Deck 7: Investigating Windows, linux, and Graphic Files

ملء الشاشة (f)
exit full mode
سؤال
In a forensics context,hidden information about files and folders is called

A)Artifact data
B)Metadata
C)Archive data
D)Read-only data
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In an NTFS system,by default,which of the following have access to files and folders not uniquely theirs?

A)Each user in the Group folder
B)Only those users in the Users folder
C)Each user who successfully logs in
D)Only the user assigned to those resources
سؤال
?Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?

A)/etc/sysconfig
B)/etc/shadow/passwd
C)/etc/shadow
D)/etc
سؤال
A(n)________ is created by the computer for each user.
سؤال
Sources of e-evidence within Windows subfolders can include all of the following EXCEPT

A)Pointers to Office files
B)Listing of programs on the Quick Launch bar
C)Pointers to Internet Favorites
D)The user's address book
سؤال
The user root folder may contain all of the following EXCEPT

A)Internet data
B)Application parameters
C)Wallpaper
D)Registry settings
سؤال
If you change a file extension by renaming the file,

A)You also change the data in the file
B)You will not be able to open the file
C)Windows will change the icon that represents the file
D)You also change the data header
سؤال
A(n)________ is designed as a hierarchical listing of folders and files.
سؤال
Files are first loaded into a(n)________ before being printed.
سؤال
All of the following are key differences in identifying an operating system EXCEPT

A)The Recycle Bin folder
B)Operating system folder names
C)User root folder construction
D)Folders containing group userids
سؤال
Which of the following is the primary default folder in Windows 2000 and XP?

A)Documents and Settings
B)My Documents
C)User Root
D)My Computer
سؤال
Which of the following is NOT one of the file types available within Linux?

A)Block devices
B)Directories
C)Named pipes
D)Superblock
سؤال
System data and artifacts are files generated by the ________.
سؤال
When you send a job to the printer,Windows creates a(n)

A)Enhanced metafile (EMF)
B)Enhanced image file (IMF)
C)Temporary print file (TPF)
D)Tagged image format file (TIFF)
سؤال
Which of the following is one of the default directories created when installing Linux?

A)/setup
B)/default
C)/bin
D)/swap
سؤال
The ________ folder is used by Internet sites to store information about the user.
سؤال
Clues that may indicate stego use include all of the following EXCEPT

A)The sophistication of the computer's owner
B)Software clues on the computer
C)Type of crime being investigated
D)Large number of files in the Recycle Bin
سؤال
Examples of user data include all of the following EXCEPT

A)User passwords
B)User profiles
C)Program files
D)Temp files
سؤال
In steganography,the original file that contains the hidden information is the

A)Steganographic carrier
B)Carrier medium
C)Hiding medium
D)Concealing medium
سؤال
All configuration information needed by the operating may be located in which of the following?

A)System folder
B)Configuration file
C)AutoexeC.bat file
D)Registry hives
سؤال
One application of metadata used by Windows is an uncommon storage concept called ________.
سؤال
The ________ tracks those actions deemed as events by the software application.
سؤال
The ________ command gives Linux users the ability to perform administrative duties,which require a separate password for each user.
سؤال
By default,the ________ is used as virtual memory.
سؤال
Windows NT and higher changed the registry to a mixture of several files referred to as ________.
سؤال
The ________ folder generally contains information concerning the programs the user typically works with.
سؤال
The process of retrieving image data from unallocated or slack space is called ________.
سؤال
In Linux,everything-including all devices,partitions,and folders-is seen as a unified ________.
سؤال
________ are used to determine where data starts and ends when graphic files are located in unallocated or slack space.
سؤال
The ________ subfolder lists the files that the user has accessed over several time periods.
سؤال
Match between columns
Sockets
Unbuffered files used to exchange data
Sockets
Virtual connections between two processes
Sockets
Provide a FIFO mechanism
Sockets
Buffered files used to exchange data
سؤال
Match between columns
User profiles
Internet history files
User profiles
Installed applications
User profiles
Though used only briefly, they are not deleted
User profiles
Data created by a user
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Investigating Windows, linux, and Graphic Files
1
In a forensics context,hidden information about files and folders is called

A)Artifact data
B)Metadata
C)Archive data
D)Read-only data
B
2
In an NTFS system,by default,which of the following have access to files and folders not uniquely theirs?

A)Each user in the Group folder
B)Only those users in the Users folder
C)Each user who successfully logs in
D)Only the user assigned to those resources
D
3
?Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?

A)/etc/sysconfig
B)/etc/shadow/passwd
C)/etc/shadow
D)/etc
C
4
A(n)________ is created by the computer for each user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
Sources of e-evidence within Windows subfolders can include all of the following EXCEPT

A)Pointers to Office files
B)Listing of programs on the Quick Launch bar
C)Pointers to Internet Favorites
D)The user's address book
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
The user root folder may contain all of the following EXCEPT

A)Internet data
B)Application parameters
C)Wallpaper
D)Registry settings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
If you change a file extension by renaming the file,

A)You also change the data in the file
B)You will not be able to open the file
C)Windows will change the icon that represents the file
D)You also change the data header
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
A(n)________ is designed as a hierarchical listing of folders and files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
Files are first loaded into a(n)________ before being printed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
All of the following are key differences in identifying an operating system EXCEPT

A)The Recycle Bin folder
B)Operating system folder names
C)User root folder construction
D)Folders containing group userids
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is the primary default folder in Windows 2000 and XP?

A)Documents and Settings
B)My Documents
C)User Root
D)My Computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is NOT one of the file types available within Linux?

A)Block devices
B)Directories
C)Named pipes
D)Superblock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
System data and artifacts are files generated by the ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
When you send a job to the printer,Windows creates a(n)

A)Enhanced metafile (EMF)
B)Enhanced image file (IMF)
C)Temporary print file (TPF)
D)Tagged image format file (TIFF)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is one of the default directories created when installing Linux?

A)/setup
B)/default
C)/bin
D)/swap
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
The ________ folder is used by Internet sites to store information about the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Clues that may indicate stego use include all of the following EXCEPT

A)The sophistication of the computer's owner
B)Software clues on the computer
C)Type of crime being investigated
D)Large number of files in the Recycle Bin
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
Examples of user data include all of the following EXCEPT

A)User passwords
B)User profiles
C)Program files
D)Temp files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
In steganography,the original file that contains the hidden information is the

A)Steganographic carrier
B)Carrier medium
C)Hiding medium
D)Concealing medium
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
All configuration information needed by the operating may be located in which of the following?

A)System folder
B)Configuration file
C)AutoexeC.bat file
D)Registry hives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
One application of metadata used by Windows is an uncommon storage concept called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ________ tracks those actions deemed as events by the software application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
The ________ command gives Linux users the ability to perform administrative duties,which require a separate password for each user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
By default,the ________ is used as virtual memory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
Windows NT and higher changed the registry to a mixture of several files referred to as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ________ folder generally contains information concerning the programs the user typically works with.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
The process of retrieving image data from unallocated or slack space is called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
In Linux,everything-including all devices,partitions,and folders-is seen as a unified ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
________ are used to determine where data starts and ends when graphic files are located in unallocated or slack space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ________ subfolder lists the files that the user has accessed over several time periods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match between columns
Sockets
Unbuffered files used to exchange data
Sockets
Virtual connections between two processes
Sockets
Provide a FIFO mechanism
Sockets
Buffered files used to exchange data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match between columns
User profiles
Internet history files
User profiles
Installed applications
User profiles
Though used only briefly, they are not deleted
User profiles
Data created by a user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.