Deck 3: Tools, Environments, Equipment, and Certifications

ملء الشاشة (f)
exit full mode
سؤال
If you need to remove a password from files,you could use a program such as

A)Jack the Cracker
B)WinHex
C)MacQuisition
D)John the Ripper
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Preserving e-evidence and good ________ of steps taken during the investigation are essential for success in computer crime cases.
سؤال
Under no circumstances should you attempt to create a forensically clean drive by simply ________ the drive.
سؤال
A defensible approach is an objective and unbiased approach that

A)Is performed in accordance with forensic science principles
B)Is conducted with verified tools
C)Is documented thoroughly
D)All the above
سؤال
The current best approach to powering down a suspect PC is to

A)Simply power it down using the operating system
B)Keep it running on an UPS
C)Don't power it down
D)Pull the power plug
سؤال
Documentation of the evidence can include which of the following?

A)Name of the suspect's supervisor
B)Status of the computer
C)Name of the investigating officer
D)All the above
سؤال
Which of the following tasks should be performed to maximize search results?

A)Confirm the objective of the investigation.
B)Identify relevant time periods.
C)Identify relevant types of data.
D)All are correct.
سؤال
Which of the following is the preferred way to make a forensic copy?

A)Create a mirror image.
B)Produce a sector-by-sector copy.
C)Copy residual data only.
D)Make a back-up tape image.
سؤال
If volatile data must be acquired,you may need to do your analysis in a(n)

A)Trusted environment
B)Postmortem environment
C)Untrusted environment
D)Dead environment
سؤال
Which of the following does NOT affect the choice of forensic tool(s)for a case?

A)The operating system
B)State of the data
C)Availability of an expert witness
D)Domestic and international laws
سؤال
To protect original data from any alteration,you

A)Use gloves when working with the hard drive
B)Make a forensic copy of the original data
C)Do your forensic work as quickly as possible
D)Use the operating system to copy all relevant files
سؤال
Which factor(s)determine the type of tools needed for an analysis?

A)The environment
B)The power sources available where the analysis will be done
C)The make of the equipment to be analyzed
D)None of the above
سؤال
________ data is data that has been deleted but not erased.
سؤال
When you forensically wipe a hard drive,you

A)Write over all areas of the disk with a single character
B)Reformat the hard drive using standard disk utilities
C)Delete all active data from the hard drive
D)Use a forensic tool to physically clean the hard drive
سؤال
When a copy is made,the contents of a hard drive are stored as a series of compressed ________ files.
سؤال
The first step in analyzing data is to _________ it.
سؤال
Which of the following tools is designed for use with Linux systems?

A)BlackBag
B)WinHex
C)Autopsy
D)PDA Seizure
سؤال
A forensics lab should have all of the following applications on hand EXCEPT

A)Microsoft Office versions
B)ClarisWorks
C)Peachtree Accounting
D)Visual Basic
سؤال
Encase softwarecan be used for all e-mail investigations EXCEPT which of the following?

A)GoogleMail
B)Hotmail
C)Outlook
D)AOL
سؤال
Data may be hidden by all of the following methods EXCEPT

