Review of Cyber Forensic Tools in International Journal of Engineering Trends and Technology

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the key purposes of applying digital forensics in response to cyber attacks?

  • To encourage more cyber attacks
  • To prevent cyber attacks from happening
  • To increase the severity of cyber attacks
  • To analyze digital media and networks for investigation (correct)

In Cyber Forensic Investigation, what is the primary aim of the Capture & Analysis of digital data?

  • To hide evidence of cyber crimes
  • To ignore digital evidence
  • To promote internet-related theft
  • To establish digital data as evidence in court (correct)

What motivated enterprises to respond to cyber attacks with predetermined actions?

  • The intention to support cyber attackers
  • The increasing number and severity of cyber attacks (correct)
  • The desire to keep the severity of attacks a secret
  • The need to remain vulnerable to attacks

What is NOT a part of the process involved in Cyber Forensic Investigation?

<p>Recovery and investigation on analog media (A)</p> Signup and view all the answers

Why is Cyber Forensic Investigation crucial when responding to cyber attacks?

<p>To recover and investigate material on digital media and networks (C)</p> Signup and view all the answers

What is the main purpose of Cyber Forensic Investigation when dealing with potential internet-related theft?

<p>To prove or disprove whether the internet-related theft has been committed (C)</p> Signup and view all the answers

What type of data can be revealed in a digital forensic investigation?

<p>All of the above (D)</p> Signup and view all the answers

What is the main focus of network forensics?

<p>Monitoring and analyzing LAN/WAN/internet traffic (C)</p> Signup and view all the answers

What is the purpose of the Digital Forensics Framework?

<p>To provide a platform for digital forensics (D)</p> Signup and view all the answers

What is the purpose of the Open Computer Forensics Architecture (OCFA)?

<p>All of the above (D)</p> Signup and view all the answers

What is the purpose of CAINE (Computer Aided Investigative Environment)?

<p>All of the above (D)</p> Signup and view all the answers

Which of the following is not mentioned as a capability of the Digital Forensics Framework?

<p>Analyzing network traffic at the packet level (D)</p> Signup and view all the answers

What was the primary role of computers in the past?

<p>Storing and processing large volumes of data (B)</p> Signup and view all the answers

What is the key factor for selecting cyber forensic tools?

<p>The budget and available experts on the team (D)</p> Signup and view all the answers

What is the primary purpose of using cyber forensic tools?

<p>To provide legally acceptable evidence in computer crime cases (C)</p> Signup and view all the answers

What is the difference between digital forensics and computer forensics?

<p>Computer forensics is a branch of digital forensics (C)</p> Signup and view all the answers

What is the primary role of cyber forensic tools in crime investigation?

<p>To probe the digital evidence and support the case (C)</p> Signup and view all the answers

What is the main purpose of the cyber forensic framework?

<p>To standardize the process of digital forensics (A)</p> Signup and view all the answers

What is SIFT?

<p>A multi-purpose forensic running device with necessary digital forensic tools (D)</p> Signup and view all the answers

Which of the following is a popular multi-purpose forensic platform?

<p>EnCase (D)</p> Signup and view all the answers

What is the purpose of Registry Recon?

<p>To extract registry information and rebuild the registry representation (C)</p> Signup and view all the answers

Which tool is described as a UNIX and Windows-based tool for forensic analysis?

<p>The Sleuth Kit (B)</p> Signup and view all the answers

What is the purpose of Libforensics?

<p>To develop digital forensics applications (B)</p> Signup and view all the answers

Which tool is said to be free of charge and incorporate free open-source forensic tools?

<p>SIFT (D)</p> Signup and view all the answers

What is the title of the paper written by Hussain, Chakravarthy, and Sarma in 2013?

<p>Enhancing ATM Security with Biometric Smart Card (D)</p> Signup and view all the answers

In which year was the paper 'Digital Forensic Trends & Future' published?

