Digital Forensics Q&A: Key Terms and Core Concepts
Digital Forensics Q&A
Which of the following is the best definition of “forensics”?✅ The process of using scientific knowledge for collecting, analyzing, and presenting digital computer evidence to the courts
One must be able to show the whereabouts and custody of evidence, and how it was handled and stored and by whom, from the time the evidence is first seized by a law enforcement officer or civilian investigator until the moment it is shown in court. What standard does this refer to?✅ Chain of custody
Ed is an expert witness providing testimony in court. He uses a high-tech computer animation to explain a technical concept to the judge and jury. What type of evidence is Ed using?✅ Demonstrative
Which of the following is not true of computer forensics?✅ The emphasis is on the volume of evidence.
The __________ was passed to improve the security and privacy of sensitive information in federal computer systems.✅ Computer Security Act of 1987
__________ is the concept that any scientific evidence presented in a trial has to have been reviewed and tested by the relevant scientific community.✅ The Daubert Standard
________ is the default file system for Apple computers using macOS 10.x.✅ APFS
What term describes information that forensic specialists use to support or interpret real or documentary evidence?✅ Digital evidence
________ is a computer’s physical address.✅ A MAC address
Which of the following is the process of examining data traffic, including transaction logs and real-time monitoring using sniffers and tracing?✅ Network forensics
The __________ is a federal wiretap law for traditional wired telephony that was expanded to include wireless, Voice over Internet Protocol (VoIP), and other forms of electronic communications.✅ Communications Assistance for Law Enforcement Act of 1994
Which of the following is the process of searching memory in real time, typically for working with compromised hosts or to identify system abuse?✅ Live system forensics
__________ is information that has been processed and assembled to be relevant to an investigation and that supports a specific finding or determination.✅ Digital evidence
Which of the following is not true of random access memory (RAM)?✅ It cannot be changed.
Tonya is an attorney. She is preparing evidence to be presented in a court trial. Her exhibits include several photographs, printouts of email messages, and printouts of text messages. What type of evidence is Tonya preparing?✅ Documentary evidence
A computer crime suspect stores data where an investigator is unlikely to find it. What is this technique called?✅ Data hiding
Alice is a computer hacker. She is attempting to cover her tracks by repeatedly overwriting a cluster of data on a hard disk with patterns of 1s and 0s. What general term describes Alice’s actions?✅ Anti-forensics
__________ is the continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered.✅ The chain of custody
Arturo is a forensic investigator. He is working on a digital forensic case that involves tracking down evidence and perpetrators in the United States, Russia, and Italy. He must coordinate with local, state, and national governments, as well as international agencies, in each country. What type of scope-related challenge is being described?✅ Distributed crime scene
Assume you run the __________ command on a computer. The command displays the computer’s Internet Protocol (IP) address, the IP address for the default gateway, and more information.✅ ipconfig
What is the name of a type of targeted phishing attack in which the criminal targets a high-value target, such as a senior company executive?✅ Whaling
_______ is defined as any attempt to gain financial reward through deception.✅ Fraud
The use of electronic communications to harass or threaten another person is the definition of:✅ Cyberstalking
Dean is interested in purchasing picture editing software… the site is known for selling illegal copies of applications. What type of cybercrime is the company likely committing?✅ Data piracy
Malware designed to do harm to a system when some logical condition is reached, often triggered on a specific date and time, is called a:✅ Logic bomb
Bill receives an urgent email that appears to be from his CFO, requesting a funds transfer to a personal account. What type of attack is likely underway?✅ Phishing
The main purpose of __________ is to prevent legitimate users from being able to access a given computer resource.✅ A denial of service (DoS) attack
With respect to phishing, a high-quality fictitious email that is intended to steal personal data to conduct identity theft will often leave evidence in what IT system?✅ Email server
The attacker’s goal when executing a denial of service (DoS) attack is to:✅ Render the target system unusable
What is the definition of a computer virus?✅ Any software that self-replicates
Most often, criminals commit __________ to perpetrate some kind of financial fraud.✅ Identity theft
Windows passwords are hashed and then stored in the __________ on the local machine.✅ SAM file
_________ is a method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain character space.✅ Rainbow table
What is meant by distributed denial of service (DDoS) attack?✅ An attack in which the attacker seeks to infect several machines and use those machines to overwhelm the target system to achieve a denial of service
Which of the following are subclasses of fraud?✅ Investment offers and data piracy
Aditya is a digital forensics specialist… Which of the following is an attack vector that cannot be investigated on the victim’s machine?✅ Dumpster diving
Which of the following is not true of cyberstalking?✅ Stalkers are often technically savvy computer criminals.
