Shared Flashcard Set

Details

IS2370Exam2
n/a
89
Computer Science
Undergraduate 1
04/11/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Cylinder
Definition
is a column of tracks on two or more disk platters.
Term
ZBR is how most manufacturers deal with _______
Definition
a platter's inner tracks being shorter than its outer tracks.
Term
Real Density
Definition
the number of bits in one square inch of a disk platter.
Term
FAT
Definition
the file structure database that Microsoft originally designed for floppy disks.
Term
NTFS was introduced when _____
Definition
Microsoft created Windows NT and is the primary file system for Windows Vista.
Term
What is immediately after the Partition Boot Sector on an NTFS disk?
Definition
the MFT
Term
Metadata is
Definition
records in the MFT.
Term
In the NTFS MFT, all files and folders are
Definition
stored in separate records of 1024 bytes each.
Term
9. The file or folder’s MFT record provides cluster addresses where the file is stored on the drive’s partition. These cluster addresses are referred to as
Definition
Data Runs
Term
When Microsoft introduced Windows 2000, it added _______
Definition
built-in encryption to NTFS called EFS.
Term
The purpose of the recovery certificate is to _______
Definition
provide a mechanism for recovering encrypted files under EFS if there’s a problem with the user’s original private key.
Term
When Microsoft created Windows 95, it consolidated initialization (.ini) files into
Definition
the Registry.
Term
Boot.ini, located in the root folder of the system partition, specifies
Definition
the Windows XP path installation and contains options for selecting the Windows version.
Term
______ is a 16-bit real-mode program that queries the system for device and configuration data, and then passes its findings to NTLDR.
Definition
NTDetect.com
Term
NTBootdd.sys , located in the root folder of the system partition, is the device driver that allows
Definition
the OS to communicate with SCSI or ATA drives that aren’t related to the BIOS.
Term
Device drivers contain instructions for the OS for hardware devices, such as
Definition
the keyboard, mouse, and video card, and are stored in the %system-root%\Windows\System32\Drivers folder.
Term
Msdos.sys is
Definition
a hidden text file containing startup options for Windows 9x.
Term
The Command.com file provides a
Definition
command prompt when booting to MS-DOS mode (DPMI).
Term
Config.sys is a
Definition
text file containing commands that typically run only at system startup to enhance the computer’s DOS configuration.
Term
Autoexec.bat is
Definition
a batch file containing customized settings for MS-DOS that runs automatically.
Term
A virtual machine allows you to
Definition
create a representation of another computer on an existing physical computer.
Term
Computer forensics tools are divided into ____ major categories.
Definition
two
Term
Software forensics tools are commonly used to
Definition
copy data from a suspect’s disk drive to an image file.
Term
To make a disk acquisition with En.exe the requirements are:
Definition
only a PC running MS-DOS with a 12-volt power connector and an IDE, a SATA, or a SCSI connector cable.
Term
Raw data
Definition
is a direct copy of a disk drive. An example of a Raw image is output from the UNIX/Linux dd command.
Term
Discrimination of data involves
Definition
sorting and searching through all investigation data.
Term
Many password recovery tools have a feature that
Definition
allows generating potential lists for a password dictionary attack.
Term
The simplest method of duplicating a disk drive is
Definition
using a tool that does a direct disk-to-disk copy from the original disk to the target disk.
Term
To complete a forensic disk analysis and examination, you need to
Definition
create a report.
Term
The first tools that analyzed and extracted data from floppy disks and hard disks were
Definition
MS-DOS tools for IBM PC file systems.
Term
In Windows 2000 and XP, the ______ shows you the owner of a file if you have multiple users on the system or network.
Definition
Dir command
Term
forensics workstations can be divided into ___ categories.
Definition
3
Term
Portable workstation
Definition
is a forensics workstation consisting of a laptop computer with a built-in LCD monitor and almost as many bays and peripherals as a stationary workstation
Term
FIRE IDE is
Definition
a simple drive-imaging station.
Term
Write-blockers
Definition
can be software or hardware and are used to protect evidence disks by preventing you from writing any data to the evidence disk.
Term
Many vendors have developed _____ that connect to a computer through FireWire, USB 2.0,and SCSI controllers.
Definition
write-blocking devices
Term
What does NIST do?
Definition
publishes articles, provides tools, and creates procedures for testing and validating computer forensics software.
Term
The standards document, _____ demands accuracy for all aspects of the testing process, meaning that the results must be repeatable and reproducible.
Definition
ISO 5725
Term
NSRL
Definition
is 39. The NIST project that has as a goal to collect all known hash values for commercial software applications and OS files
Term
SHA-1
Definition
is the primary hash algorithm used by the NSRL.
