Guide to Computer Forensics and Investigations 5e Bill Nelson Amelia Phillips Christopher Steuart - Test Bank

Guide to Computer Forensics and Investigations 5e Bill Nelson Amelia Phillips Christopher Steuart - Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   True / False   1. A computer stores system configuration and date and time information in the BIOS when power to the system …

$19.99

Guide to Computer Forensics and Investigations 5e Bill Nelson Amelia Phillips Christopher Steuart – Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

True / False

 

1. A computer stores system configuration and date and time information in the BIOS when power to the system is off.​

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   184
QUESTION TYPE:   True / False
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 6:29 AM
DATE MODIFIED:   8/5/2014 6:30 AM

 

2. When data is deleted on a hard drive, only references to it are removed, which leaves the original data on unallocated disk space.​

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   188
QUESTION TYPE:   True / False
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 7:01 AM
DATE MODIFIED:   8/5/2014 7:02 AM

 

3. Someone who wants to hide data can create hidden partitions or voids- large unused gaps between partitions on a disk drive. Data that is hidden in partition gaps cannot be retrieved by forensics utilities.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   189
QUESTION TYPE:   True / False
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 7:06 AM
DATE MODIFIED:   8/5/2014 5:21 PM

 

4. FAT32 is used on older Microsoft OSs, such as MS-DOS 3.0 through 6.22, Windows 95 (first release), and Windows NT 3.3 and 4.0.​

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   195
QUESTION TYPE:   True / False
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 8:00 AM
DATE MODIFIED:   8/5/2014 8:05 AM

 

5. Each MFT record starts with a header identifying it as a resident or nonresident attribute.​

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   200
QUESTION TYPE:   True / False
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 8:19 AM
DATE MODIFIED:   8/5/2014 8:20 AM

 

Multiple Choice

 

6. ​A typical disk drive stores how many bytes in a single sector?

  a. ​8
  b. ​512
  c. ​1024
  d. ​4096

 

ANSWER:   b
POINTS:   1
REFERENCES:   186
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 11:11 PM
DATE MODIFIED:   10/4/2014 5:04 PM

 

7. ​Most manufacturers use what technique in order to deal with the fact that a platter’s inner tracks have a smaller circumference than the outer tracks?

  a. Disk Track Recording (DTR)​
  b. ​Zone Based Areal Density (ZBAD)
  c. ​Zone Bit Recording (ZBR)
  d. ​Cylindrical Head Calculation (CHC)

 

ANSWER:   c
POINTS:   1
REFERENCES:   187
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 11:12 PM
DATE MODIFIED:   10/4/2014 5:09 PM

 

8. What hexadecimal code below identifies an NTFS file system in the partition table?​

  a. ​05
  b. ​07
  c. ​1B
  d. ​A5

 

ANSWER:   b
POINTS:   1
REFERENCES:   190
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 11:15 PM
DATE MODIFIED:   10/4/2014 5:10 PM

 

9. When using the File Allocation Table (FAT), where is the FAT database typically written to?​

  a. ​The innermost track
  b. ​The outermost track
  c. ​The first sector
  d. ​The first partition

 

ANSWER:   b
POINTS:   1
REFERENCES:   194
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 11:21 PM
DATE MODIFIED:   10/4/2014 5:12 PM

 

10. Select below the file system that was developed for mobile personal storage devices, such as flash memory devices, secure digital eXtended capacity (SDCX), and memory sticks:​

  a. ​FAT12
  b. ​FAT32
  c. ​exFAT
  d. ​VFAT

 

ANSWER:   c
POINTS:   1
REFERENCES:   195
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 11:26 PM
DATE MODIFIED:   10/4/2014 5:14 PM

 

11. What term is used to describe a disk’s logical structure of platters, tracks, and sectors?

  a. ​cylinder
  b. ​trigonometry
  c. ​geometry
  d. ​mapping

 

ANSWER:   c
POINTS:   1
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 5:29 PM
DATE MODIFIED:   10/4/2014 5:49 PM

 

12. A Master Boot Record (MBR) partition table marks the first partition starting at what offset?​

  a. ​0x1CE
  b. ​0x1BE
  c. ​0x1AE
  d. ​0x1DE

 

ANSWER:   b
POINTS:   1
REFERENCES:   190
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 6:04 PM
DATE MODIFIED:   10/4/2014 6:07 PM

 

13. The ___________ command inserts a HEX E5 (0xE5) in a filename’s first letter position in the associated directory entry.​

  a. ​delete
  b. ​edit
  c. ​update
  d. ​clear

 

ANSWER:   a
POINTS:   1
REFERENCES:   197
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 6:17 PM
DATE MODIFIED:   10/4/2014 6:19 PM

 

14. What metadata record in the MFT keeps track of previous transactions to assist in recovery after a system failure in an NTFS volume?​

  a. ​$MftMirr
  b. ​$TransAct
  c. ​$LogFile
  d. ​$Backup

 

ANSWER:   c
POINTS:   1
REFERENCES:   199
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 6:35 PM
DATE MODIFIED:   10/4/2014 6:39 PM

 

15. What command below can be used to decrypt EFS files?​

  a. ​cipher
  b. ​copy
  c. ​efsrecvr
  d. ​decrypt

 

ANSWER:   c
POINTS:   1
REFERENCES:   216
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 8:01 PM
DATE MODIFIED:   10/4/2014 8:03 PM

 

16. Which of the following commands ​creates an alternate data stream?

  a. ​echo text > myfile.txt:stream_name
  b. ​ads create myfile.txt{stream_name} “text”
  c. ​cat text myfile.txt=stream_name
  d. ​echo text < myfile.txt?stream_name

 

ANSWER:   a
POINTS:   1
REFERENCES:   213
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 8:28 PM
DATE MODIFIED:   10/4/2014 8:46 PM

 

17. ​What term below describes a column of tracks on two or more disk platters?

  a. ​sector
  b. ​cluster
  c. ​cylinder
  d. ​header

 

ANSWER:   c
POINTS:   1
REFERENCES:   185
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 8:53 PM
DATE MODIFIED:   10/4/2014 8:58 PM

 

18. Which of the following is not a valid configuration of Unicode?​

  a. ​UTF-8
  b. ​UTF-16
  c. ​UTF-32
  d. ​UTF-64

 

ANSWER:   d
POINTS:   1
REFERENCES:   199
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/5/2014 5:38 PM
DATE MODIFIED:   10/5/2014 5:39 PM

 

19. What does the MFT header field at offset 0x00 contain?

  a. ​The MFT record identifier FILE
  b. ​The size of the MFT record
  c. ​The length of the header
  d. ​The update sequence array

 

ANSWER:   a
POINTS:   1
REFERENCES:   204
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/8/2014 10:24 PM
DATE MODIFIED:   10/8/2014 10:30 PM

 

20. ​The ReFS storage engine uses a __________ sort method for fast access to large data sets.

  a. ​A+-tree
  b. ​B+-tree
  c. ​reverse
  d. ​numerical

 

ANSWER:   b
POINTS:   1
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/8/2014 10:31 PM
DATE MODIFIED:   10/8/2014 10:36 PM

 

21. ​What third party encryption tool creates a virtual encrypted volume, which is a file mounted as though it were a disk drive?

  a. ​PGP Full Disk Encryption
  b. ​Voltage SecureFile
  c. ​BestCrypt
  d. ​TrueCrypt

 

ANSWER:   d
POINTS:   1
REFERENCES:   220
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/8/2014 10:42 PM
DATE MODIFIED:   10/8/2014 11:01 PM

 

22. ​The _________ branches in HKEY_LOCAL_MACHINE\Software consist of SAM, Security, Components, and System.

  a. ​registry
  b. ​storage
  c. ​hive
  d. ​tree

 

ANSWER:   c
POINTS:   1
REFERENCES:   221
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/8/2014 11:04 PM
DATE MODIFIED:   10/8/2014 11:06 PM

 

23. ​What registry file contains user account management and security settings?

  a. ​Default.dat
  b. ​Software.dat
  c. ​SAM.dat
  d. ​Ntuser.dat

 

ANSWER:   c
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/8/2014 11:07 PM
DATE MODIFIED:   10/8/2014 11:18 PM

 

24. What registry file contains installed programs’ settings and associated usernames and passwords?​

  a. ​Default.dat
  b. ​Security.dat
  c. ​Software.dat
  d. ​System.dat

 

ANSWER:   c
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/8/2014 11:19 PM
DATE MODIFIED:   10/8/2014 11:23 PM

 

25. Addresses that allow the MFT to link to nonresident files are known as _______________.​

  a. ​virtual cluster numbers
  b. ​logical cluster numbers
  c. ​sequential cluster numbers
  d. ​polarity cluster numbers

 

ANSWER:   b
POINTS:   1
REFERENCES:   203
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
DATE CREATED:   10/8/2014 11:32 PM
DATE MODIFIED:   10/8/2014 11:41 PM

 

Completion

 

26. ___________ are made up of one or more platters coated with magnetic material, and data ​is stored in a particular way.

ANSWER:   Disk drives​
POINTS:   1
REFERENCES:   185
QUESTION TYPE:   Completion
HAS VARIABLES:   False
DATE CREATED:   8/6/2014 2:53 AM
DATE MODIFIED:   8/6/2014 2:55 AM

 

27. The ______________ is the device that reads and writes data to a drive.​

ANSWER:   head​
POINTS:   1
REFERENCES:   185
QUESTION TYPE:   Completion
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 5:50 PM
DATE MODIFIED:   10/4/2014 5:51 PM

 

28. _____________ is composed of the unused space in a cluster between the end of an active file’s content and the end of the cluster.​

ANSWER:   Drive slack​
POINTS:   1
QUESTION TYPE:   Completion
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 6:12 PM
DATE MODIFIED:   10/4/2014 6:15 PM

 

29. The purpose of a ______________ is to provide a mechanism for recovering files encrypted with EFS if there’s a problem with the user’s original private key.​

ANSWER:   recovery certificate​
POINTS:   1
REFERENCES:   216
QUESTION TYPE:   Completion
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 7:31 PM
DATE MODIFIED:   10/4/2014 7:52 PM

 

30. The _______________ executable is the Windows Boot Manager program, which controls boot flow and allows booting multiple OSs.​

ANSWER:   ​bootmgr.exe
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Completion
HAS VARIABLES:   False
DATE CREATED:   10/4/2014 8:11 PM
DATE MODIFIED:   10/4/2014 8:13 PM

 

Matching

 

Match each term with the correct definition below:​

a. ​Boot.ini b. bootstrap process
c. ​Encryption File System d. File Allocation Table (FAT)​
e. ​tracks f. ​head
g. ​NTBootdd.sys h. NTDetect.com​
i. ​NT File System j. Resilient File System

 

REFERENCES:   238-240
QUESTION TYPE:   Matching
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 5:49 AM
DATE MODIFIED:   8/5/2014 5:26 PM

 

31. ​Concentric circles on a disk platter where data is stored.

ANSWER:   e
POINTS:   1

 

32. A new file system developed for Windows Server 2012. It allows increased stability for disk storage and improved features for data recovery and error checking.​

ANSWER:   j
POINTS:   1

 

33. A public/private key encryption first used in Windows 2000 on NTFS-formatted disks. The file encrypted with a symmetric key, and then a public/private key is used to encrypt the symmetric key.​

ANSWER:   c
POINTS:   1

 

34. ​The device that reads and writes data to a disk drive.

ANSWER:   f
POINTS:   1

 

35. ​The file system that Microsoft created to replace FAT. It uses security features, allows smaller cluster sizes, and uses Unicode, which makes it a more versatile system.

ANSWER:   i
POINTS:   1

 

36. ​A file that specifies the Windows path installation and a variety of other startup options.

ANSWER:   a
POINTS:   1

 

37. ​A device driver that allows the OS to communicate with SCSI or ATA drives that aren’t related to the BIOS.

ANSWER:   g
POINTS:   1

 

38. ​Information contained in ROM that a computer accesses during startup; this information tells the computer how to access the OS and hard drive.

ANSWER:   b
POINTS:   1

 

39. ​A 16-bit program that identifies hardware components during startup snd sends the information to Ntldr.

ANSWER:   h
POINTS:   1

 

40. ​The original Microsoft file structure database. It’s written to the outermost track of a disk and contains information about each file stored on the drive. PCs use this to organize files on a disk so that the OS can find the files it needs.

ANSWER:   d
POINTS:   1

 

Subjective Short Answer

 

41. Explain the difference between ​logical addresses ​and ​physical addresses​ in Microsoft file structures.

ANSWER:   Clusters are numbered sequentially, starting at 0 in NTFS and 2 in FAT. The first sector of all disks contains a system area, the boot record, and a file structure database. The OS assigns these cluster numbers, which are referred to as logical addresses. These addresses point to relative cluster positions; for example cluster address 100 is 98 clusters from cluster address 2. Sector numbers, however, are referred to as physical addresses because they reside at the hardware or firmware level and go from address 0 (the first sector on a disk) to the last sector on a disk. Clusters and their addresses are specific to a logical disk drive, which is a disk partition.
POINTS:   1
REFERENCES:   189
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 7:24 AM
DATE MODIFIED:   8/6/2014 2:47 AM

 

42. Describe both ways in which file or folder information is typically stored in an MFT record.​

ANSWER:   File or folder information is typically stored in one of two ways in an MFT record; resident and nonresident. For very small files, about 512 bytes or less, all file metadata and data are stored in the MFT record. These types of records are called resident files because all their information is stored in the MFT record.

Files larger than 512 bytes are stored outside the MFT​. The file or folder’s MFT record provides cluster addresses where the file is stored on the drive’s partition. These cluster addresses are called data runs. This type of MFT record is referred to as “nonresident” because the file’s data is stored in its own separate file outside the MFT.

