Deck 2: Understanding Computer Investigations

ملء الشاشة (f)
exit full mode
سؤال
You can use ____ to boot to Windows without writing any data to the evidence disk.

A) a SCSI boot up disk
B) a Windows boot up disk
C) a write-blocker
D) Windows XP
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
To begin conducting an investigation, you start by ____ the evidence using a variety of methods.

A) copying
B) analyzing
C) opening
D) reading
سؤال
To conduct your investigation and analysis, you must have a specially configured personal computer (PC) known as a ____.

A) mobile workstation
B) forensic workstation
C) forensic lab
D) recovery workstation
سؤال
The ____ is the route the evidence takes from the time you find it until the case is closed or goes to court.

A) acquisition plan
B) chain of custody
C) evidence path
D) evidence custody
سؤال
A bit-stream copy is a bit-by-bit duplicate of the original disk. You should use the original disk whenever possible.
سؤال
When preparing a case, you can apply ____ to problem solving.

A) standard programming rules
B) standard police investigation
C) standard systems analysis steps
D) bottom-up analysis
سؤال
____ from Technology Pathways is a forensics data analysis tool. You can use it to acquire and analyze data from several different file systems.

A) Guidance EnCase
B) NTI SafeBack
C) DataArrest SnapCopy
D) ProDiscover Basic
سؤال
____ investigations typically include spam, inappropriate and offensive message content, and harassment or threats.

A) VPN
B) Internet
C) E-mail
D) Phone
سؤال
____ prevents damage to the evidence as you transport it to your secure evidence locker, evidence room, or computer lab.

A) An antistatic wrist band
B) Padding
C) An antistatic pad
D) Tape
سؤال
Many attorneys like to have printouts of the data you have recovered, but printouts can present problems when you have log files with several thousand pages of data.
سؤال
The basic plan for your investigation includes gathering the evidence, establishing the ____, and performing the forensic analysis.

A) risk assessment
B) nature of the case
C) chain of custody
D) location of the evidence
سؤال
Use ____ to secure and catalog the evidence contained in large computer components.

A) Hefty bags
B) regular bags
C) paper bags
D) evidence bags
سؤال
A ____ is a bit-by-bit copy of the original storage medium.

A) preventive copy
B) recovery copy
C) backup copy
D) bit-stream copy
سؤال
To create an exact image of an evidence disk, copying the ____ to a target work disk that's identical to the evidence disk is preferable.

A) removable copy
B) backup copy
C) bit-stream image
D) backup image
سؤال
A(n) ____ helps you document what has and has not been done with both the original evidence and forensic copies of the evidence.

A) evidence custody form
B) risk assessment form
C) initial investigation form
D) evidence handling form
سؤال
Employees surfing the Internet can cost companies millions of dollars.
سؤال
Chain of custody is also known as chain of evidence.
سؤال
You cannot use both multi-evidence and single-evidence forms in your investigation.
سؤال
The list of problems you normally expect in the type of case you are handling is known as the ____.

A) standard risk assessment
B) chain of evidence
C) standard problems form
D) problems checklist form
سؤال
A bit-stream image is also known as a(n) ____.

A) backup copy
B) forensic copy
C) custody copy
D) evidence copy
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
also known as a computer forensics workstation
سؤال
When you write your final report, state what you did and what you ____.

A) did not do
B) found
C) wanted to do
D) could not do
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
an essential part of professional growth
سؤال
A(n) ____________________ lists each piece of evidence on a separate page.
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
the least intrusive (in terms of changing data) Microsoft operating system
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
a type of evidence custody form
سؤال
When you are dealing with password protected files, you might need to acquire ____________________ or find an expert who can help you crack the passwords.
سؤال
When analyzing digital evidence, your job is to ____.

A) recover the data
B) destroy the data
C) copy the data
D) load the data
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
extracts all related e-mail address information for Web-based e-mail investigations
سؤال
Forensics tools such as ____ can retrieve deleted files for use as evidence.

A) ProDiscover Basic
B) ProDelete
C) FDisk
D) GainFile
سؤال
____ can be the most time-consuming task, even when you know exactly what to look for in the evidence.

A) Evidence recovery
B) Data recovery
C) Data analysis
D) Evidence recording
سؤال
During the ____________________ design or approach to the case, you outline the general steps you need to follow to investigate the case.
سؤال
A(n) ____________________ is usually conducted to collect information from a witness or suspect about specific facts related to an investigation.
سؤال
After you close the case and make your final report, you need to meet with your department or a group of fellow investigators and ____.

A) critique the case
B) repeat the case
C) present the case
D) read the final report
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
process of trying to get a suspect to confess to a specific incident or crime
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
is the more well-known and lucrative side of the computer forensics business
سؤال
In any computing investigation, you should be able to repeat the steps you took and produce the same results. This capability is referred to as ____.

A) checked values
B) verification
C) evidence backup
D) repeatable findings
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
an older computer forensics tool
سؤال
A(n) ____________________ is where you conduct your investigations and where most of your equipment and software are located, including the secure evidence containers.
سؤال
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
can be used for new files that are saved or files that expand as data is added to them
سؤال
What are the items you need when setting up your workstation for computer forensics?
سؤال
Describe some of the technologies used with hardware write-blocker devices. Identify some of the more commonly used vendors and their products.
سؤال
What are the differences between computer forensics and data recovery?
سؤال
What items are needed when gathering the resources you identified in your investigation plan?
سؤال
What should you do to handle evidence contained in large computer components?
سؤال
Describe the process of creating a bit-stream copy of an evidence disk.
سؤال
What is required to conduct an investigation involving e-mail abuse?
سؤال
Mention six important questions you should ask yourself when critiquing your work.
سؤال
What is required to conduct an investigation involving Internet abuse?
سؤال
What additional items are useful when setting up a forensic workstation?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Understanding Computer Investigations
1
You can use ____ to boot to Windows without writing any data to the evidence disk.

