Deck 7: Investigating Windows, linux, and Graphic Files

Full screen (f)
exit full mode
Question
In a forensics context,hidden information about files and folders is called

A)Artifact data
B)Metadata
C)Archive data
D)Read-only data
Use Space or
up arrow
down arrow
to flip the card.
Question
In an NTFS system,by default,which of the following have access to files and folders not uniquely theirs?

A)Each user in the Group folder
B)Only those users in the Users folder
C)Each user who successfully logs in
D)Only the user assigned to those resources
Question
?Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?

A)/etc/sysconfig
B)/etc/shadow/passwd
C)/etc/shadow
D)/etc
Question
A(n)________ is created by the computer for each user.
Question
Sources of e-evidence within Windows subfolders can include all of the following EXCEPT

A)Pointers to Office files
B)Listing of programs on the Quick Launch bar
C)Pointers to Internet Favorites
D)The user's address book
Question
The user root folder may contain all of the following EXCEPT

A)Internet data
B)Application parameters
C)Wallpaper
D)Registry settings
Question
If you change a file extension by renaming the file,

A)You also change the data in the file
B)You will not be able to open the file
C)Windows will change the icon that represents the file
D)You also change the data header
Question
A(n)________ is designed as a hierarchical listing of folders and files.
Question
Files are first loaded into a(n)________ before being printed.
Question
All of the following are key differences in identifying an operating system EXCEPT

A)The Recycle Bin folder
B)Operating system folder names
C)User root folder construction
D)Folders containing group userids
Question
Which of the following is the primary default folder in Windows 2000 and XP?

A)Documents and Settings
B)My Documents
C)User Root
D)My Computer
Question
Which of the following is NOT one of the file types available within Linux?

A)Block devices
B)Directories
C)Named pipes
D)Superblock
Question
System data and artifacts are files generated by the ________.
Question
When you send a job to the printer,Windows creates a(n)

A)Enhanced metafile (EMF)
B)Enhanced image file (IMF)
C)Temporary print file (TPF)
D)Tagged image format file (TIFF)
Question
Which of the following is one of the default directories created when installing Linux?

A)/setup
B)/default
C)/bin
D)/swap
Question
The ________ folder is used by Internet sites to store information about the user.
Question
Clues that may indicate stego use include all of the following EXCEPT

A)The sophistication of the computer's owner
B)Software clues on the computer
C)Type of crime being investigated
D)Large number of files in the Recycle Bin
Question
Examples of user data include all of the following EXCEPT

A)User passwords
B)User profiles
C)Program files
D)Temp files
Question
In steganography,the original file that contains the hidden information is the

A)Steganographic carrier
B)Carrier medium
C)Hiding medium
D)Concealing medium
Question
All configuration information needed by the operating may be located in which of the following?

A)System folder
B)Configuration file
C)AutoexeC.bat file
D)Registry hives
Question
One application of metadata used by Windows is an uncommon storage concept called ________.
Question
The ________ tracks those actions deemed as events by the software application.
Question
The ________ command gives Linux users the ability to perform administrative duties,which require a separate password for each user.
Question
By default,the ________ is used as virtual memory.
Question
Windows NT and higher changed the registry to a mixture of several files referred to as ________.
Question
The ________ folder generally contains information concerning the programs the user typically works with.
Question
The process of retrieving image data from unallocated or slack space is called ________.
Question
In Linux,everything-including all devices,partitions,and folders-is seen as a unified ________.
Question
________ are used to determine where data starts and ends when graphic files are located in unallocated or slack space.
Question
The ________ subfolder lists the files that the user has accessed over several time periods.
Question
Match between columns
Sockets
Unbuffered files used to exchange data
Sockets
Virtual connections between two processes
Sockets
Provide a FIFO mechanism
Sockets
Buffered files used to exchange data
Question
Match between columns
User profiles
Internet history files
User profiles
Installed applications
User profiles
Though used only briefly, they are not deleted
User profiles
Data created by a user
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Investigating Windows, linux, and Graphic Files
1
In a forensics context,hidden information about files and folders is called

A)Artifact data
B)Metadata
C)Archive data
D)Read-only data
B
2
In an NTFS system,by default,which of the following have access to files and folders not uniquely theirs?

A)Each user in the Group folder
B)Only those users in the Users folder
C)Each user who successfully logs in
D)Only the user assigned to those resources
D
3
?Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?

A)/etc/sysconfig
B)/etc/shadow/passwd
C)/etc/shadow
D)/etc
C
4
A(n)________ is created by the computer for each user.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
Sources of e-evidence within Windows subfolders can include all of the following EXCEPT

A)Pointers to Office files
B)Listing of programs on the Quick Launch bar
C)Pointers to Internet Favorites
D)The user's address book
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
The user root folder may contain all of the following EXCEPT

A)Internet data
B)Application parameters
C)Wallpaper
D)Registry settings
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
If you change a file extension by renaming the file,

A)You also change the data in the file
B)You will not be able to open the file
C)Windows will change the icon that represents the file
D)You also change the data header
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
A(n)________ is designed as a hierarchical listing of folders and files.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
Files are first loaded into a(n)________ before being printed.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
All of the following are key differences in identifying an operating system EXCEPT

A)The Recycle Bin folder
B)Operating system folder names
C)User root folder construction
D)Folders containing group userids
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is the primary default folder in Windows 2000 and XP?

A)Documents and Settings
B)My Documents
C)User Root
D)My Computer
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is NOT one of the file types available within Linux?

A)Block devices
B)Directories
C)Named pipes
D)Superblock
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
System data and artifacts are files generated by the ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
When you send a job to the printer,Windows creates a(n)

A)Enhanced metafile (EMF)
B)Enhanced image file (IMF)
C)Temporary print file (TPF)
D)Tagged image format file (TIFF)
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is one of the default directories created when installing Linux?

A)/setup
B)/default
C)/bin
D)/swap
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
The ________ folder is used by Internet sites to store information about the user.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
Clues that may indicate stego use include all of the following EXCEPT

A)The sophistication of the computer's owner
B)Software clues on the computer
C)Type of crime being investigated
D)Large number of files in the Recycle Bin
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
Examples of user data include all of the following EXCEPT

A)User passwords
B)User profiles
C)Program files
D)Temp files
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
In steganography,the original file that contains the hidden information is the

A)Steganographic carrier
B)Carrier medium
C)Hiding medium
D)Concealing medium
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
All configuration information needed by the operating may be located in which of the following?

A)System folder
B)Configuration file
C)AutoexeC.bat file
D)Registry hives
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
One application of metadata used by Windows is an uncommon storage concept called ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
The ________ tracks those actions deemed as events by the software application.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
The ________ command gives Linux users the ability to perform administrative duties,which require a separate password for each user.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
By default,the ________ is used as virtual memory.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
Windows NT and higher changed the registry to a mixture of several files referred to as ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
The ________ folder generally contains information concerning the programs the user typically works with.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
The process of retrieving image data from unallocated or slack space is called ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
In Linux,everything-including all devices,partitions,and folders-is seen as a unified ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
________ are used to determine where data starts and ends when graphic files are located in unallocated or slack space.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
The ________ subfolder lists the files that the user has accessed over several time periods.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Match between columns
Sockets
Unbuffered files used to exchange data
Sockets
Virtual connections between two processes
Sockets
Provide a FIFO mechanism
Sockets
Buffered files used to exchange data
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
43
Match between columns
User profiles
Internet history files
User profiles
Installed applications
User profiles
Though used only briefly, they are not deleted
User profiles
Data created by a user
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 32 flashcards in this deck.