Term
|
Definition
| is a column of tracks on two or more disk platters. |
|
|
Term
| ZBR is how most manufacturers deal with _______ |
|
Definition
| a platter's inner tracks being shorter than its outer tracks. |
|
|
Term
|
Definition
| the number of bits in one square inch of a disk platter. |
|
|
Term
|
Definition
| the file structure database that Microsoft originally designed for floppy disks. |
|
|
Term
| NTFS was introduced when _____ |
|
Definition
| Microsoft created Windows NT and is the primary file system for Windows Vista. |
|
|
Term
| What is immediately after the Partition Boot Sector on an NTFS disk? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| In the NTFS MFT, all files and folders are |
|
Definition
| stored in separate records of 1024 bytes each. |
|
|
Term
| 9. The file or folder’s MFT record provides cluster addresses where the file is stored on the drive’s partition. These cluster addresses are referred to as |
|
Definition
|
|
Term
| When Microsoft introduced Windows 2000, it added _______ |
|
Definition
| built-in encryption to NTFS called EFS. |
|
|
Term
| The purpose of the recovery certificate is to _______ |
|
Definition
| provide a mechanism for recovering encrypted files under EFS if there’s a problem with the user’s original private key. |
|
|
Term
| When Microsoft created Windows 95, it consolidated initialization (.ini) files into |
|
Definition
|
|
Term
| Boot.ini, located in the root folder of the system partition, specifies |
|
Definition
| the Windows XP path installation and contains options for selecting the Windows version. |
|
|
Term
| ______ is a 16-bit real-mode program that queries the system for device and configuration data, and then passes its findings to NTLDR. |
|
Definition
|
|
Term
| NTBootdd.sys , located in the root folder of the system partition, is the device driver that allows |
|
Definition
| the OS to communicate with SCSI or ATA drives that aren’t related to the BIOS. |
|
|
Term
| Device drivers contain instructions for the OS for hardware devices, such as |
|
Definition
| the keyboard, mouse, and video card, and are stored in the %system-root%\Windows\System32\Drivers folder. |
|
|
Term
|
Definition
| a hidden text file containing startup options for Windows 9x. |
|
|
Term
| The Command.com file provides a |
|
Definition
| command prompt when booting to MS-DOS mode (DPMI). |
|
|
Term
|
Definition
| text file containing commands that typically run only at system startup to enhance the computer’s DOS configuration. |
|
|
Term
|
Definition
| a batch file containing customized settings for MS-DOS that runs automatically. |
|
|
Term
| A virtual machine allows you to |
|
Definition
| create a representation of another computer on an existing physical computer. |
|
|
Term
| Computer forensics tools are divided into ____ major categories. |
|
Definition
|
|
Term
| Software forensics tools are commonly used to |
|
Definition
| copy data from a suspect’s disk drive to an image file. |
|
|
Term
| To make a disk acquisition with En.exe the requirements are: |
|
Definition
| only a PC running MS-DOS with a 12-volt power connector and an IDE, a SATA, or a SCSI connector cable. |
|
|
Term
|
Definition
| is a direct copy of a disk drive. An example of a Raw image is output from the UNIX/Linux dd command. |
|
|
Term
| Discrimination of data involves |
|
Definition
| sorting and searching through all investigation data. |
|
|
Term
| Many password recovery tools have a feature that |
|
Definition
| allows generating potential lists for a password dictionary attack. |
|
|
Term
| The simplest method of duplicating a disk drive is |
|
Definition
| using a tool that does a direct disk-to-disk copy from the original disk to the target disk. |
|
|
Term
| To complete a forensic disk analysis and examination, you need to |
|
Definition
|
|
Term
| The first tools that analyzed and extracted data from floppy disks and hard disks were |
|
Definition
| MS-DOS tools for IBM PC file systems. |
|
|
Term
| In Windows 2000 and XP, the ______ shows you the owner of a file if you have multiple users on the system or network. |
|
Definition
|
|
Term
| forensics workstations can be divided into ___ categories. |
|
Definition
|
|
Term
|
Definition
| is a forensics workstation consisting of a laptop computer with a built-in LCD monitor and almost as many bays and peripherals as a stationary workstation |
|
|
Term
|
Definition
| a simple drive-imaging station. |
|
|
Term
|
Definition
| can be software or hardware and are used to protect evidence disks by preventing you from writing any data to the evidence disk. |
|
|
Term
| Many vendors have developed _____ that connect to a computer through FireWire, USB 2.0,and SCSI controllers. |
|
Definition
|
|
Term
|
Definition
| publishes articles, provides tools, and creates procedures for testing and validating computer forensics software. |
|
|
Term
| The standards document, _____ demands accuracy for all aspects of the testing process, meaning that the results must be repeatable and reproducible. |
|
Definition
|
|
Term
|
Definition
| is 39. The NIST project that has as a goal to collect all known hash values for commercial software applications and OS files |
|
|
Term
|
Definition
| is the primary hash algorithm used by the NSRL. |
|
|
Term
| One way to compare your results and verify your new forensic tool is by ____ |
|
Definition
| using a disk editor, such as HexWorkshop, or WinHex. |
|
|
Term
| Although a disk editor gives you the most flexibility in testing, it might not be capable of |
|
Definition
| examining a compressed file’s contents. |