POINTS:   1
REFERENCES:   200
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 8:11 AM
DATE MODIFIED:   8/5/2014 8:19 AM

 

43. Why are ​alternate data streams​ of particular interest when examining NTFS disks?

ANSWER:   Alternate data streams are ways data can be appended to existing files. In NTFS, an alternate data stream becomes additional file attribute and allows the file to be associated with different applications. As a result, it remains one data unit. You can also store information about a file in an alternate data stream.
POINTS:   1
REFERENCES:   213
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 8:26 AM
DATE MODIFIED:   8/6/2014 2:47 AM

 

44. When Microsoft introduced Windows 2000, it added optional built-in encryption to NTFS called ​Encrypting File System (EFS)​. Explain how EFS works.​

ANSWER:   Encrypting File System (EFS) uses public key and private key methods of encrypting filed, folders, or disk volumes (partitions). Only the owner or user who encrypted the data can access encrypted files. The owner holds the private key, and the public key is held by a certification authority, such as global registry, network server, or company such as VeriSign.​
POINTS:   1
REFERENCES:   216
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 8:45 AM
DATE MODIFIED:   8/6/2014 2:48 AM

 

45. Compare the methods for deleting NTFS files.​

ANSWER:   ​Typically, you use Windows or File Explorer to delete files from a disk. When a file is deleted in Windows NT and later, the OS renames it and moves it to the Recycle Bin. Another method is using the del (delete) MS-DOS command. This method doesn’t rename and move the file to the Recycle Bin, but it eliminates the file from the MFT listing in the same way FAT does.
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 8:52 AM
DATE MODIFIED:   8/5/2014 6:04 PM

 

46. With the release of Windows Server 2012, Microsoft created a new file system: ​Resilient File System (ReFS)​. State the features that are incorporated into ReFS’s design.​

ANSWER:   The following features are incorporated into ReFS’s design:

-Maximized data availability

-Improved data integrity

-Designed for scalability ​

POINTS:   1
REFERENCES:   218
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 9:04 AM
DATE MODIFIED:   8/6/2014 2:48 AM

 

47. To help prevent loss of information, software vendors, including Microsoft, now provide whole disk encryption. This feature creates new challenges in examining and recovering data from drivers.  What are four features offered by whole disk encryption tools that forensics examiners should be aware of?

ANSWER:   The following are features offered by whole disk encryption tools that forensics examiners should be aware of:

-Preboot authentication, such as single sign-on password, fingerprint scan, or token (USB device)

-Full or partial disk encryption with secure hibernation, such as activating a password-protected screen saver

-Advanced encryption algorithms, such as Advanced Encryption Standards (AES)​ and International Data Encryption Algorithm (IDEA)

-Key management function that uses a challenge-and-response method to reset passwords or passphrases

POINTS:   1
REFERENCES:   219
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   8/5/2014 9:09 AM
DATE MODIFIED:   8/6/2014 2:48 AM

 

48. Describe the three current versions of FAT.

ANSWER:   There are three current versions of FAT- FAT16, FAT32, and exFAT (used by Xbox game systems).

FAT16-To handle larger disks, Microsoft developed FAT16, which is still used on older OSs, such as MS-DOS 3.0 through 6.22, Windows 95 (first release), and Windows NT 3.5 and 4.0. FAT16 supports disk partitions with a maximum storage capacity of 4 GB.

FAT32- When disk technology improved and disks larger than 2 GB were developed, Microsoft released FAT32, which can access larger drives.

exFAT- Developed for mobile personal storage devices, such as flash memory devices, secure digital eXtended capacity (SDCX), and memory sticks. The exFAT file system can store very large files, such as digital memory, video, and audio files.

POINTS:   1
REFERENCES:   195
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   8/23/2014 9:34 PM
DATE MODIFIED:   8/23/2014 9:56 PM

 

49. What is a partition gap, and how might it be used to hide data?​

ANSWER:   A partition gap is the unused space between partitions. ​It’s possible to create a partition, add data to it, and then remove references to the partition so that it can be hidden in Windows. If data is hidden in this partition gap, a disk editor utility could be used to access it.
POINTS:   1
REFERENCES:   189
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   10/5/2014 5:34 PM
DATE MODIFIED:   10/5/2014 5:37 PM

 

50. ​What does the $Secure metadata file contain?

ANSWER:   It contains unique security descriptors for the volume. Access Control List (ACL) information for all files and folders on the NTFS volume is stored here.​
POINTS:   1
REFERENCES:   199
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
DATE CREATED:   10/5/2014 5:50 PM
DATE MODIFIED:   10/5/2014 5:52 PM

 

 

Additional information

Add Review

Your email address will not be published. Required fields are marked *