A)Using special characters in the actual name
B)Renaming to a common name used by the operating system
C)Encrypting the file
D)Password-protecting the file
سؤال
You may need to do a(n)________ analysis during a hacker attack or other intrusion.
سؤال
A(n)________ can cause MD5 hashes to be different if different tools are used to acquire a disk image.
سؤال
________,from Paraben Forensics,is a comprehensive tool for investigating the contents of Palm Pocket PCs that run on Windows CE.
سؤال
________ is another name for the security key you need to access a system when using EnCase.
سؤال
A computer forensic specialist may examine the ________ to ascertain the true identity of a file.
سؤال
A forensics lab is typically considered to be a(n)________ environment.
سؤال
One ________ can be saved on numerous servers and be forwarded to a person unknown to its author.
سؤال
A drive image is "fingerprinted" using an encryption technique called ________.
سؤال
________ data can include spreadsheets,databases,and word processing files.
سؤال
A dead analysis is also referred to as a(n)________ analysis.
سؤال
Match between columns
Active data
A file renamed to look like an operating system file
Active data
Data easily viewed through file manager programs
Active data
Cache files and history files
Active data
File space that is now available for being written to
سؤال
Match between columns
Scanner
Software used to destroy system log trails
Scanner
Tools used to mask a person's online identity
Scanner
Used to break encrypted password files
Scanner
Used to identify services running on a network
Scanner
Used to impersonate someone else's identity
Scanner
Keep detailed records and photographs
Scanner
Verify the integrity of the copy to the source
Scanner
Create a copy without altering the original
Scanner
Ensure fairness in the evaluation
Scanner
Perform the technical analysis while retaining its integrity
Spoofer
Software used to destroy system log trails
Spoofer
Tools used to mask a person's online identity
Spoofer
Used to break encrypted password files
Spoofer
Used to identify services running on a network
Spoofer
Used to impersonate someone else's identity
Spoofer
Keep detailed records and photographs
Spoofer
Verify the integrity of the copy to the source
Spoofer
Create a copy without altering the original
Spoofer
Ensure fairness in the evaluation
Spoofer
Perform the technical analysis while retaining its integrity
Presumption of evidence
Software used to destroy system log trails
Presumption of evidence
Tools used to mask a person's online identity
Presumption of evidence
Used to break encrypted password files
Presumption of evidence
Used to identify services running on a network
Presumption of evidence
Used to impersonate someone else's identity
Presumption of evidence
Keep detailed records and photographs
Presumption of evidence
Verify the integrity of the copy to the source
Presumption of evidence
Create a copy without altering the original
Presumption of evidence
Ensure fairness in the evaluation
Presumption of evidence
Perform the technical analysis while retaining its integrity
Document the activities
Software used to destroy system log trails
Document the activities
Tools used to mask a person's online identity
Document the activities
Used to break encrypted password files
Document the activities
Used to identify services running on a network
Document the activities
Used to impersonate someone else's identity
Document the activities
Keep detailed records and photographs
Document the activities
Verify the integrity of the copy to the source
Document the activities
Create a copy without altering the original
Document the activities
Ensure fairness in the evaluation
Document the activities
Perform the technical analysis while retaining its integrity
Password cracker
Software used to destroy system log trails
Password cracker
Tools used to mask a person's online identity
Password cracker
Used to break encrypted password files
Password cracker
Used to identify services running on a network
Password cracker
Used to impersonate someone else's identity
Password cracker
Keep detailed records and photographs
Password cracker
Verify the integrity of the copy to the source
Password cracker
Create a copy without altering the original
Password cracker
Ensure fairness in the evaluation
Password cracker
Perform the technical analysis while retaining its integrity
Anonymous remailer
Software used to destroy system log trails
Anonymous remailer
Tools used to mask a person's online identity
Anonymous remailer
Used to break encrypted password files
Anonymous remailer
Used to identify services running on a network
Anonymous remailer
Used to impersonate someone else's identity
Anonymous remailer
Keep detailed records and photographs
Anonymous remailer
Verify the integrity of the copy to the source
Anonymous remailer
Create a copy without altering the original
Anonymous remailer
Ensure fairness in the evaluation
Anonymous remailer
Perform the technical analysis while retaining its integrity
Nuker
Software used to destroy system log trails
Nuker
Tools used to mask a person's online identity
Nuker
Used to break encrypted password files
Nuker
Used to identify services running on a network
Nuker
Used to impersonate someone else's identity
Nuker
Keep detailed records and photographs
Nuker
Verify the integrity of the copy to the source
Nuker
Create a copy without altering the original
Nuker
Ensure fairness in the evaluation
Nuker
Perform the technical analysis while retaining its integrity
Preponderance of evidence
Software used to destroy system log trails
Preponderance of evidence
Tools used to mask a person's online identity
Preponderance of evidence
Used to break encrypted password files
Preponderance of evidence
Used to identify services running on a network
Preponderance of evidence
Used to impersonate someone else's identity
Preponderance of evidence
Keep detailed records and photographs
Preponderance of evidence
Verify the integrity of the copy to the source
Preponderance of evidence
Create a copy without altering the original
Preponderance of evidence
Ensure fairness in the evaluation
Preponderance of evidence
Perform the technical analysis while retaining its integrity
Proof beyond reasonable doubt
Software used to destroy system log trails
Proof beyond reasonable doubt
Tools used to mask a person's online identity
Proof beyond reasonable doubt
Used to break encrypted password files
Proof beyond reasonable doubt
Used to identify services running on a network
Proof beyond reasonable doubt
Used to impersonate someone else's identity
Proof beyond reasonable doubt
Keep detailed records and photographs
Proof beyond reasonable doubt
Verify the integrity of the copy to the source
Proof beyond reasonable doubt
Create a copy without altering the original
Proof beyond reasonable doubt
Ensure fairness in the evaluation
Proof beyond reasonable doubt
Perform the technical analysis while retaining its integrity
Presumption
Software used to destroy system log trails
Presumption
Tools used to mask a person's online identity
Presumption
Used to break encrypted password files
Presumption
Used to identify services running on a network
Presumption
Used to impersonate someone else's identity
Presumption
Keep detailed records and photographs
Presumption
Verify the integrity of the copy to the source
Presumption
Create a copy without altering the original
Presumption
Ensure fairness in the evaluation
Presumption
Perform the technical analysis while retaining its integrity
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Tools, Environments, Equipment, and Certifications
1
If you need to remove a password from files,you could use a program such as

