAT32
D) NTFS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
6 . Which of the following software tools is NOT used for data recovery?

A) WinHex (X-Ways) Forensic
B) EnCase
C) FTK
D) Safeback
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
The Windows environment is invasive and poses a challenge to forensic examiners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
Internet traces may be found in which of the following categories?

A) Web browser cache
B) Instant messenger cache
C) Cookies
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
Log files are used by the forensic examiner to_________ .

A) Associate system events with specific user accounts
B) Verify the integrity of the file system
C) Confirm login passwords
D) Determine if a specific individual is the guilty party
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
The MD5 hashing algorithm is no longer considered to be a reliable method for determining whether two blocks of text are identical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
Just like Windows NT, Windows 98 has event logs that record system activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
NTFS time represents time as the number of 100-nanosecond intervals since January 1, 1601 00:00:00 UTC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
In FAT32 file systems both the directory and FAT entries are updated when a file is deleted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
EnCase can recover deleted files but does not have the capability of recovering deleted directories.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
"File carving" is an examination technique where the beginning and end of a file are located, and the block of data spanning the two locations is copied to a new file, with the appropriate extension.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
Windows evidentiary media must be acquired and examined with Windows-based examination software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
In the Windows environment, simply opening a file to read, without writing it back to disk, can change the date-time stamp.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
In NTFS, when a file is deleted from a directory, the last modified and accessed date-time stamps of the parent directory listing are updated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
A forensic examiner would use logical access to examine media if the file and directory structures were to be analyzed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.