Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CNIT 323/420 — FINAL EXAM QUESTIONS & ANSWERS (RATED A+)

Beoordeling
-
Verkocht
-
Pagina's
27
Cijfer
A+
Geüpload op
30-06-2025
Geschreven in
2024/2025

What are the types of software forensic tools? - ANSWERcommand line applications GUI applications What are commonly used to copy data from a suspect's disk drive to an image file? - ANSWERsoftware forensic tools Where are the stored hashes for passwords in Windows found? - ANSWERHKEY_LOCAL_MACHINESAM Where does Mac OS store passwords? - ANSWERkeychain Where does linux store passwords? - ANSWER/etc/shadow 1. Which of the following is not a graphic file type? a. Bitmap graphics b. Vector graphics c. Lossy graphics d. Metafile graphics - ANSWERc. Lossy graphics TRUE/FALSE Images that are in raw format must include EXIF data - ANSWERFALSE ISO standard 27037 states: - ANSWERDigital Evidence First Responders (DEFRs) should use validated tools

Meer zien Lees minder
Instelling
CNIT 323/420 —
Vak
CNIT 323/420 —

Voorbeeld van de inhoud

CNIT 323/420 — FINAL EXAM
QUESTIONS & ANSWERS (RATED A+)


What are the types of software forensic tools? - ANSWERcommand line applications
GUI applications

What are commonly used to copy data from a suspect's disk drive to an image file? -
ANSWERsoftware forensic tools

Where are the stored hashes for passwords in Windows found? -
ANSWERHKEY_LOCAL_MACHINE\SAM

Where does Mac OS store passwords? - ANSWERkeychain

Where does linux store passwords? - ANSWER/etc/shadow

1. Which of the following is not a graphic file type?

a. Bitmap graphics
b. Vector graphics
c. Lossy graphics
d. Metafile graphics - ANSWERc. Lossy graphics

TRUE/FALSE

Images that are in raw format must include EXIF data - ANSWERFALSE

ISO standard 27037 states: - ANSWERDigital Evidence First Responders
(DEFRs) should use validated tools

When performing tasks using digital forensic tools, which guidelines should you follow?
- ANSWERNIST's Computer Forensics Tool Testing (CFTT) program

What are the 5 major categories of tasks performed by digital forensics tools? -
ANSWERAcquisition
Validation and verification
Extraction
Reconstruction
Reporting

,____________ is making a copy of the original drive - ANSWERacquisition

TRUE/FALSE

There are 2 types of data-copying methods used in software acquisitions. -
ANSWERTRUE

Physical copying of the entire drive
Logical copying of a disk partition

TRUE/FALSE

You can view a raw image file's contents with any hexadecimal editor - ANSWERTRUE

What is a typical feature in vendor acquisition tools? - ANSWERcreating smaller
segmented files

TRUE/FALSE

Remote acquisition of files is common in smaller organizations - ANSWERFALSE

Larger organizations

Popular tools, such as AccessData and EnCase, can do remote acquisitions of
forensics drive images on a network

____________ is a way to confirm that a tool is functioning as intended -
ANSWERvalidation

______________ proves that two sets of data are identical by calculating hash values
or using another similar method - ANSWERVerification

_______________ is the confirmation by examination *and* the provision of objective
evidence that a tool, technique or procedure functions correctly *and* as intended -
ANSWERValidation

_______________ is the confirmation of a validation with laboratories' *tools*,
techniques *and* procedures. - ANSWERVerification

CRC-32, MD5, SHA-1 are examples of ___________ - ANSWERhashing

What are the subfunctions of verification? - ANSWERHashing
Filtering (based on hash value sets)
Analyzing file headers (discriminate files based on their types)

, ____________________ has compiled a list of known file (good and bad) hashes -
ANSWERNational Software Reference Library (NSRL)

TRUE/FALSE

Not many forensics tools can identify header values - ANSWERFALSE

Most forensics tools can identify header values

___________ is the recovery task in a digital investigation - ANSWERextraction

Which digital forensics tasks is the most challenging? - ANSWERextraction

TRUE/FALSE

Recovering data is the first step in analyzing an investigation's data - ANSWERTRUE

What are the subfunctions of extraction? - ANSWERData viewing
Keyword searching
Decompressing or uncompressing
Carving
Decrypting
Bookmarking or tagging

TRUE/FALSE

Keyword search always speed up analysis for investigators - ANSWERFALSE

TRUE/FALSE

From an investigation perspective, encrypted files and systems are a problem -
ANSWERTRUE

Many password recovery tools have a feature for generating potential password lists for
a _______________ attack - ANSWERpassword dictionary

If a password dictionary attack fails, you can run a ______________ attack -
ANSWERbrute-force

TRUE/FALSE

You should bookmark or record the findings during extraction and decryption -
ANSWERTRUE

Re-create a suspect drive to show what happened during a crime or an incident
describes _______________ - ANSWERreconstruction

Geschreven voor

Instelling
CNIT 323/420 —
Vak
CNIT 323/420 —

Documentinformatie

Geüpload op
30 juni 2025
Aantal pagina's
27
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
nursingismylife West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
260
Lid sinds
3 jaar
Aantal volgers
174
Documenten
9125
Laatst verkocht
6 dagen geleden

3.6

38 beoordelingen

5
14
4
12
3
3
2
1
1
8

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen