How can you make sure a subject’s computer boots to a forensic floppy disk or CD?
How do you boot a subject’s computer to a forensic floppy disk? Access the CMOS setup by monitoring the subject’s computer during the initial bootstrap process to identify the correct key or keys to use. The bootstrap process is contained in ROM and tells the computer how to proceed.
What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files?
Forenscis MC Final 3
|The NIST project that has as a goal to collect all known hash values for commercial software applications and OS files is ____.||NSRL|
|The primary hash algorithm used by the NSRL project is _____.||SHA-1|
Which entity publishes articles provides tools and creates procedures for testing and validating computer forensics software?
NIST has created criteria for testing computer forensics tools, which are included in the article “General Test Methodology for Computer Forensic Tools” (version 1.9, November 7, 2001), available at www.cftt.nist.gov/testdocs.html.
What are the five major function categories of any digital forensics tool?
Five major categories:
- Validation and verification.
Where should your computer backups be kept?
You should store backup copies of your files somewhere separate from your computer — on an external hard disk, for example. That way, if the computer breaks, or is lost or is stolen, the backup will still be intact. For maximum security, you shouldn’t keep the backup in the same building as your computer.
What must be done under oath to verify that the information in the affidavit is true?
Affidavits must always be notarized by a notary public. “Notarized” means that you have sworn under oath that the facts in the affidavit are true, the document has been signed in front of a notary public, and a notary public has signed and put a seal on the affidavit.
Which NIST project manages research on forensics tools?
Through the Cyber Security Division Cyber Forensics project, the Department of Homeland Security’s Science and Technology partners with the NIST CFTT project to provide forensic tool testing reports to the public.
When you research for computer forensics tools strive for versatile flexible and robust?
When you research for computer forensics tools, strive for versatile, flexible, and robust tools that provide technical support. In software acquisition, there are three types of data-copying methods.
What tools are used to create modify and save bitmap vector and metafile graphics?
You use graphics editors to create, modify, and save bitmap, vector, and metafile graphics. You use image viewers to open and view graphics files but not change their contents. When you use a graphics editor or an image viewer, you can open a file in one of many graphics file formats, such as . bmp, .
What two data copying methods are used in software data acquisitions?
Two types of data-copying methods are used in software acquisitions: Physical copying of the entire drive. Logical copying of a disk partition.
Which location contains configuration information for Sendmail?
The /etc/mail/sendmail.cf configuration file and the /etc/mail/submit.cf configuration file contain the configuration information for the sendmail command. These files include information such as the host name and domain, and the sendmail rule sets.