Chapter 18 - Computer Forensics Flashcards

(88 cards)

1
Q

Computer forensics involves the

A

Preserving; acquiring; extracting; analyzing; interpreting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Hardware comprises the physical components of the computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is a set of instructions compiled into a program that performs a particular task.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(ROM, RAM) chips store programs used to start the boot process.

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The term used to describe the chassis, including the motherboard and any other internal components of a personal computer, is

A

System unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: The motherboard is a complex network of wires that carry data from one hardware device to another.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: The first thing you should do when you encounter a computer system in a forensic investigation is to connect the power supply and boot the system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAM is referred to as “volatile memory” because it is not

A

Permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The “brain” of the computer is referred to as the

A

Central processing unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _____ is the primary component of storage in a personal computer.

A

Hard disk drive (HDD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Personal computers typically communicate with each other through a(n)

A

Network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The computer’s _____ permits the user to manage files and applications.

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hard drive’s partitions are typically divided into

A

Sectors; clusters; tracks; cylinders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A(n) _____ is a single one or zero in the binary system and the smallest term in the language of computers.

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) _____ is a group of eight bits.

A

Byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A group of sectors, always units in multiples of two, is called a(n)

A

Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An exact duplicate of the entire contents of a hard disk drive is known as a(n)

A

Forensic image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

All data readily available to a computer user is known as

A

Visable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A(n) _____ file is created when data is moved from RAM to the hard disk drive to conserve space.

A

Swap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Most programs automatically save a copy of a file being worked on into a(n)

A

Temporary file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The existence of _____ data is why a forensic image of the media is created.

A

Latent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The smallest unit of addressable space on a hard disk drive is the

A

Sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The two types of slack space are

A

RAM; file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_____ slack is the area from the end of the data portion of the file to the end of the sector.

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The portion of a disk that does not contain stored data is called
Unallocated space
26
True or False: Defragmenting a hard disk drive involves moving noncontiguous data back together.
True
27
True or False: A portion of a “deleted” file may be found in a computer’s unallocated space.
True
28
A(n) _____ takes the form of a series of numbers to route data to an appropriate location on the Internet.
IP address
29
A user’s hard disk drive will _____ portions of Web pages that have been visited.
Cache
30
A(n) _____ is placed on a hard disk drive by a website to track certain information about its visitors.
Cookie
31
E-mails have the _____ address of the sender in the header portion of the e-mail.
IP
32
True or False: Chat and instant messages conducted over the Internet are typically stored in RAM storage.
True
33
When investigating a hacking incident, investigators concentrate their efforts on three locations:
Logfiles; volatile memory; network traffic
34
Devices that permit only requested traffic to enter a computer system are known as
Firewalls
35
A(n) _____ is a device that can prevent a mobile phone from communicating with a service provider.
Faraday shield
36
True or False: Extracting and analyzing data from mobile devices is complicated because manufacturers of these devices store and manage data in a variety of ways.
True
37
Define hardware:
The physical components of a computer (what you can touch)
38
Define software:
A set of instructions compiled into a program that performs a particular task
39
List the 4 operating systems:
Windows, Mac OS, Linux, Unix
40
Define chassis:
The full upright tower, box, or backbone for the fixed computer components.
41
Define power supply:
converted power from the wall outlet to a usable format for the computer and its components.
42
Motherboard:
The main circuit board where all the different components are connected too.
43
Define System Bus:
A vast complex network of wires that carry data from one hardware device to another.
44
Define firmware:
program used to start the boot process and configure a computer's components.
45
what is BIOS:
basic input-output system
46
What is the central processing unit or CPU?
The main chip, processor, or brain of the computer.
47
What is random-access memory or RAM?
The volatile memory of a computer, where in use programs are stored.
48
What are input devices and provide three examples.
Used to get data or instructions into the computer. i.e. keyboard, mouse, scanner.
49
What are output devices and provide three examples.
equipment through which data is obtained from the computer, i.e. monitor, printer, speakers.
50
What is the hard disk drive or HDD?
the primary component of storage in the personal computer, storing the operating system, programs, and data files.
51
Define operating system or OS
The software that provides the bridge between the system hardware and the user
52
Define partition:
A contiguous set of blocks that are defined and treated as an independent disk on a HDD. (If the HDD is the kitchen, the partitions are the cabinets, the kitchenware is the data)
53
Define file system:
the system for storing, locating, retrieving, and allocating data on a storage device.
54
What are the three ways the HDD is prepared?
low-level formatting (manufacturer settings) partitioning (prepped by fdisk/disk-manager) formatting (creating the file system structure)
55
What is a sector?
The smallest addressable unit of data by a HDD holding 512 bytes. (The element in the cyberspace)
56
What is a byte?
A group of eight bits (The atom in cyberspace)
57
What is a bit?
A "binary digit" taking the form of either a one or a zero. (The subatomic particle in cyberspace).
58
What is a cluster?
A group of sectors in multiples of two. (compounds in the cyberspace)
59
What is a MD5/SHA?
a software algorithm used to "fingerprint" a file or contents of a disk. (message digest 5 / Secure Hash Algorithm)
60
Define visible data:
All data that the OS is presently aware of and thus is readily accessible to the user.
61
What is a swap file?
A place on the HDD to store "idling" data that's on the RAM to free up space until the user gives it attention again.
62
What is a temporary file?
A temporary "back up" copy of a file being worked on that is periodically saving the data.
63
What is a print spool file?
A type of temporary file that delays the sending of data to the printer so that the application can continue while the printing takes place in the background.
64
Define latent data:
areas of files and disks that are typically not apparent to the computer user but contain data nonetheless.
65
What is slack space?
Empty space on a HDD created because of the way HDD stores files.
66
What is file slack?
area that begins at the end of the last sector that contains logical data and terminates at the end of the cluster.
67
What is the minimum amount of space the HDD can address?
512-byte sector
68
Define unallocated space:
The unused area of the HDD that the OS file system table sees as empty.
69
Define Internet cashe:
Portions of visited web pages placed on the local HDD to facilitate quicker retrieval when the Web page is revisited.
70
Define cookies:
Files placed on a computer from a visited website that are used to track visits to and usage of that site.
71
What is internet history?
an accounting of websites visited
72
What are bookmarks?
A feature that enables the user to designate favorite sites for fast and easy access.
73
What is an IP address?
Internet Protocol address (a computers social security number)
74
What is hacking?
performing an unauthorized computer or network intrusion.
75
Define firewall:
Hardware or software designed to protect intrusions into an internet network.
76
77
What is the first thing a crime-scene investigator should do when encountering computer forensic evidence?
Procure a warrant to search
78
What is the ultimate goal of obtaining an image of a hard disk drive?
To obtain information without altering the drive in any way
79
What is one of the most common places to begin searching for evidential data?
Word-processing or text-based document files
80
Which of the following is the best definition of latent data?
Those data that are hidden from view
81
One gigabyte equals what?
1,000 megabytes (MB)
82
what software algorithm is used to create a "fingerprint" of a file or an entire hard disk drive (HDD)?
MD5
83
What keeps track of the location of files and folders on the HDD?
The FAT (file allocation table)
84
When is it necessary to make a "fingerprint" of an HDD?
Before and after imaging its contents
85
What does URL stand for?
Uniform resource locator
86
What do most web browsers use to expedite and streamline browsing?
Caching system
87
What three things are potential sources for forensic evidence from a suspect's personal computer?
Cache, Internet history, Internet "cookies"
88
Unauthorized intrusion into a computer is called what?
Hacking