Filters
Question type

Study Flashcards

Match the terms with the correct definitions?. -?An open-source data acquisition format that stores image data and metadata


A) Advanced Forensic Format (AFF)
B) Host protected area (HPA)
C) Live acquisitions
D) Logical acquisitions
E) Raw format
F) Redundant array of independent disks (RAID)
G) Sparse acquisition
H) Static acquisitions
I) Whole disk encryption
J) .pdg extension

K) D) and H)
L) F) and H)

Correct Answer

verifed

verified

How can lossless compression be tested?​

Correct Answer

verifed

verified

Lossless compression can be tested using...

View Answer

Match the terms with the correct definitions?. -A data acquisition format that creates simple sequential flat files of a suspect drive or data set


A) Advanced Forensic Format (AFF)
B) Host protected area (HPA)
C) Live acquisitions
D) Logical acquisitions
E) Raw format
F) Redundant array of independent disks (RAID)
G) Sparse acquisition
H) Static acquisitions
I) Whole disk encryption
J) .pdg extension

K) B) and F)
L) D) and E)

Correct Answer

verifed

verified

​The ImageUSB utility can be used to create a bootable flash drive.

A) True
B) False

Correct Answer

verifed

verified

True

A RAID 3 array uses distributed data and distributed parity in a manner similar to a RAID 5 array.

A) True
B) False

Correct Answer

verifed

verified

​________________ software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.

Correct Answer

verifed

verified

Elcomsoft ...

View Answer

What is lossless compression?

Correct Answer

verifed

verified

Lossless compression uses comp...

View Answer

Match the terms with the correct definitions?. -?A data acquisition method used when a suspect computer can't be shut down to perform a static acquisition


A) Advanced Forensic Format (AFF)
B) Host protected area (HPA)
C) Live acquisitions
D) Logical acquisitions
E) Raw format
F) Redundant array of independent disks (RAID)
G) Sparse acquisition
H) Static acquisitions
I) Whole disk encryption
J) .pdg extension

K) A) and H)
L) B) and C)

Correct Answer

verifed

verified

​An investigator wants to capture all data on a SATA drive connected to a Linux system. What should the investigator use for the "if=" portion of the dcfldd command?


A) ​​/ dev​/ hda
B) ​​/ dev​/ hda1
C) ​/ dev​/ sda
D) ​/ dev​/ sda1

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

When using a target drive that is FAT32 formatted, what is the maximum size limitation for split files?​


A) ​512 MB
B) ​2 GB
C) 1 TB
D) 1 PB

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

​What is the name of the Microsoft solution for whole disk encryption?


A) ​DriveCrypt
B) ​TrueCrypt
C) BitLocker
D) SecureDrive

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

The _______ copies evidence of intrusions to an investigation workstation automatically for further analysis over the network.


A) ​intrusion detection system
B) ​active defense mechanism
C) total awareness system
D) intrusion monitoring system

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The Linux command _____ can be used to write bit-stream data to files.​


A) ​write
B) ​dd
C) cat
D) dump

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A forensics investigator should verify that acquisition tools can copy data in the HPA of a disk drive.​

A) True
B) False

Correct Answer

verifed

verified

The _______ switch can be used with the split command to adjust the size of segmented volumes created by the dd command.


A) ​-p
B) ​-s
C) -b
D) -S

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

​Which RAID type provides increased speed and data storage capability, but lacks redundancy?


A) ​RAID 0
B) ​RAID 1
C) RAID 0+1
D) RAID 5

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which RAID type utilizes mirrored striping, providing fast access and redundancy?​


A) ​RAID 1
B) ​RAID 3
C) RAID 5
D) RAID 10

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

D

​What is a hashing collision?

Correct Answer

verifed

verified

A hashing collision occurs when two files or data streams with different content produce the same digital fingerprint.

What two command line utilities are available on Linux for validating files?

Correct Answer

verifed

verified

Both md5sum and sha1...

View Answer

​Describe a RAID 6 configuration.

Correct Answer

verifed

verified

​In RAID 6, distributed data and distrib...

View Answer

Showing 1 - 20 of 50

Related Exams

Show Answer