Introduction to Information Security Final Exam - 768 Verified Questions

Page 1


Introduction to Information Security Final

Exam

Course Introduction

Introduction to Information Security offers a comprehensive overview of the foundational concepts, principles, and practices essential for protecting information assets in todays digital world. This course explores key topics such as confidentiality, integrity, and availability, as well as threats, vulnerabilities, and common attack vectors. Students will learn about security technologies, cryptography basics, risk management, security policies, and incident response strategies. Through real-world examples and case studies, the course emphasizes the importance of ethical behavior, legal considerations, and best practices in safeguarding digital information across various environments.

Recommended Textbook Guide to Computer Forensics and Investigations 4th Edition by Bill Nelson

Available Study Resources on Quizplus

16 Chapters

768 Verified Questions

768 Flashcards

Source URL: https://quizplus.com/study-set/1690

Page 2

Chapter 1: Computer Forensics and Investigations As a Profession

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33478

Sample Questions

Q1) To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

A)True

B)False

Answer: True

Q2) In addition to warning banners that state a company's rights of computer ownership, businesses should specify a(n) ____ who has the power to conduct investigations.

A) authorized requester

B) authority of line

C) line of right

D) authority of right

Answer: A

Q3) ____________________ involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases.

Answer: Computer forensics

Q4) The ____________________ provides a record of clues to crimes that have been committed previously.

Answer: police blotter

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Understanding Computer Investigations

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33479

Sample Questions

Q1) also known as a computer forensics workstation

A)FTK's Internet Keyword Search

B)Data recovery

C)Free space

D)Interrogation

E)Forensic workstation

F)Norton DiskEdit

G)MS-DOS 6.22

H)Multi-evidence form

I)Self-evaluation

Answer: E

Q2) Chain of custody is also known as chain of evidence.

A)True

B)False

Answer: True

Q3) You cannot use both multi-evidence and single-evidence forms in your investigation.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: The Investigators Office and Laboratory

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33480

Sample Questions

Q1) In the ____, you justify acquiring newer and better resources to investigate computer forensics cases.

A) risk evaluation

B) business case

C) configuration plan

D) upgrade policy

Answer: B

Q2) If damage occurs to the floor, walls, ceilings, or furniture on your computer forensics lab, it does not need to be repaired immediately.

A)True

B)False

Answer: False

Q3) ____ was created by police officers who wanted to formalize credentials in computing investigations.

A) HTCN

B) NISPOM

C) TEMPEST

D) IACIS

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Data Acquisition

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33481

Sample Questions

Q1) Dr. Simson L. Garfinkel of Basis Technology Corporation recently developed a new open-source acquisition format called ____________________.

Q2) If your time is limited, consider using a logical acquisition or ____ acquisition data copy method.

A) lossless

B) disk-to-disk

C) sparse

D) disk-to-image

Q3) Linux ISO images are referred to as ____.

A) ISO CDs

B) Live CDs

C) Forensic Linux

D) Linux in a Box

Q4) Typically, a(n) ____ acquisition is done on a computer seized during a police raid, for example.

A) live

B) online

C) real-time

D) static

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Processing Crime and Incident Scenes

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33482

Sample Questions

Q1) One technique for extracting evidence from large systems is called ____.

A) RAID copy

B) RAID imaging

C) large evidence file recovery

D) sparse acquisition

Q2) fingerprints can be tested with these systems

A)Innocent information

B)AFIS

C)EnCase Enterprise Edition

D)FOIA

E)IOCE

F)Low-level investigations

G)Hearsay

H)Spector

I)HAZMAT

Q3) Some computer cases involve dangerous settings. For these types of investigations, you must rely on the skills of _________________________ teams to recover evidence from the scene.

Q4) How can you secure a computer incident or crime scene?

Q5) Briefly describe the process of obtaining a search warrant.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Working With Windows and Dos Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33483

Sample Questions

Q1) The type of file system an OS uses determines how data is stored on the disk.

A)True

B)False

Q2) How can you make sure a subject's computer boots to a forensic floppy disk or CD?

Q3) How are disk clusters numbered by Microsoft file structures?