A)Jack the Cracker
B)WinHex
C)MacQuisition
D)John the Ripper
D
2
Preserving e-evidence and good ________ of steps taken during the investigation are essential for success in computer crime cases.
documentation
3
Under no circumstances should you attempt to create a forensically clean drive by simply ________ the drive.
formatting
4
A defensible approach is an objective and unbiased approach that

A)Is performed in accordance with forensic science principles
B)Is conducted with verified tools
C)Is documented thoroughly
D)All the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
The current best approach to powering down a suspect PC is to

A)Simply power it down using the operating system
B)Keep it running on an UPS
C)Don't power it down
D)Pull the power plug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
Documentation of the evidence can include which of the following?

A)Name of the suspect's supervisor
B)Status of the computer
C)Name of the investigating officer
D)All the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following tasks should be performed to maximize search results?

A)Confirm the objective of the investigation.
B)Identify relevant time periods.
C)Identify relevant types of data.
D)All are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is the preferred way to make a forensic copy?

A)Create a mirror image.
B)Produce a sector-by-sector copy.
C)Copy residual data only.
D)Make a back-up tape image.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
If volatile data must be acquired,you may need to do your analysis in a(n)

A)Trusted environment
B)Postmortem environment
C)Untrusted environment
D)Dead environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following does NOT affect the choice of forensic tool(s)for a case?

A)The operating system
B)State of the data
C)Availability of an expert witness
D)Domestic and international laws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
To protect original data from any alteration,you

A)Use gloves when working with the hard drive
B)Make a forensic copy of the original data
C)Do your forensic work as quickly as possible
D)Use the operating system to copy all relevant files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which factor(s)determine the type of tools needed for an analysis?

A)The environment
B)The power sources available where the analysis will be done
C)The make of the equipment to be analyzed
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
________ data is data that has been deleted but not erased.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
When you forensically wipe a hard drive,you

A)Write over all areas of the disk with a single character
B)Reformat the hard drive using standard disk utilities
C)Delete all active data from the hard drive
D)Use a forensic tool to physically clean the hard drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
When a copy is made,the contents of a hard drive are stored as a series of compressed ________ files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
The first step in analyzing data is to _________ it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following tools is designed for use with Linux systems?

A)BlackBag
B)WinHex
C)Autopsy
D)PDA Seizure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
A forensics lab should have all of the following applications on hand EXCEPT

A)Microsoft Office versions
B)ClarisWorks
C)Peachtree Accounting
D)Visual Basic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
Encase softwarecan be used for all e-mail investigations EXCEPT which of the following?

A)GoogleMail
B)Hotmail
C)Outlook
D)AOL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
Data may be hidden by all of the following methods EXCEPT