Which of the following is a denial of service (DoS) attack that includes both Internet Protocol (IP) spoofing and Internet Control Message Protocol (ICMP), resulting in saturating a target with network traffic?✅ Smurf attack
How is cyberterrorism different from other cybercrimes?✅ It is investigated by federal law enforcement.
Attackers leveraging Structured Query Language (SQL) injection can be thwarted using proper programming techniques that:✅ Disallow the use of additional characters to “escape” an application reading them as text and instead process them as an instruction.
_______ is an industry certification that focuses on knowledge of PC hardware.✅ CompTIA A+
__________ sets standards for digital evidence processing, analysis, and diagnostics.✅ The DoD Cyber Crime Center (DC3)
_______ is the unused space between the logical end of a file and the physical end of a file.✅ File slack
__________ is a Linux Live CD that you use to boot a system and then use the tools. It is a free Linux distribution, making it attractive to schools teaching forensics or laboratories on a strict budget.✅ The Sleuth Kit
What document’s sole purpose is to detail a person’s experience and qualifications for a position?✅ Curriculum vitae (CV)
Forensic investigators who collect data as evidence must understand the __________ of information, which refers to how long it is valid.✅ Slack space
Tonya is entering the digital forensics field and wants to pursue a general forensics certification. Which certification is best to start with?✅ EC-Council Certified Hacking Forensic Investigator (CHFI)
__________ is information at the level of 1s and 0s stored in computer memory or on a storage device.✅ Bit-level information
Arturo is contacted to extract data from a Mac OS system. What is the best approach he should take?✅ Do not accept the assignment and recommend that the computer be brought to an expert with Mac OS experience.
When gathering systems evidence, what is not a common principle?✅ Trust only virtual evidence.
__________ govern whether, when, how, and why proof of a legal case can be placed before a judge or jury.✅ The rules of evidence
__________ holds that you cannot interact in an environment without altering it in some way, without leaving some trace.✅ Locard’s principle of transference
Use of __________ enables an investigator to reconstruct file fragments if files have been deleted or overwritten.✅ Bit-level tools
One principle of evidence gathering is to avoid changing the evidence. Which of the following steps will not help you avoid changing evidence?✅ Photograph seized equipment after you set it up in the lab.
As a forensic investigator, you should develop _________, which covers how you will gather evidence and which tools are most appropriate for a specific investigation.✅ An analysis plan
Which of the following is produced by a nonprofit volunteer organization whose goal is to enhance the sharing of knowledge and ideas about digital forensics research?✅ Digital Forensic Research Workshop (DFRWS) framework
Which of the following best defines an expert report?✅ A formal document prepared by a forensics specialist to document an investigation, including a list of all tests conducted as well as the specialist’s own curriculum vitae (CV).
According to the order of volatility in RFC 3227, what evidence should you collect first on a typical system?✅ Volatile data, then file slack
A system forensics specialist has three basic tasks related to handling evidence: find evidence, preserve evidence, and __________ evidence.✅ Prepare
Which forensic certification is open to both the public and private sectors and is specific to the use and mastery of FTK?✅ AccessData Certified Examiner
What disk drive feature is most important for forensic consideration?✅ Good blocks marked as bad
Which of the following is the best description of volatile data?✅ Data that is lost when the system is used, such as the swap file and state of network connections
Justin is investigating a digital forensic case… What file should Justin analyze to collect data from the swap file?✅ pagefile.sys
There are three specific steps to follow to handle computer evidence. The first step is to ______ the evidence, followed by _______ the evidence, and finally ________ the evidence.✅ Preserve, prepare, present
What version of RAID involves three or more striped disks with parity that protect data against the loss of any one disk?✅ RAID 3 or 4
What was designed as an area where computer vendors could store data that is shielded from user activities and operating system utilities, such as delete and format?✅ Host protected area (HPA)
Jiang is a forensic specialist… What did Jiang do wrong?✅ He left the computer unattended while shopping for supplies.
