Deck 7: Investigating Windows, linux, and Graphic Files
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
Play
Full screen (f)
Deck 7: Investigating Windows, linux, and Graphic Files
1
In a forensics context,hidden information about files and folders is called
A)Artifact data
B)Metadata
C)Archive data
D)Read-only data
A)Artifact data
B)Metadata
C)Archive data
D)Read-only data
B
2
In an NTFS system,by default,which of the following have access to files and folders not uniquely theirs?
A)Each user in the Group folder
B)Only those users in the Users folder
C)Each user who successfully logs in
D)Only the user assigned to those resources
A)Each user in the Group folder
B)Only those users in the Users folder
C)Each user who successfully logs in
D)Only the user assigned to those resources
D
3
?Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?
A)/etc/sysconfig
B)/etc/shadow/passwd
C)/etc/shadow
D)/etc
A)/etc/sysconfig
B)/etc/shadow/passwd
C)/etc/shadow
D)/etc
C
4
A(n)________ is created by the computer for each user.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
Sources of e-evidence within Windows subfolders can include all of the following EXCEPT
A)Pointers to Office files
B)Listing of programs on the Quick Launch bar
C)Pointers to Internet Favorites
D)The user's address book
A)Pointers to Office files
B)Listing of programs on the Quick Launch bar
C)Pointers to Internet Favorites
D)The user's address book
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
The user root folder may contain all of the following EXCEPT
A)Internet data
B)Application parameters
C)Wallpaper
D)Registry settings
A)Internet data
B)Application parameters
C)Wallpaper
D)Registry settings
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
If you change a file extension by renaming the file,
A)You also change the data in the file
B)You will not be able to open the file
C)Windows will change the icon that represents the file
D)You also change the data header
A)You also change the data in the file
B)You will not be able to open the file
C)Windows will change the icon that represents the file
D)You also change the data header
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
A(n)________ is designed as a hierarchical listing of folders and files.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
Files are first loaded into a(n)________ before being printed.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
All of the following are key differences in identifying an operating system EXCEPT
A)The Recycle Bin folder
B)Operating system folder names
C)User root folder construction
D)Folders containing group userids
A)The Recycle Bin folder
B)Operating system folder names
C)User root folder construction
D)Folders containing group userids
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is the primary default folder in Windows 2000 and XP?
A)Documents and Settings
B)My Documents
C)User Root
D)My Computer
A)Documents and Settings
B)My Documents
C)User Root
D)My Computer
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is NOT one of the file types available within Linux?
A)Block devices
B)Directories
C)Named pipes
D)Superblock
A)Block devices
B)Directories
C)Named pipes
D)Superblock
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
System data and artifacts are files generated by the ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
When you send a job to the printer,Windows creates a(n)
A)Enhanced metafile (EMF)
B)Enhanced image file (IMF)
C)Temporary print file (TPF)
D)Tagged image format file (TIFF)
A)Enhanced metafile (EMF)
B)Enhanced image file (IMF)
C)Temporary print file (TPF)
D)Tagged image format file (TIFF)
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is one of the default directories created when installing Linux?
A)/setup
B)/default
C)/bin
D)/swap
A)/setup
B)/default
C)/bin
D)/swap
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
The ________ folder is used by Internet sites to store information about the user.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
Clues that may indicate stego use include all of the following EXCEPT
A)The sophistication of the computer's owner
B)Software clues on the computer
C)Type of crime being investigated
D)Large number of files in the Recycle Bin
A)The sophistication of the computer's owner
B)Software clues on the computer
C)Type of crime being investigated
D)Large number of files in the Recycle Bin
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
Examples of user data include all of the following EXCEPT
A)User passwords
B)User profiles
C)Program files
D)Temp files
A)User passwords
B)User profiles
C)Program files
D)Temp files
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
In steganography,the original file that contains the hidden information is the
A)Steganographic carrier
B)Carrier medium
C)Hiding medium
D)Concealing medium
A)Steganographic carrier
B)Carrier medium
C)Hiding medium
D)Concealing medium
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
All configuration information needed by the operating may be located in which of the following?
A)System folder
B)Configuration file
C)AutoexeC.bat file
D)Registry hives
A)System folder
B)Configuration file
C)AutoexeC.bat file
D)Registry hives
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
One application of metadata used by Windows is an uncommon storage concept called ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
The ________ tracks those actions deemed as events by the software application.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
The ________ command gives Linux users the ability to perform administrative duties,which require a separate password for each user.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
By default,the ________ is used as virtual memory.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
Windows NT and higher changed the registry to a mixture of several files referred to as ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
The ________ folder generally contains information concerning the programs the user typically works with.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
The process of retrieving image data from unallocated or slack space is called ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
In Linux,everything-including all devices,partitions,and folders-is seen as a unified ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
________ are used to determine where data starts and ends when graphic files are located in unallocated or slack space.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
The ________ subfolder lists the files that the user has accessed over several time periods.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
43
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck