Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 1 Because a file extension isn\'t the most reliable way of identifying

ID: 3756846 • Letter: Q

Question

QUESTION 1

Because a file extension isn't the most reliable way of identifying a given file - a good forensic tool should be able to identify files based on the header, not the file eextension. This comparison is generally known as a file signature analysis.

True

False

5 points   

QUESTION 2

Data in RAM are considered volatile data and thus of value to investigators.

True

False

5 points   

QUESTION 3

Latent data is a term to describe data that has been deleted or partially overwritten.

True

False

QUESTION 4

When you see unallocated space, it is okay to ignore them as it can be considered empty space.

True

False

5 points   

QUESTION 5

Slack space (or "file slack")should be of interest to investigators as you may be able to recover fragments of the previous file.

True

False

5 points   

QUESTION 6

The Locard Principle is a great way to guide your thinking as there will be some kind of a digital "fingerprint" should an compute or network is accessed. There's always a trace!

True

False

5 points   

QUESTION 7

There are two kinds of read/write blockers: software and hardware based.

True

False

5 points   

QUESTION 8

FTK Imager would be considered a software read/write blocker.

True

False

5 points   

QUESTION 9

Following the order of volatility is a good way to prioritize the evidence to be collected.

True

False

5 points   

QUESTION 10

Following the chain of custody process is not a necessary element of making sure the evidence is considered trustworthy and admissible.

True

False

5 points   

QUESTION 11

Cloning a hard drive means you are making a copy of the active data on the hard drive.

True

False

5 points   

QUESTION 12

Hashing helps you confirm that a clone is an exact duplicate of the evidence drive.

True

False

5 points   

QUESTION 13

When collecting memory (or RAM data)- one file to collect is the hibernation file (hiberfile.sys)

True

False

5 points   

QUESTION 14

The windows registry, a database of configuration files, does not play a role in forensic investigations and thus can be ignored.

True

False

5 points   

QUESTION 15

Metadata can be highly valuable in giving you additional insights as to how and when the data was manipulated (and in some cases - even the identify of the author!)

True

False

5 points   

QUESTION 16

Link artifacts (.LNK) can be useful in proving the existence of an actual file e.g. an bad actor may delete an file but not delete the .LNK artifacts which can show when someone actually opened the file in question.

True

False

5 points   

QUESTION 17

Anti forensics can include techniques like encryption, steganography, data destruction, or timestomping.

True

False

5 points   

QUESTION 18

Before collecting evidence, you don't need to worry about whether or not you have search authority. It's better to do it and then ask for forgiveness later.

True

False

5 points   

QUESTION 19

Electronic discovery is very similar to digital forensics where the person may be using the same tools because it is all about making sure you can show chain of custody, integrity and admissibility of the data that is offered to court.

True

10 points   

QUESTION 20

When analyzing an user's Internet history - the NTUSER.Dat is one of the many valuable artifacts because it includes the user's browser's history.

True

False

Explanation / Answer

Answer)

1) False.

The header along with the file extension is looked for.

2) True.

The data in RAM are volatile.

3) True.

This helps the forensic team to find files which are deleted and modified.

As per Chegg policy, a minimum of 1 question can be answered. We did 3.

Hit like if you find the answer useful. :)

Hope this answer helps. Thanks

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote