When confronted with an e-mail server that no longer contains a log with the date information you need for your investigation, and the client has deleted the e-mail, what should you do
a. Search available log files for any forwarded messages
b. Restore the e-mail server from a backup
c. Check the current database files for an existing copy of the email
d. Do nothing because after the file has been deleted, it can no longer be recovered.
a. Disabled by the administrator
b. Set up in a circular logging configuration
c. Configured to a specified size before being overwritten
d. All of the above
To trace an IP address in an email header, what type of lookup service can you use (Choose all that apply)
a. Intelius Inc's AnyWho online directory
b. Verizon's http://superpages.com
c. A Domain lookup service, such as www.arin.net, www.internic.com.,or ww.whois.net
d. Any Web search engine
When searching a victim's computer for a crime committed with a specific email, what provides information for determining the emails originator (Choose all that apply)
a. E-mail header
b. Username and password
c. Firewall log
d. All of the above
a. E-mail header
E-mail headers contain which of the following information (Choose all that apply.)
a. The sender and receiver e-mail address
b. An ESMTP number or reference number
c. The e-mail servers the message traveled through to reach its destination
d. The IP address of the receiving server
e. All of the above
The ___ tool is an updated version of BackTrack, and contains more than 300 tools, such as password crackers, network sniffers, and freeware forensics tools
a. Kali Linux
b. Ubuntu
c. OSForensics
d. Sleuth Kit
The ___ command line program is a common way of examining network traffic, which provides records of network activity while it is running, and produce hundreds of thousands of records.
When do zero day attacks occur (Choose all that apply)
a. On the day the application or OS is released
b. Before a patch is available
c. Before the vendor is aware of the vulnerability
d. On the day the patch is created
The _______________________ maintains a national database of updated file hash values for a variety of OSs, applications, and images, but does not list hash values of known illegal files.
a. Open Hash Database
b. HashKeeper Online
c. National Hashed Software Referenced.
d. National Software Reference Library
The AccessData program has a hashing database, ________________, which is available only with FTK, and can be used to filter known program files from view and contains the hash values of known illegal files.
a. DeepScan Filter
b. Unknown File Filter (UFF)
c. Known File Filter (KFF)
d. FTK Hash Imager
When performing a static acquisition, what should be done after the hardware on a suspect's computer has been inventoried and documented
a. Inventory and documentation information should be stored on a drive and then the drive should be reformatted.
b. Start the suspect's computer and begin collecting evidence.
c. The hard drive should be removed, if practical, and the system's date and time values should be recorded from the system's CMOS.
d. Connect the suspect's computer to the local network so that up to date forensics utilities can be utilized.
Many commercial encryption programs use a technology called _____________, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.
a. key vault
b. key escrow
c. bump key
d. master key
A user with programming experience may use an assembler program (also called a __________ ) on a file to scramble bits, in order to secure the information contained inside.
Typically, anti-virus tools run hashes on potential malware files, but some advanced malware uses ________________ as a way to hide its malicious code from antivirus tools.
a. hashing
b. bit-shifting
c. registry edits
d. slack space
The goal of recovering as much information as possible can result in ________________, in which an investigation expands beyond the original description because of unexpected evidence found.
a. litigation
b. scope creep
c. criminal charges
d. violations
True/False One of the most critical aspects of digital forensics is validating digital evidence because ensuring the integrity of data you collect is essential for presenting evidence in court.
True/False Because attorneys do not have the right of full discovery of digital evidence, it is not possible for new evidence to come to light while complying with a defense request for full discovery.
You're using Disk Manager to view primary and extended partitions on a subjects drive. The program reports the extended partitions total size as larger than the sum of the sizes of logical partitions in this extended partition. What might you infer from this information.
Suppose you're investigating an e-mail harassment case. Generally, is collecting evidence for this type of case easier for an internal corporate investigation or a criminal investigation
a. Criminal investigation because subpoenas can be issued to acquire any needed evidence quickly.
b. Criminal investigation because law enforcement agencies have more resources at their disposal
c. Internal corporate investigation because corporate investigators typically have ready access to company records.
d. Internal corporate investigation because ISPs almost always turn over email and access logs when requested by a large corporation
The Known File Filter (KFF) can be used for which of the following purposes (Choose all that apply)
a. Filter known program file from view
b. Calculate hash values of image files
c. Compare hash values of known files with evidence files
d. Filter out evidence that doesn't relate to our investigation
a. Filter known program file from view
For which of the following reasons should you wipe a target drive
a. To ensure the quality of digital evidence you acquire
b. To make sure unwanted data isn't retained on the drive
c. neither of the above
d. Both a and b
Which of the following represents known files you can eliminate from an investigation (Choose all that apply)
a. Any graphics files
b. Files associated with an application
c. System files the OS uses
d. Any files pertaining to the company
b. Files associated with an application