__________ is a Linux Live CD that you use to boot a system and then use the tools. It is a free
Linux distribution, making it extremely attractive to schools teaching forensics or
laboratories on a strict budget. - Ans BackTrack
What name is given to data that an operating system creates and overwrites without
the computer user taking a direct action to save this data? - Ans temporary data
__________ is offline analysis conducted on an evidence disk or forensic duplicate after booting
from a CD or another system. - Ans physical analysis
People try to thwart investigators by using encryption to scramble information or _________ to
hide information, or both together. - Ans steganography
__________ is essentially data about the data. In the case of files, it can include creation
time/date, size, last modified date, and even file header information. - Ans metadata
What term is used to describe the determination of whether a file or communication
hides other information? - Ans steganalysis
What was designed as an area where computer vendors could store data that is shielded
from user activities and operating system utilities, such as delete and format? - Ans host
protected area
A one-sided DVD (or digital video disc) can hold __________ gigabytes. - Ans 4.7
, What version of RAID are the following descriptors? Striped disks with dedicated parity
combine three or more disks in a way that protects data against loss of any one disk. Fault
tolerance is achieved by adding an extra disk to the array and dedicating it to storing parity
information. The storage capacity of the array is reduced by one disk. - Ans RAID 3 or 4
The art and science of writing hidden messages is the definition of what? - Ans steganography
What is meant by steganalysis? - Ans the determination of whether a file or
communication hides other information
The __________ cipher is a method of encrypting alphabetic text by using a series of different
monoalphabet ciphers selected based on the letters of a keyword. - Ans Vigenère
__________ is perhaps the most widely used public key cryptography algorithm in existence
today. - Ans RSA
What is meant by symmetric cryptography? - Ans those methods where the same key is used
to encrypt and decrypt the plaintext
What is meant by substitution? - Ans in cryptography, the method of is changing some part
of the plaintext for some matching part of ciphertext
Windows 2000 and newer operating systems' file systems utilize __________. - Ans NTFS
A port is a number that identifies a channel in which communication can occur. There are
certain ports a forensic analyst should know on sight. Which port uses IRC chat rooms? - Ans
Port 194
What is grep? - Ans a popular Linux/UNIX search tool
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.79. You're not tied to anything after your purchase.