CIS 562 Week 11 Final Exam – Strayer New
Click On The Link Below To
Purchase A+ Graded Material
Instant Download
Chapters 7 Through 16
Chapter
7: Current Computer Forensics Tools
TRUE/FALSE
1. When you research for computer forensics
tools, strive for versatile, flexible, and robust tools that provide technical
support.
2. In software acquisition, there are three
types of data-copying methods.
3. To help determine what computer forensics
tool to purchase, a comparison table of functions, subfunctions, and vendor
products is useful.
4. The Windows platforms have long been the
primary command-line interface OSs.
5. After retrieving and examining evidence data
with one tool, you should verify your results by performing the same tasks with
other similar forensics tools.
MULTIPLE
CHOICE
1. Computer forensics tools are divided into
____ major categories.
|
a.
|
2
|
c.
|
4
|
|
b.
|
3
|
d.
|
5
|
2. Software forensics tools are commonly used to
copy data from a suspect’s disk drive to a(n) ____.
|
a.
|
backup
file
|
c.
|
image
file
|
|
b.
|
firmware
|
d.
|
recovery
copy
|
3. To make a disk acquisition with En.exe
requires only a PC running ____ with a 12-volt power connector and an IDE, a
SATA, or a SCSI connector cable.
|
a.
|
UNIX
|
c.
|
Linux
|
|
b.
|
MAC
OS X
|
d.
|
MS-DOS
|
4. Raw data is a direct copy of a disk drive. An
example of a Raw image is output from the UNIX/Linux ____ command.
|
a.
|
rawcp
|
c.
|
d2dump
|
|
b.
|
dd
|
d.
|
dhex
|
5. ____ of data involves sorting and searching
through all investigation data.
|
a.
|
Validation
|
c.
|
Acquisition
|
|
b.
|
Discrimination
|
d.
|
Reconstruction
|
6. Many password recovery tools have a feature
that allows generating potential lists for a ____attack.
|
a.
|
brute-force
|
c.
|
birthday
|
|
b.
|
password
dictionary
|
d.
|
salting
|
7. The simplest method of duplicating a disk
drive is using a tool that does a direct ____ copy from the original disk to
the target disk.
|
a.
|
partition-to-partition
|
c.
|
disk-to-disk
|
|
b.
|
image-to-partition
|
d.
|
image-to-disk
|
8. To complete a forensic disk analysis and
examination, you need to create a ____.
|
a.
|
forensic
disk copy
|
c.
|
budget
plan
|
|
b.
|
risk
assessment
|
d.
|
report
|
9. The first tools that analyzed and extracted
data from floppy disks and hard disks were MS-DOS tools for ____ PC file
systems.
|
a.
|
Apple
|
c.
|
Commodore
|
|
b.
|
Atari
|
d.
|
IBM
|
10. In Windows 2000 and XP, the ____ command
shows you the owner of a file if you have multiple users on the system or
network.
|
a.
|
Dir
|
c.
|
Copy
|
|
b.
|
ls
|
d.
|
owner
|
11. In general, forensics workstations can be
divided into ____ categories.
|
a.
|
2
|
c.
|
4
|
|
b.
|
3
|
d.
|
5
|
12. A forensics workstation consisting of a
laptop computer with a built-in LCD monitor and almost as many bays and
peripherals as a stationary workstation is also known as a ____.
|
a.
|
stationary
workstation
|
c.
|
lightweight
workstation
|
|
b.
|
field
workstation
|
d.
|
portable
workstation
|
13. ____ is a simple drive-imaging station.
|
a.
|
F.R.E.D.
|
c.
|
FIRE
IDE
|
|
b.
|
SPARC
|
d.
|
DiskSpy
|
14. ____ can be software or hardware and are used
to protect evidence disks by preventing you from writing any data to the
evidence disk.
|
a.
|
Drive-imaging
|
c.
|
Workstations
|
|
b.
|
Disk
editors
|
d.
|
Write-blockers
|
15. Many vendors have developed write-blocking
devices that connect to a computer through FireWire,____ 2.0,and SCSI
controllers.
|
a.
|
USB
|
c.
|
LCD
|
|
b.
|
IDE
|
d.
|
PCMCIA
|
16. The ____ publishes articles, provides
tools, and creates procedures for testing and validating computer forensics
software.
|
a.
|
CFTT
|
c.
|
FS-TST
|
|
b.
|
NIST
|
d.
|
NSRL
|
17. The standards document, ____, demands
accuracy for all aspects of the testing process, meaning that the results must
be repeatable and reproducible.
|
a.
|
ISO
3657
|
c.
|
ISO
5725
|
|
b.
|
ISO
5321
|
d.
|
ISO
17025
|
18. The NIST project that has as a goal to
collect all known hash values for commercial software applications and OS files
is ____.
|
a.
|
NSRL
|
c.
|
FS-TST
|
|
b.
|
CFTT
|
d.
|
PARTAB
|
19. The primary hash algorithm used by the NSRL
project is ____.
|
a.
|
MD5
|
c.
|
CRC-32
|
|
b.
|
SHA-1
|
d.
|
RC4
|
20. One way to compare your results and verify
your new forensic tool is by using a ____, such as HexWorkshop, or WinHex.
|
a.
|
disk
imager
|
c.
|
bit-stream
copier
|
|
b.
|
write-blocker
|
d.
|
disk
editor
|
21. Although a disk editor gives you the most
flexibility in ____, it might not be capable of examining a ____ file’s
contents.
|
a.
|
testing,
compressed
|
c.
|
testing,
pdf
|
|
b.
|
scanning,
text
|
d.
|
testing,
doc
|
COMPLETION
1. Software forensic tools are grouped into
command-line applications and ____________________ applications.
2. The Windows application of EnCase requires
a(n) ____________________ device, such as FastBloc, to prevent Windows from
accessing and corrupting a suspect disk drive.
3. The ____________________ function is the most
demanding of all tasks for computer investigators to master.
4. Because there are a number of different
versions of UNIX and Linux, these platforms are referred to as
____________________ platforms.
5. Hardware manufacturers have designed most
computer components to last about ____________________ months between failures.
MATCHING
Download WinHex Portable very nice
ReplyDelete