CJUS 363 Quiz 2

CJUS 363 Quiz 2 Liberty University

  1. is composed of the unused space in a cluster between the end of an active file’s content and the end of the cluster.
  2. Someone who wants to hide data can create hidden partitions or voids­ large unused gaps between partitions on a disk drive. Data that is hidden in partition gaps cannot be retrieved by forensics utilities.
  3. What term below describes a column of tracks on two or more disk platters?
  4. When data is deleted on a hard drive, only references to it are removed, which leaves the original data on unallocated disk space.
  5. A Master Boot Record (MBR) partition table marks the first partition starting at what offset?
  6. The _______ copies evidence of intrusions to an investigation workstation automatically for further analysis over the network.
  7. What registry file contains installed programs’ settings and associated usernames and passwords?
  8. What metadata record in the MFT keeps track of previous transactions to assist in recovery after a system failure in an NTFS volume?
  9. An investigator wants to capture all data on a SATA drive connected to a Linux system. What should the investigator use for the “if=” portion of thedcfldd command?
  10. are made up of one or more platters coated with magnetic material, and data is stored in a particular way.
  11. The ImageUSB utility can be used to create a bootable flash drive.
  12. A typical disk drive stores how many bytes in a single sector?
  13. What term is used to describe a disk’s logical structure of platters, tracks, and sectors?
  14. When two files with different contents generate the same digital fingerprint using a hashing function, a(n) ____________ has occurred.
  15. A forensics investigator should verify that acquisition tools can copy data in the HPA of a disk drive.
  16. FAT32 is used on older Microsoft OSs, such as MS­DOS 3.0 through 6.22, Windows 95 (first release), and Windows NT 3.3 and 4.0.
  17. The ______________ is the device that reads and writes data to a drive.
  18. What is the dd command?
  19. What command below can be used to decrypt EFS files?
  20. What registry file contains user account management and security settings?
  21. software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
  22. What third party encryption tool creates a virtual encrypted volume, which is a file mounted as though it were a disk drive?
  23. FTK Imager software can acquire a drive’s host protected area.
  24. Which option below is not a hashing function used for validation checks?
  25. The purpose of a ______________ is to provide a mechanism for recovering files encrypted with EFS if there’s a problem with the user’s original private key.
Buy Answer Key
  • Find by class