Term
One way to compare your results and verify your new forensic tool is by ____
Definition
using a disk editor, such as HexWorkshop, or WinHex.
Term
Although a disk editor gives you the most flexibility in testing, it might not be capable of
Definition
examining a compressed file’s contents.
Term
There are ___ tracks available for the program area on a CD
Definition
99
Term
The Advanced SCSI Programming Interface (ASPI) provides
Definition
several software drivers that allow communication between the OS and the SCSI component.
Term
All Advanced Technology Attachment (ATA) drives from ATA-33 through ATA-133 IDE and EIDE disk drives use the standard
Definition
40-pin ribbon or shielded cable
Term
ATA-66, ATA-100, and ATA-133 can use the
Definition
newer 40-pin/80-wire cable
Term
IDE ATA controller on an old 486 PC doesn’t recognize disk drives larger than
Definition
8.4 GB
Term
Scope creep _____ needed to extract,analyze,and present evidence.
Definition
increases the time and resources
Term
You begin any computer forensics case by
Definition
creating an investigation plan.
Term
In civil and criminal cases, _____ is often defined by search warrants or subpoenas, which specify what data you can recover.
Definition
the scope
Term
There are ___ searching options for keywords which FTK offers
Definition
2
Term
____ can locate items such as text hidden in unallocated space that might not turn up in an indexed search.
Definition
live search
Term
The stemming search feature allows you to
Definition
look for words with extensions such as “ing,”“ed,” and so forth.
Term
In FTK indexed search mode, you can
Definition
also look for files that were accessed or changed during a certain time period
Term
FTK and other computer forensics programs use _______ to tag and document digital evidence.
Definition
bookmarks
Term
Getting a hash value with a hexadecimal editor is ______ with a computer forensics tool.
Definition
much faster and easier than
Term
Access Data KFF compares
Definition
known file hash values to files on your evidence drive or image files to see whether they contain suspicious data.
Term
Data hiding involves
Definition
changing or manipulating a file to conceal information.
Term
One way to hide partitions is to
Definition
create a partition on a disk, and then use a disk editor such as Norton DiskEdit to manually delete any reference to it.
Term
Marking bad clusters data-hiding technique is more common with
Definition
FAT file systems
Term
The term steganography comes from
Definition
the Greek word for“hidden writing.”
Term
Steganography is defined as
Definition
the art and science of hiding messages in such a way that only the intended recipient knows the message is there.
Term
Many commercial encryption programs use a technology called _____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system data failure.
Definition
key escrow
Term
People who want to hide data can also use
Definition
advanced encryption programs, such as PGP or BestCrypt.
Term
Password recovery is
Definition
a fairly easy task in computer forensic analysis
Term
Brute-force attacks
Definition
use every possible letter, number, and character found on a keyboard when cracking a password.
Term
Remote acquisitions are
Definition
handy when you need to image the drive of a computer far away from your location or when you don’t want a suspect to be aware of an ongoing investigation.
Term
HDHOST is a remote access program for
Definition
communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer’s file system.
Term
Vector graphics are based on
Definition
mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.
Term
Graphics editors are used to
Definition
create, modify, and save bitmap, vector, and metafile graphics files.
Term
Bitmap images
Definition
store graphics information as grids of individual pixels.
Term
demosaicing is
Definition
the process of converting raw picture data to another format
Term
The majority of digital cameras use the ____ format to store digital pictures
Definition
EXIF
Term
Lossy compression compresses data by
Definition
permanently discarding bits of information in the file.
Term
Carving
Definition
is recovering pieces of a file
Term
A JPEG file has a hexadecimal header value of
Definition
FF D8 FF E0 00 10
Term
If you can’t open an image file in an image viewer, the next step is to
Definition
examine the file’s header data.
Term
The uppercase letter “A” has a hexadecimal value of
Definition
41
Term
The image format ___ is derived from the more common TIFF file format.
Definition
XIF
Term
The simplest way to access a file header is to use
Definition
a hexadecimal editor
Term
The ____ starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 2065 5874 656E 6465 6420 03
Definition
XIF header
Term
Steganography is
Definition
the art of hiding information inside image files
Term
_______ places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.
Definition
Insertion steganography
Term
_______ replaces bits of the host file with other bits of data.
Definition
Substitution steganography
Term
Outguess is a
Definition
steg tool (steganography).
Term
Steganography has also been used to protect
Definition
copyrighted material by inserting digital watermarks into a file
Term
When working with image files, computer investigators also need to be aware of
Definition
copyright laws to guard against copyright violations.
Term
Under copyright laws, computer programs may be
Definition
registered as literary works
Term
Under copyright laws, maps and architectural plans may be
Definition
registered as pictorial, graphic, and sculptural works
Supporting users have an ad free experience!