Q4) When Microsoft introduced Windows 2000, it added built-in encryption to NTFS called ____.

A) EFS

B) VFAT

C) LZH

D) RAR

Q5) ____ refers to the number of bits in one square inch of a disk platter.

A) Head skew

B) Areal density

C) Cylinder skew

D) ZBR

Q6) On Windows and DOS computer systems, the ____________________ stores information about partitions on a disk and their locations, size, and other important items.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Current Computer Forensics Tools

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33484

Sample Questions

Q1) ____ can be software or hardware and are used to protect evidence disks by preventing you from writing any data to the evidence disk.

A) Drive-imaging

B) Disk editors

C) Workstations

D) Write-blockers

Q2) The Windows platforms have long been the primary command-line interface OSs.

A)True

B)False

Q3) command-line disk acquisition tool from New Technologies, Inc.

A)JFIF

B)Lightweight workstation

C)Pagefile.sys

D)Salvaging

E)Raw data

F)PDBlock

G)Norton DiskEdit

H)Stationary workstation

I)SafeBack

Q4) Explain the validation of evidence data process.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Macintosh and Linux Boot Processes and File Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33485

Sample Questions

Q1) With Mac OSs, a system application called ____ tracks each block on a volume to determine which blocks are in use and which ones are available to receive data.

A) Extents overflow file

B) Volume Bitmap

C) Master Directory Block

D) Volume Control Block

Q2) Explain the use of B*-trees on Mac OS 9 file system.

Q3) groups of contiguous allocation blocks

A)File Manager

B)Inode blocks

C)ISO 9660

D)LILO

E)Clumps

F)Volume

G)ls

H)Catalog

I)Finder

Q4) GPL and BSD variations are examples of open-source software.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Computer Forensics Analysis and Validation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33486

Sample Questions

Q1) AccessData ____ compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data.

A) KFF

B) PKFT

C) NTI

D) NSRL

Q2) ____ search can locate items such as text hidden in unallocated space that might not turn up in an indexed search.

A) Online

B) Inline

C) Active

D) Live

Q3) For target drives, use only recently wiped media that have been reformatted and inspected for computer viruses.

A)True

B)False

Q4) What are the basic guidelines to identify steganography files?

Q5) FTK provides two options for searching for keywords: indexed search and ____________________ search.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Recovering Graphics Files

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33487

Sample Questions

Q1) In the following list, ____ is the only steg tool.

A) EnCase

B) iLook

C) DriveSpy

D) Outguess

Q2) With many computer forensics tools, you can open files with external viewers.

A)True

B)False

Q3) are also called steg tools

A)Pixels

B)Hex Workshop

C)Adobe Illustrator

D)Microsoft Office Picture Manager

E)JPEG

F)Steganalysis tools

G)GIMP

H)XIF

I)Metafile graphics

Q4) Give a brief overview of copyright laws pertaining to graphics within and outside the U.S.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Virtual Machines, Network Forensics, and Live Acquisitions

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33488

Sample Questions

Q1) ____ is the text version of Ethereal, a packet sniffer tool.

A) Tcpdump

B) Ethertext

C) Etherape

D) Tethereal

Q2) ____ hide the most valuable data at the innermost part of the network.

A) Layered network defense strategies

B) Firewalls

C) Protocols

D) NAT

Q3) Most packet sniffer tools can read anything captured in ____ format.

A) SYN

B) DOPI

C) PCAP

D) AIATP

Q4) ____________________ logs record traffic in and out of a network.

Q5) Explain The Auditor tool.

Q6) When are live acquisitions useful?

Q8) What are some of the tools included with Knoppix STD? Page 13

Q7) Why is testing networks as important as testing servers?

To view all questions and flashcards with answers, click on the resource link above.

Page 14

Chapter 12: E-Mail Investigations

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/33489

Sample Questions

Q1) GroupWise has ____ ways of organizing the mailboxes on the server.

A) 2

B) 3

C) 4

D) 5

Q2) To view AOL e-mail headers click Action, ____ from the menu.

