Exam 9: Computer Forensics Analysis and Validation
Describe some of the forensic processes involved in investigating an employee suspected of industrial espionage.
Before initiating this type of investigation, make sure the company, whether it's a private organization or a public agency, has set up rules of use and limitations of privacy rights. For these investigations, you might need to set up a surveillance camera to monitor the employee's activities in the office. You might also need to plant a software or hardware keylogger (for capturing keystrokes remotely), and you need to engage the network administrator's services to monitor Internet and network activities. In this situation, you might want to do a remote acquisition of the employee's drive, and then use another tool to determine what peripheral devices have been accessed.
Advanced hexadecimal editors offer many features not available in digital forensics tools, such as hashing specific files or sectors.
True
Describe what happens if a FAT partition containing bad cluster is converted to an NTFS partition, and how you miss evidence that's being hidden.
If a FAT partition containing clusters marked as bad is converted to an NTFS partition, the bad clusters remain marked as bad, so the conversion to NTFS doesn't affect the content of these clusters. Most GUI tools skip clusters marked as bad in FAT and NTFS, and these clusters might contain valuable evidence for an investigation.
What technique is designed to reduce or eliminate the possibility of a rainbow table being used to discover passwords?
Match the following terms with the correct definitions below:?
-?The result of an investigation expanding beyond its original description because the discovery of unexpected evidence increases the amount of work required.
The goal of recovering as much information as possible can result in ________________, in which an investigation expands beyond the original description because of unexpected evidence found.
A ____________ image file containing software is intended to be bit-stream copied to floppy disks or other external media.
In ProDiscover and other digital forensics tools, raw format image files (.dd extension) don't contain ________, so you must validate them manually to ensure the integrity of data.
What letter should be typed into DiskEdit in order to mark a good sector as bad?
Match the following terms with the correct definitions below:?
-?The process of hashing all sectors of a file and then comparing them with sectors on a suspect's disk drive to determine whether there are any remnants of the original file that couldn't be recovered.
The term _____________ comes from the Greek word for "hidden writing".
Match the following terms with the correct definitions below:?
-?A file containing the hash value for every possible password that can be generated from a computer's keyboard.
When performing a static acquisition, what should be done after the hardware on a suspect's computer has been inventoried and documented?
Examining and analyzing digital evidence depend on the nature of the investigation and the amount of data to process. Criminal investigations are limited to finding data defined in the search warrant, and _____ investigations are often limited by court orders for discovery.
Illustrate how an investigator would detect whether a suspect's drive contains hidden partitions.
Typically, anti-virus tools run hashes on potential malware files, but some advanced malware uses ________________ as a way to hide its malicious code from antivirus tools.
Match the following terms with the correct definitions below:?
-?A technology designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)