|
|
Term
| There are ___ tracks available for the program area on a CD |
|
Definition
|
|
Term
| The Advanced SCSI Programming Interface (ASPI) provides |
|
Definition
| several software drivers that allow communication between the OS and the SCSI component. |
|
|
Term
| All Advanced Technology Attachment (ATA) drives from ATA-33 through ATA-133 IDE and EIDE disk drives use the standard |
|
Definition
| 40-pin ribbon or shielded cable |
|
|
Term
| ATA-66, ATA-100, and ATA-133 can use the |
|
Definition
| newer 40-pin/80-wire cable |
|
|
Term
| IDE ATA controller on an old 486 PC doesn’t recognize disk drives larger than |
|
Definition
|
|
Term
| Scope creep _____ needed to extract,analyze,and present evidence. |
|
Definition
| increases the time and resources |
|
|
Term
| You begin any computer forensics case by |
|
Definition
| creating an investigation plan. |
|
|
Term
| In civil and criminal cases, _____ is often defined by search warrants or subpoenas, which specify what data you can recover. |
|
Definition
|
|
Term
| There are ___ searching options for keywords which FTK offers |
|
Definition
|
|
Term
| ____ can locate items such as text hidden in unallocated space that might not turn up in an indexed search. |
|
Definition
|
|
Term
| The stemming search feature allows you to |
|
Definition
| look for words with extensions such as “ing,”“ed,” and so forth. |
|
|
Term
| In FTK indexed search mode, you can |
|
Definition
| also look for files that were accessed or changed during a certain time period |
|
|
Term
| FTK and other computer forensics programs use _______ to tag and document digital evidence. |
|
Definition
|
|
Term
| Getting a hash value with a hexadecimal editor is ______ with a computer forensics tool. |
|
Definition
| much faster and easier than |
|
|
Term
|
Definition
| known file hash values to files on your evidence drive or image files to see whether they contain suspicious data. |
|
|
Term
|
Definition
| changing or manipulating a file to conceal information. |
|
|
Term
| One way to hide partitions is to |
|
Definition
| create a partition on a disk, and then use a disk editor such as Norton DiskEdit to manually delete any reference to it. |
|
|
Term
| Marking bad clusters data-hiding technique is more common with |
|
Definition
|
|
Term
| The term steganography comes from |
|
Definition
| the Greek word for“hidden writing.” |
|
|
Term
| Steganography is defined as |
|
Definition
| the art and science of hiding messages in such a way that only the intended recipient knows the message is there. |
|
|
Term
| Many commercial encryption programs use a technology called _____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system data failure. |
|
Definition
|
|
Term
| People who want to hide data can also use |
|
Definition
| advanced encryption programs, such as PGP or BestCrypt. |
|
|
Term
|
Definition
| a fairly easy task in computer forensic analysis |
|
|
Term
|
Definition
| use every possible letter, number, and character found on a keyboard when cracking a password. |
|
|
Term
|
Definition
| handy when you need to image the drive of a computer far away from your location or when you don’t want a suspect to be aware of an ongoing investigation. |
|
|
Term
| HDHOST is a remote access program for |
|
Definition
| communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer’s file system. |
|
|
Term
| Vector graphics are based on |
|
Definition
| mathematical instructions that define lines, curves, text, ovals, and other geometric shapes. |
|
|
Term
| Graphics editors are used to |
|
Definition
| create, modify, and save bitmap, vector, and metafile graphics files. |
|
|
Term
|
Definition
| store graphics information as grids of individual pixels. |
|
|
Term
|
Definition
| the process of converting raw picture data to another format |
|
|
Term
| The majority of digital cameras use the ____ format to store digital pictures |
|
Definition
|
|
Term
| Lossy compression compresses data by |
|
Definition
| permanently discarding bits of information in the file. |
|
|
Term
|
Definition
| is recovering pieces of a file |
|
|
Term
| A JPEG file has a hexadecimal header value of |
|
Definition
|
|
Term
| If you can’t open an image file in an image viewer, the next step is to |
|
Definition
| examine the file’s header data. |
|
|
Term
| The uppercase letter “A” has a hexadecimal value of |
|
Definition
|
|
Term
| The image format ___ is derived from the more common TIFF file format. |
|
Definition
|
|
Term
| The simplest way to access a file header is to use |
|
Definition
|
|
Term
| The ____ starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 2065 5874 656E 6465 6420 03 |
|
Definition
|
|
Term
|
Definition
| the art of hiding information inside image files |
|
|
Term
| _______ places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program. |
|
Definition
|
|
Term
| _______ replaces bits of the host file with other bits of data. |
|
Definition
| Substitution steganography |
|
|
Term
|
Definition
| steg tool (steganography). |
|
|
Term
| Steganography has also been used to protect |
|
Definition
| copyrighted material by inserting digital watermarks into a file |
|
|
Term
| When working with image files, computer investigators also need to be aware of |
|
Definition
| copyright laws to guard against copyright violations. |
|
|
Term
| Under copyright laws, computer programs may be |
|
Definition
| registered as literary works |
|
|
Term
| Under copyright laws, maps and architectural plans may be |
|
Definition
| registered as pictorial, graphic, and sculptural works |
|
|