488 Quiz-02
488 Quiz-02
Answer key:
8) is a device that is put between the digital evidence and the computer it is
connected to and that prohibits the computer from wri>ng any data to the
device.
a. thumbcache
b. write blocker
c. Shellbags
d. System Log
9) The final step in a forensic analysis is to write a report. What should the
report NOT be wriIen to do?
a. Explain technical terms for those unfamiliar with forensics.
b. Clearly present objec>ve findings from the examina>on.
c. Maintain a chain of custody for the evidence examined.
d. Persuade the reader of the inves>gator's personal opinions.
12) can define a paIern matching any e mail address, phone numbers,
credit card number, social security number
a. Regular expressions
b. PaIern
c. Arguments
d. Directory
13) Which hive stores hashed passwords for user accounts on the local
machine?
a. SOFTWARE
b. SYSTEM
c. SAM
d. SECURITY
14) ou need to know how to use character ranges in grep regular
expressions. What does [a-zA-Z] match?
a. It matches any punctua>on mark or symbol.
b. It matches a single number between 0 and 9.
c. It matches any leIer, uppercase or lowercase.
d. It matches any character, including spaces and special characters.
16) imagine you are using grep and want to find lines containing any
leIer or number (0-9). Which of these grep expressions would achieve?
a. [0-9]
b. [.akz]
c. [a-zA-Z0-9]
d. [a-z]
18) There are differences between the two methods for forensic imaging:
physical and logical. Under which circumstance would a logical disk image
be the preferred choice?
a. When the inves>gator needs to capture deleted data and hidden files.
b. When the hard drive can be easily removed and a write blocker is
available.
c. When the target device is encrypted and a physical image would be
useless.
d. When a faster imaging process is crucial for the inves>ga>on.
19) What is the encryp>on formula used in asymmetric encryp>on?
a. P + K1 = C
b. C + K2 = P
c. P + K = C
d. C + K = P
21) You can use grep expressions to find misspelled words. Which of the
following regular expressions would likely find the misspelling "calendar"
with an extra "e" anywhere in the word?
a. cal*ndar
b. cale*ndar
c. cal[ea]ndar
d. cal[a-z]*dar
SAM
SECURITY
SOFTWARE
HARDWARE
According to The International Society of Forensic Computer Examiners' code of ethics, what is a
fundamental principle that forensic computer examiners should adhere to?
Where are .Lnk files created when a user opens files typically located on a Windows system?
C:\Windows\System32
C:\Users\Public\Documents
What role do Internet service providers (ISPs) play in the process of tracing online users through IP
addresses?
is a log file located in the folder [SystemRoot]\Windows\INF. It logs events related to the installation
and uninstallation of devices
Registry log
System log
Setupapi.dev.log
Password history
Which of the following file systems is most commonly used for storing surveillance video on USB
drives?
The ____ is a Windows feature with the purpose of making previewing of pictures quicker.
EXIF
thumbcache
Shellbags
.Lnk files
MRU - Stuff
A partition on a hard drive is formatted with a file system. What is the primary function of the file
system?
is nothing more than a bag filled with the software and hardware you need to carry out live
investigations.
response kit
write blocker
Shellbags
.Lnk files
Which of the following is a typical application that might use an SQLite database on a mobile device?
To store configuration settings for users, applications, and the Windows system itself
There are differences between findings and conclusions in a forensic report. What is the key
distinction between these two elements?
Findings are presented visually (charts, graphs), while conclusions are written in text.
Findings are irrelevant information, while conclusions are the most critical points.
Findings are objective observations, while conclusions are subjective interpretations based on findings.
Findings are presented first, while conclusions come last in the report.
Q- what are the arguments taken by rendert) function :
which of the following is a React 16 feature that allowing to render an element outside of its
component hierarchy
Portals ✅
Q- which of the following is a React 16 feature that prevent to use unnecessary DOM elements
Rendering fragments✅
Hierarchical ✅
Q- The _____hive contains information about the users on the local machine, information about when
they last logged on, when each account was created, and password hashes
-SAM✅
Q- are used to store information about GUI settings for explorer that is used to browse les and
folders on a Windows-based computer
A-Shellbags✅
Q- ?A partition on a hard drive is formatted with a le system. What is the primary function of the le
system
Q- ?Which hive stores hashed passwords for user accounts on the local machine
SAM ✅
Q- You need to know how to use character ranges in grep regular expressions. What does [a-ZA-Z]
match
Q- ?In a forensic report, how should investigators present the pieces of evidence they found during
the examination
C- Present the evidence objectively, "as is," without any personal opinions✅
Q—?According to The International Society of Forensic Computer Examiners' code of ethics, what is
a fundamental principle that forensic computer examiners should adhere to
Q— ?In an NTFS le system, where is information about a le's data clusters stored
C-In the le's entry within the Master File Table (MFT) ✅
Q— ?Why is memory analysis so valuable for forensic investigators even though it's volatile (cleared
on reboot)
-It can contain temporary, unencrypted versions of originally encrypted data like passwords ✅
Q— ?In digital forensics, what is a common entry point for law enforcement to track a suspected user
tied to a speci c action online
IP addresses ✅
Q—is a device that is put between the digital evidence and the computer it is connected to and that
prohibits the computer from writing any data to the device
write blocker ✅
Q—What role do Internet service providers (ISP5) play in the process of tracing online users through
IP addresses
Q—What does The International Society of Forensic Computer Examiners emphasize regarding the
truthfulness of forensic computer examiners
Q— is the process of creating a copy that is identical to the original data, in terms of content___
Disk imaging ✅
Q—Which of the following is a typical application that might use an SQLite database on a mobile
SMS messaging application ✅
Q— Which registry hive would a forensic investigator examine to nd information about a user's
browsing history:
NTUSER.dat ✅
Q— is nathing more than a bag lled with the software and hardware you need to carry out live
response kit ✅
Q—_________ is the process of prioritizing data or devices for forensic examinations when a forensic
expert is tasked with several examinations at once and needs to complete examinations fast to avoid
a heavy backlog.
Forensic triage ✅