Exam 9: Computer Forensics Analysis and Validation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The AccessData program has a hashing database, ________________, which is available only with FTK, and can be used to filter known program files from view and contains the hash values of known illegal files.​

(Multiple Choice)
4.7/5
(37)

Match the following terms with the correct definitions below:? -?The pnrocess of shifting one or more digits in a binary number to the left or right to produce a different value.

(Multiple Choice)
4.7/5
(31)

Many commercial encryption programs use a technology called _____________, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.​

(Multiple Choice)
4.9/5
(50)

Match the following terms with the correct definitions below:? -?In steganalysis, the file containing the hidden message.

(Multiple Choice)
4.7/5
(30)

Explain what a digital watermark is and how it's used with data.

(Essay)
4.9/5
(34)

​Select the tool below that does not use dictionary attacks or brute force attacks to crack passwords:

(Multiple Choice)
4.9/5
(34)

In addition to steganography, _____________________ was developed as a way to protect file ownership.​

(Short Answer)
4.8/5
(38)

Match the following terms with the correct definitions below:? -?In steganalysis, the original file with no hidden message.

(Multiple Choice)
4.8/5
(34)

The term for detecting and analyzing steganography files is _________________.​

(Multiple Choice)
4.8/5
(28)

​In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.

(Multiple Choice)
4.9/5
(41)

Match the following terms with the correct definitions below:? -?A cryptographic technique for embedding information in another file for the purpose of hiding the information from casual observers.

(Multiple Choice)
4.8/5
(28)

​List and explain the five steganalysis methods described by Neil F. Johnson and Sushil Jajodia.

(Essay)
4.8/5
(38)

​In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?

(Multiple Choice)
4.8/5
(31)

Because attorneys do not have the right of full discovery of digital evidence, it is not possible for new evidence to come to light while complying with a defense request for full discovery.​

(True/False)
4.7/5
(46)

In private sector cases, like criminal and civil cases, the scope is always defined by a search warrant.​

(True/False)
4.7/5
(36)

​Within Windows Vista and later, partition gaps are _____________ bytes in length.

(Multiple Choice)
4.8/5
(38)

The _______________________ maintains a national database of updated file hash values for a variety of OSs, applications, and images, but does not list hash values of known illegal files.​

(Multiple Choice)
4.7/5
(38)

The advantage of recording hash values is that you can determine whether data has changed.​

(True/False)
4.9/5
(34)

Which of the following file systems can't be analyzed by OSForensics?

(Multiple Choice)
4.8/5
(38)

Describe the process of block-wise hashing.​

(Essay)
4.9/5
(38)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)