Exam 6: Current Computer Forensics Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each term with its definition: -A project sponsored by the National Institute of Standards and Technology to manage research on digital forensics tools?

(Multiple Choice)
4.9/5
(38)

Which of the following options is not a subfunction of extraction?​

(Multiple Choice)
4.8/5
(41)

Match each term with its definition: -The process of trying every combination of characters--letters, numbers, and special characters typically found on a keyboard-- to find a matching password or passphrase value for an encrypted file?

(Multiple Choice)
4.9/5
(37)

What guidelines exist for the selection and use of forensics software? Name at least three.

(Essay)
4.9/5
(42)

​List the five (5) categories of functions that are meant as guidelines for evaluating digital forensic tools, with subfunctions for refining data analysis and recovery and ensuring data quality.​

(Essay)
4.8/5
(38)

Match each term with its definition: -A method of finding files or other information by entering relevant characters, words, or phrases in a search tool?

(Multiple Choice)
4.9/5
(29)

In what temporary location below might passwords be stored? ​

(Multiple Choice)
4.9/5
(35)

​What algorithm is used to decompress Windows files?

(Multiple Choice)
4.8/5
(42)

​Describe two methods for filtering data- separating good data from suspicious data.

(Essay)
4.8/5
(35)

Making a logical acquisition of a drive with whole disk encryption can result in unreadable files.​

(True/False)
4.8/5
(30)

What is the goal of the NSRL project, created by NIST?​

(Multiple Choice)
4.8/5
(27)

All forensics acquisition tools have a method for verification of the data-copying process that compares the original drive ​with the image.

(True/False)
4.9/5
(37)

What program serves as the GUI front end for accessing Sleuth Kit's tools?​

(Multiple Choice)
4.7/5
(38)

Match each term with its definition: -The process of creating a duplicate image of data; one of the required functions of digital forensics tools?

(Multiple Choice)
4.8/5
(41)

Match each term with its definition: -The process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools.?

(Multiple Choice)
5.0/5
(40)

Passwords are typically stored as one-way _____________ rather than in plaintext.​

(Multiple Choice)
4.8/5
(42)

The purpose of having a ______________ function in a forensics tool is to re-create a suspect drive to show what happened during a crime or incident.​

(Short Answer)
4.9/5
(38)

Match each term with its definition: -A NIST project with the goal of collecting all known hash values for commercial software and OS files?

(Multiple Choice)
4.9/5
(43)

In general, what would a lightweight forensics workstation consist of?​

(Multiple Choice)
4.8/5
(31)

Name at least four subfunctions of the extraction function that are used in forensics investigations.

(Essay)
4.9/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)