Exam 5: Working With Windows and Cli Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each term with the correct definition below: -?Concentric circles on a disk platter where data is stored.

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

E

​What does the $Secure metadata file contain?

Free
(Essay)
4.9/5
(34)
Correct Answer:
Verified

It contains unique security descriptors for the volume. Access Control List (ACL) information for all files and folders on the NTFS volume is stored here.​

When Microsoft introduced Windows 2000, it added optional built-in encryption to NTFS called ​Encrypting File System (EFS)​. Explain how EFS works.​

Free
(Essay)
5.0/5
(39)
Correct Answer:
Verified

Encrypting File System (EFS) uses public key and private key methods of encrypting filed, folders, or disk volumes (partitions). Only the owner or user who encrypted the data can access encrypted files. The owner holds the private key, and the public key is held by a certification authority, such as global registry, network server, or company such as VeriSign.​

Describe the three current versions of FAT.

(Essay)
4.9/5
(40)

Match each term with the correct definition below: -?The device that reads and writes data to a disk drive.

(Multiple Choice)
4.7/5
(34)

What does the MFT header field at offset 0x00 contain?

(Multiple Choice)
4.9/5
(38)

With the release of Windows Server 2012, Microsoft created a new file system: ​Resilient File System (ReFS)​. State the features that are incorporated into ReFS's design.​

(Essay)
4.8/5
(45)

Which of the following commands ​creates an alternate data stream?

(Multiple Choice)
4.8/5
(37)

Describe both ways in which file or folder information is typically stored in an MFT record.​

(Essay)
4.7/5
(42)

What hexadecimal code below identifies an NTFS file system in the partition table??

(Multiple Choice)
4.9/5
(41)

Someone who wants to hide data can create hidden partitions or voids- large unused gaps between partitions on a disk drive. Data that is hidden in partition gaps cannot be retrieved by forensics utilities.

(True/False)
4.8/5
(35)

​What registry file contains user account management and security settings?

(Multiple Choice)
4.8/5
(41)

The purpose of a ______________ is to provide a mechanism for recovering files encrypted with EFS if there's a problem with the user's original private key.​

(Short Answer)
4.8/5
(35)

A computer stores system configuration and date and time information in the BIOS when power to the system is off.​

(True/False)
4.8/5
(44)

Each MFT record starts with a header identifying it as a resident or nonresident attribute.​

(True/False)
5.0/5
(32)

FAT32 is used on older Microsoft OSs, such as MS-DOS 3.0 through 6.22, Windows 95 (first release), and Windows NT 3.3 and 4.0.​

(True/False)
4.8/5
(40)

​The ReFS storage engine uses a __________ sort method for fast access to large data sets.

(Multiple Choice)
4.8/5
(45)

What is a partition gap, and how might it be used to hide data?​

(Essay)
4.7/5
(37)

When data is deleted on a hard drive, only references to it are removed, which leaves the original data on unallocated disk space.​

(True/False)
4.8/5
(31)

The ___________ command inserts a HEX E5 (0xE5) in a filename's first letter position in the associated directory entry.​

(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)