A)Using special characters in the actual name
B)Renaming to a common name used by the operating system
C)Encrypting the file
D)Password-protecting the file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
You may need to do a(n)________ analysis during a hacker attack or other intrusion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n)________ can cause MD5 hashes to be different if different tools are used to acquire a disk image.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
________,from Paraben Forensics,is a comprehensive tool for investigating the contents of Palm Pocket PCs that run on Windows CE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
________ is another name for the security key you need to access a system when using EnCase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
A computer forensic specialist may examine the ________ to ascertain the true identity of a file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
A forensics lab is typically considered to be a(n)________ environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
One ________ can be saved on numerous servers and be forwarded to a person unknown to its author.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
A drive image is "fingerprinted" using an encryption technique called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
________ data can include spreadsheets,databases,and word processing files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
A dead analysis is also referred to as a(n)________ analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match between columns
Active data
A file renamed to look like an operating system file
Active data
Data easily viewed through file manager programs
Active data
Cache files and history files
Active data
File space that is now available for being written to
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
Match between columns
Scanner
Software used to destroy system log trails
Scanner
Tools used to mask a person's online identity
Scanner
Used to break encrypted password files
Scanner
Used to identify services running on a network
Scanner
Used to impersonate someone else's identity
Scanner
Keep detailed records and photographs
Scanner
Verify the integrity of the copy to the source
Scanner
Create a copy without altering the original
Scanner
Ensure fairness in the evaluation
Scanner
Perform the technical analysis while retaining its integrity
Spoofer
Software used to destroy system log trails
Spoofer
Tools used to mask a person's online identity
Spoofer
Used to break encrypted password files
Spoofer
Used to identify services running on a network
Spoofer
Used to impersonate someone else's identity
Spoofer
Keep detailed records and photographs
Spoofer
Verify the integrity of the copy to the source
Spoofer
Create a copy without altering the original
Spoofer
Ensure fairness in the evaluation
Spoofer
Perform the technical analysis while retaining its integrity
Presumption of evidence
Software used to destroy system log trails
Presumption of evidence
Tools used to mask a person's online identity
Presumption of evidence
Used to break encrypted password files
Presumption of evidence
Used to identify services running on a network
Presumption of evidence
Used to impersonate someone else's identity
Presumption of evidence
Keep detailed records and photographs
Presumption of evidence
Verify the integrity of the copy to the source
Presumption of evidence
Create a copy without altering the original
Presumption of evidence
Ensure fairness in the evaluation
Presumption of evidence
Perform the technical analysis while retaining its integrity
Document the activities
Software used to destroy system log trails
Document the activities
Tools used to mask a person's online identity
Document the activities
Used to break encrypted password files
Document the activities
Used to identify services running on a network
Document the activities
Used to impersonate someone else's identity
Document the activities
Keep detailed records and photographs
Document the activities
Verify the integrity of the copy to the source
Document the activities
Create a copy without altering the original
Document the activities
Ensure fairness in the evaluation
Document the activities
Perform the technical analysis while retaining its integrity
Password cracker
Software used to destroy system log trails
Password cracker
Tools used to mask a person's online identity
Password cracker
Used to break encrypted password files
Password cracker
Used to identify services running on a network
Password cracker
Used to impersonate someone else's identity
Password cracker
Keep detailed records and photographs
Password cracker
Verify the integrity of the copy to the source
Password cracker
Create a copy without altering the original
Password cracker
Ensure fairness in the evaluation
Password cracker
Perform the technical analysis while retaining its integrity
Anonymous remailer
Software used to destroy system log trails
Anonymous remailer
Tools used to mask a person's online identity
Anonymous remailer
Used to break encrypted password files
Anonymous remailer
Used to identify services running on a network
Anonymous remailer
Used to impersonate someone else's identity
Anonymous remailer
Keep detailed records and photographs
Anonymous remailer
Verify the integrity of the copy to the source
Anonymous remailer
Create a copy without altering the original
Anonymous remailer
Ensure fairness in the evaluation
Anonymous remailer
Perform the technical analysis while retaining its integrity
Nuker
Software used to destroy system log trails
Nuker
Tools used to mask a person's online identity
Nuker
Used to break encrypted password files
Nuker
Used to identify services running on a network
Nuker
Used to impersonate someone else's identity
Nuker
Keep detailed records and photographs
Nuker
Verify the integrity of the copy to the source
Nuker
Create a copy without altering the original
Nuker
Ensure fairness in the evaluation
Nuker
Perform the technical analysis while retaining its integrity
Preponderance of evidence
Software used to destroy system log trails
Preponderance of evidence
Tools used to mask a person's online identity
Preponderance of evidence
Used to break encrypted password files
Preponderance of evidence
Used to identify services running on a network
Preponderance of evidence
Used to impersonate someone else's identity
Preponderance of evidence
Keep detailed records and photographs
Preponderance of evidence
Verify the integrity of the copy to the source
Preponderance of evidence
Create a copy without altering the original
Preponderance of evidence
Ensure fairness in the evaluation
Preponderance of evidence
Perform the technical analysis while retaining its integrity
Proof beyond reasonable doubt
Software used to destroy system log trails
Proof beyond reasonable doubt
Tools used to mask a person's online identity
Proof beyond reasonable doubt
Used to break encrypted password files
Proof beyond reasonable doubt
Used to identify services running on a network
Proof beyond reasonable doubt
Used to impersonate someone else's identity
Proof beyond reasonable doubt
Keep detailed records and photographs
Proof beyond reasonable doubt
Verify the integrity of the copy to the source
Proof beyond reasonable doubt
Create a copy without altering the original
Proof beyond reasonable doubt
Ensure fairness in the evaluation
Proof beyond reasonable doubt
Perform the technical analysis while retaining its integrity
Presumption
Software used to destroy system log trails
Presumption
Tools used to mask a person's online identity
Presumption
Used to break encrypted password files
Presumption
Used to identify services running on a network
Presumption
Used to impersonate someone else's identity
Presumption
Keep detailed records and photographs
Presumption
Verify the integrity of the copy to the source
Presumption
Create a copy without altering the original
Presumption
Ensure fairness in the evaluation
Presumption
Perform the technical analysis while retaining its integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.