A) More options

B) Message properties

C) Options

D) View Message Source

Q3) You can send and receive e-mail in two environments:via the ____________________ or an intranet (an internal network).

Q4) Administrators usually set e-mail servers to ____________________ logging mode.

Q5) Briefly explain how to use AccessData FTK to recover e-mails.

Q6) Vendor-unique e-mail file systems, such as Microsoft .pst or .ost, typically use ____________________ formatting, which can be difficult to read with a text or hexadecimal editor.

Q7) What are the steps for viewing e-mail headers in Hotmail?

Q8) What are the steps for retrieving e-mail headers on Pine?

Q9) Explain how to handle attachments during an e-mail investigation. Page 15

To view all questions and flashcards with answers, click on the resource link above.

Page 16

Chapter 13: Cell Phone and Mobile Device Forensics

Available Study Resources on Quizplus for this Chatper

37 Verified Questions

37 Flashcards

Source URL: https://quizplus.com/quiz/33490

Sample Questions

Q1) proprietary protocol developed by Motorola

A)CDMA

B)iDEN

C)EDGE

D)ROM

Q2) Many people store more information on their cell phones than they do on their computers.

A)True

B)False

Q3) What is the bandwidth offered by 3G mobile phones?

Q4) The ____ network is a digital version of the original analog standard for cell phones.

A) TDMA

B) EDGE

C) CDMA

D) D-AMPS

Q5) Global System for Mobile Communications (GSM) uses the ______________________ technique, so multiple phones take turns sharing a channel.

Q6) Identify and define three kinds of peripheral memory cards used with PDAs.

Q7) Identify several uses of SIM cards.

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 14: Report Writing for High-Tech Investigations

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/33491

Sample Questions

Q1) a witness testifying to personally observed facts

A)Decimal numbering

B)Lay witness

C)FTK

D)Examination plan

E)Signposts

F)Verbal report

G)Spoliation

H)Conclusion section

I)MD5

Q2) Explain how hypothetical questions can be used to ensure that you as a witness are basing your opinion on facts expected to be supported by evidence.

Q3) Explain how to use supportive material on a report.

Q4) As with any research paper, write the report abstract last.

A)True

B)False

Q5) Lawyers use services called _________________________ (libraries), which store examples of expert witnesses' previous testimony.

Q6) Briefly explain how to limit your report to specifics.

To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 15: Expert Testimony in High-Tech Investigations

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33492

Sample Questions

Q1) The ____ is the most important part of testimony at a trial.

A) cross-examination

B) direct examination

C) rebuttal

D) motions in limine

Q2) What are the procedures followed during a trial?

Q3) ____ evidence is evidence that exonerates or diminishes the defendant's liability.

A) Rebuttal

B) Plaintiff

C) Inculpatory

D) Exculpatory

Q4) What are some of the questions you should consider when preparing your testimony?

Q5) Explain the differences between discovery deposition and testimony preservation deposition.

Q6) What should you do when preparing for testimony?

Q7) What should you do when you find exculpatory evidence?

Q8) The ______________________ of evidence supports the integrity of your evidence.

Q9) What are some of the reasons to avoid contact with news media during a case? Page 19

To view all questions and flashcards with answers, click on the resource link above.

Page 20

Chapter 16: Ethics for the Expert Witness

Available Study Resources on Quizplus for this Chatper

35 Verified Questions

35 Flashcards

Source URL: https://quizplus.com/quiz/33493

Sample Questions

Q1) Attorneys search ____ for information on expert witnesses.

A) disqualification banks

B) deposition banks

C) examination banks

D) cross-examination banks

Q2) The ABA's ____ contains provisions limiting the fees experts can receive for their services.

A) Code 703

B) Model Code

C) Rule 26

D) Code 26-1.a

Q3) Some attorneys contact many experts as a ploy to disqualify them or prevent opposing counsel from hiring them; this practice is called "____________________."

Q4) The ____ has stated that, unlike attorneys, expert witnesses do not owe a duty of loyalty to their clients.

A) ISFCE

B) IACIS

C) ABA

D) HTCIA

To view all questions and flashcards with answers, click on the resource link above. Page 21

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.