Hard drives are types of magnetic media that use high and low magnetization to store data on these devices, which is organized by:✅ Sectors and clusters
Mary attempts to take a physical image of a phone but instead takes a logical image. What type of data is likely missing?✅ Deleted files
What is the definition of “hash”?✅ A function that is nonreversible, takes variable-length input, produces fixed-length output, and has few or no collisions
_______ is an example of volatile data.✅ The state of network connections
Joey is investigating an employer-owned computer that is still running. What is the correct course of action?✅ Capture the current memory, running tasks, and live connections, and then shut the computer down.
_______ is the area of a hard drive that has not been allocated for file storage.✅ Unallocated space
What is the name of the unused space that is created between the end of a file and the end of the last data cluster assigned to the file?✅ File slack
Which of the following are attributes of a solid-state drive (SSD)?✅ Flash memory and fast startup time
Devaki is starting a new job as a forensic processor. What should she do before starting the process of removing a hard drive?✅ She should review the processes used by the police precinct to be sure she is using the correct forms and taking the required pictures.
Which of the following uses microchips that retain data in nonvolatile memory chips and contains no moving parts?✅ Solid-state drive (SSD)
What kind of data changes rapidly and may be lost when the machine that holds it is powered down?✅ Volatile data
Windows uses __________ on each system as a “scratch pad” to write data when additional random access memory (RAM) is needed.✅ A swap file
Isabella is about to start a forensic investigation on a disk drive… To prepare a disk drive to be used as the target for the image, she must first:✅ Forensically wipe the target drive by overwriting every single bit on the drive.
What is the definition of “stream cipher”?✅ A form of cryptography that encrypts the data as a stream, one bit at a time
When hiding a message in a video file, what method takes advantage of an image capable of storing colors in 24 bits to increase the storage area for the payload?✅ BPCS
Kerckhoffs’ principle states that the security of a cryptographic algorithm depends only on the secrecy of:✅ The key
What is the definition of “Kasiski examination”?✅ A method of attacking polyalphabetic substitution ciphers, such as the Vigenère cipher
In RSA, after multiplying two prime numbers to get n, the next step is to multiply __________ for each of these primes.✅ Euler’s Totient
Regarding the RSA algorithm, __________ describes the total number of coprime numbers; two numbers are considered coprime if they have no common factors.✅ Euler’s Totient
The type of medium used to hide data in steganography is referred to as __________.✅ The channel
You have a group of ciphertexts and will consider your efforts a success if you can obtain any information about the underlying plaintext. What cryptographic cracking method are you using?✅ Ciphertext-only
A cybercriminal wants to deliver steganized files to covert customers on a third-party cache. What method must be used so that the third party is unaware?✅ Dead drops
__________ is an asymmetric cryptographic protocol that allows two parties to establish a shared key over an insecure channel.✅ Diffie-Hellman
Although the Data Encryption Standard (DES) algorithm is sound, it is no longer considered secure because:✅ Of its small key size
_______ is the process of analyzing a file or files for hidden content.✅ Steganalysis
The Caesar cipher involves shifting letters. What does a shift of -4 mean?✅ Shifting 4 letters to the left
The form of symmetric cryptography involving changing some part of the plaintext is called:✅ Substitution
In World War II, the Germans made use of _________, which is an electromechanical rotor-based cipher system.✅ The Enigma machine
In steganography, what is meant by “carrier”?✅ The signal, stream, or data file in which the payload is hidden
Which of the following is not true of the Feistel function?✅ This function forms the basis for many stream ciphers.
What is the definition of “transposition” in terms of cryptography?✅ The swapping of blocks of ciphertext
What term describes a method of using techniques other than brute force to derive an encryption key?✅ Cryptanalysis
The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected based on the letters of a keyword.✅ Vigenère
Consistency checking protects against:✅ Software bugs and storage hardware design compatibilities
In FAT and NTFS file systems, a __________ is used to map files to specific clusters where they are stored on the disk.✅ Table
What is the purpose of overwriting data on a hard disk with random characters seven times?✅ To forensically scrub a file or folder
You are unable to boot a damaged hard disk and choose to perform a zero-knowledge analysis. Is this appropriate?✅ Yes — it rebuilds the file system from scratch using knowledge of an undamaged structure, allowing data retrieval.