A) a SCSI boot up disk
B) a Windows boot up disk
C) a write-blocker
D) Windows XP
C
2
To begin conducting an investigation, you start by ____ the evidence using a variety of methods.

A) copying
B) analyzing
C) opening
D) reading
A
3
To conduct your investigation and analysis, you must have a specially configured personal computer (PC) known as a ____.

A) mobile workstation
B) forensic workstation
C) forensic lab
D) recovery workstation
B
4
The ____ is the route the evidence takes from the time you find it until the case is closed or goes to court.

A) acquisition plan
B) chain of custody
C) evidence path
D) evidence custody
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
A bit-stream copy is a bit-by-bit duplicate of the original disk. You should use the original disk whenever possible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
When preparing a case, you can apply ____ to problem solving.

A) standard programming rules
B) standard police investigation
C) standard systems analysis steps
D) bottom-up analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ from Technology Pathways is a forensics data analysis tool. You can use it to acquire and analyze data from several different file systems.

A) Guidance EnCase
B) NTI SafeBack
C) DataArrest SnapCopy
D) ProDiscover Basic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ investigations typically include spam, inappropriate and offensive message content, and harassment or threats.

A) VPN
B) Internet
C) E-mail
D) Phone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ prevents damage to the evidence as you transport it to your secure evidence locker, evidence room, or computer lab.

A) An antistatic wrist band
B) Padding
C) An antistatic pad
D) Tape
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Many attorneys like to have printouts of the data you have recovered, but printouts can present problems when you have log files with several thousand pages of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
The basic plan for your investigation includes gathering the evidence, establishing the ____, and performing the forensic analysis.

A) risk assessment
B) nature of the case
C) chain of custody
D) location of the evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Use ____ to secure and catalog the evidence contained in large computer components.

A) Hefty bags
B) regular bags
C) paper bags
D) evidence bags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ____ is a bit-by-bit copy of the original storage medium.

A) preventive copy
B) recovery copy
C) backup copy
D) bit-stream copy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
To create an exact image of an evidence disk, copying the ____ to a target work disk that's identical to the evidence disk is preferable.

A) removable copy
B) backup copy
C) bit-stream image
D) backup image
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
A(n) ____ helps you document what has and has not been done with both the original evidence and forensic copies of the evidence.

A) evidence custody form
B) risk assessment form
C) initial investigation form
D) evidence handling form
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Employees surfing the Internet can cost companies millions of dollars.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Chain of custody is also known as chain of evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
You cannot use both multi-evidence and single-evidence forms in your investigation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The list of problems you normally expect in the type of case you are handling is known as the ____.

A) standard risk assessment
B) chain of evidence
C) standard problems form
D) problems checklist form
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
A bit-stream image is also known as a(n) ____.

A) backup copy
B) forensic copy
C) custody copy
D) evidence copy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
also known as a computer forensics workstation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
When you write your final report, state what you did and what you ____.

A) did not do
B) found
C) wanted to do
D) could not do
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
an essential part of professional growth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n) ____________________ lists each piece of evidence on a separate page.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
the least intrusive (in terms of changing data) Microsoft operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
a type of evidence custody form
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
When you are dealing with password protected files, you might need to acquire ____________________ or find an expert who can help you crack the passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
When analyzing digital evidence, your job is to ____.

A) recover the data
B) destroy the data
C) copy the data
D) load the data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
extracts all related e-mail address information for Web-based e-mail investigations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Forensics tools such as ____ can retrieve deleted files for use as evidence.

A) ProDiscover Basic
B) ProDelete
C) FDisk
D) GainFile
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ can be the most time-consuming task, even when you know exactly what to look for in the evidence.

A) Evidence recovery
B) Data recovery
C) Data analysis
D) Evidence recording
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
During the ____________________ design or approach to the case, you outline the general steps you need to follow to investigate the case.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n) ____________________ is usually conducted to collect information from a witness or suspect about specific facts related to an investigation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
After you close the case and make your final report, you need to meet with your department or a group of fellow investigators and ____.

A) critique the case
B) repeat the case
C) present the case
D) read the final report
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
process of trying to get a suspect to confess to a specific incident or crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
is the more well-known and lucrative side of the computer forensics business
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
In any computing investigation, you should be able to repeat the steps you took and produce the same results. This capability is referred to as ____.

A) checked values
B) verification
C) evidence backup
D) repeatable findings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
an older computer forensics tool
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n) ____________________ is where you conduct your investigations and where most of your equipment and software are located, including the secure evidence containers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match each item with a statement below
a.FTK's Internet Keyword Search
f.Norton DiskEdit
b.Data recovery
g.MS-DOS 6.22
c.Free space
h.Multi-evidence form
d.Interrogation
i.Self-evaluation
e.Forensic workstation
can be used for new files that are saved or files that expand as data is added to them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the items you need when setting up your workstation for computer forensics?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe some of the technologies used with hardware write-blocker devices. Identify some of the more commonly used vendors and their products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are the differences between computer forensics and data recovery?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What items are needed when gathering the resources you identified in your investigation plan?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What should you do to handle evidence contained in large computer components?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe the process of creating a bit-stream copy of an evidence disk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is required to conduct an investigation involving e-mail abuse?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Mention six important questions you should ask yourself when critiquing your work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is required to conduct an investigation involving Internet abuse?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What additional items are useful when setting up a forensic workstation?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.