When attempting to recover deleted files from FAT32, what is the most important advantage?✅ Time — files deleted recently are more likely to be recovered
Paige connects a failed hard drive to a test system without installing it. What should she do next?✅ Determine whether the failed drive is recognized and can be installed as an additional disk on the test system
A symbolic link is ________ another file.✅ A pointer to
Which of the following is not true of file carving?✅ You can perform file carving on the NTFS and FAT32 file systems but not Ext4
________ is the preferred file system of Windows 2000 and later.✅ NTFS
Which operating system commonly uses the Ext file system?✅ Linux
After a power outage, Windows no longer boots past the loading screen. What type of damage likely occurred?✅ Logical damage
If a hard disk is damaged and the data is deemed “lost,” what is the recommended next step?✅ Shred the hard disk
The ________ and the ________ are the two NTFS files of most interest to forensics efforts.✅ Master File Table (MFT) and cluster bitmap
A(n) __________ is a data structure in the Linux file system that stores all file information except its name and actual data.✅ Inode
_______ is the basic repair tool in Windows.✅ Chkdsk
You recover data files from a damaged disk but they’re corrupted. What should you do?✅ Perform file carving
Devaki processed a damaged hard drive as “lost” without testing recovery options. What mistake did she make?✅ She should have fully evaluated the disk by leveraging multiple techniques to attempt data retrieval.
_______ is the basic repair tool in Mac OS.✅ Disk Utility
When performing a manual recovery on a Linux system, what is the first step?✅ Boot into the recovery menu and select to run diagnostics
In Windows, what does the File Allocation Table (FAT) store?✅ The mapping between files and their cluster location on the hard drive
The amount of time a system can be down before it is impossible for an organization to recover is addressed by:✅ Maximum tolerable downtime (MTD).
__________ is a common method for scoring system vulnerabilities.✅ Damage Potential, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)
Regarding incident response, what step involves restoring software and data from a backup source that has been verified to be free from malware infection?✅ Recovery
What is the definition of business continuity plan (BCP)?✅ A plan for maintaining minimal operations until the business can return to full normal operations
In a business impact analysis, which of the following best describes the recovery time objective (RTO)?✅ The target time to have a down system back up and running
You are performing a business impact analysis (BIA). How do you calculate the single loss expectancy (SLE)?✅ By multiplying the asset value (AV) times the exposure factor (EF)
You are considering hierarchical storage management (HSM) rather than traditional tape media. What is an advantage of HSM?✅ It has far more storage capacity than traditional tape media.
Which of the following is helpful in tracing the root cause of an incident and involves depiction of something resembling a fish head and fish bones?✅ Ishikawa diagram
The manufacturer claims a hard drive will perform properly for 100,000 hours. What is this measure most closely related to?✅ Mean time to failure (MTTF)
A ________ is a plan for returning the business to full normal operations.✅ Disaster recovery plan (DRP)
The process whereby a disaster recovery team contemplates likely disasters and the impact each would have on an organization is called:✅ A business impact analysis.
In a business impact analysis, which of the following refers to how much data will be lost in a computer disaster?✅ RPO
You are preparing to add forensics to your incident response policies. Which is the absolute first step you must take?✅ Identify forensic resources.
Which of the following is not true of the Grandfather-Father-Son backup scheme?✅ Weekly backups are not reused, only sons and grandfathers.
A computer worm has used open file shares to infect hundreds of systems. What is this an example of?✅ Malicious code
Companies that process payment card data must issue a report if a breach violates which of the following?✅ PCI DSS
An organization cannot operate without its web server for more than 5 days and still recover. The mean time to repair is 3 days. How many days do you have after a disaster to initiate repairs or the organization will not be able to recover?✅ 2
You are calculating the single loss expectancy (SLE) for a laptop costing $2,500 with an exposure factor of 25%. What is the SLE?✅ $625
NIST Special Publication 800-61 considers denial of service as:✅ An attacker crafting packets to cause networks and/or computers to crash.
What type of disaster is most likely to require a computer forensic expert?✅ Intrusion