<p>2013 (B)</p> Signup and view all the answers

Which paper discusses a technique to prevent false fire alarms and fatal casualties?

<p>Forestalling Fire Disasters with Electronic Noses (D)</p> Signup and view all the answers

What is the focus of the paper by Pollitt in 2010?

<p>History of Digital Forensics (B)</p> Signup and view all the answers

Which journal featured the article 'Security Enhancement of ATM System with Fingerprint and DNA Data'?

<p>The International Journal of Advanced Research in Computer Science and Software Engineering (B)</p> Signup and view all the answers

Which paper highlights a technique to upgrade security in ATM transactions?

<p>Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions (D)</p> Signup and view all the answers

What is the main purpose of computer forensics according to the text?

<p>To capture, process, and investigate data from computers using a methodology that ensures evidence is acceptable in court. (D)</p> Signup and view all the answers

Why is computer forensics important according to the text?

<p>All of the above. (D)</p> Signup and view all the answers

What are the three categories of data that computer forensics focuses on according to the text?

<p>Active data, latent data, and archival data. (B)</p> Signup and view all the answers

What is the main purpose of collecting forensic data according to the text?

<p>To detect crime and identify criminals. (D)</p> Signup and view all the answers

What is the key issue related to collecting digital evidence according to the text?

<p>All of the above. (D)</p> Signup and view all the answers

How does the text define the relationship between computers and crime?

<p>Computers are used as tools for committing crimes. (D)</p> Signup and view all the answers

What is the image hash of the Dell Latitude CPi, E01 computer?

<p>AEE4FCD9301C03B3B054623CA261959A (D)</p> Signup and view all the answers

What operating system was used on the Dell Latitude CPi, E01 computer?

<p>Microsoft Windows XP (B)</p> Signup and view all the answers

When was the Dell Latitude CPi, E01 computer installed?

<p>2004-08-19 22:48:27 (C)</p> Signup and view all the answers

Who is the registered owner of the Dell Latitude CPi, E01 computer?

<p>Greg Schardt (B)</p> Signup and view all the answers

What is the computer account name for the Dell Latitude CPi, E01 computer?

<p>N-1A9ODN6ZXK4LQ (B)</p> Signup and view all the answers

When was the last recorded shutdown date and time for the Dell Latitude CPi, E01 computer?

<p>2004/08/27-10:46:27 (D)</p> Signup and view all the answers

What is the first step in a forensic investigation when tracking cyber criminals?

<p>Computer crime is suspected (C)</p> Signup and view all the answers

Which of the following is NOT one of the rules for a forensic investigator?

<p>Preserve the integrity of data at all costs (A)</p> Signup and view all the answers

Which of the following is an example of an open-source digital forensics tool mentioned in the text?

<p>Sleuth Kit libraries (A)</p> Signup and view all the answers

What is the purpose of generating an MD5 checksum during a forensic investigation?

<p>To verify the integrity of the evidence images (B)</p> Signup and view all the answers

Which step in the forensic investigation process involves attending court and testifying as an expert witness?

<p>Step 14: If required, attend the court and testify as expert witness (D)</p> Signup and view all the answers

What is the purpose of preparing a chain of custody during a forensic investigation?

<p>To document the handling and transfer of evidence (C)</p> Signup and view all the answers

What was the suspected purpose of the abandoned Dell computer found by the authorities?

<p>For hacking purposes (D)</p> Signup and view all the answers

What nickname did Schardt use when going online?

<p>Mr.Evil (A)</p> Signup and view all the answers

How did Schardt allegedly attempt to obtain credit card numbers, usernames, and passwords?

<p>By intercepting internet traffic from wireless hotspots (A)</p> Signup and view all the answers

What was one of the tasks involved in the computer forensics investigation of Schardt's case?

<p>Determining the MAC and last allocated IP address of the computer (B)</p> Signup and view all the answers

What information was sought regarding the computer's owner?

<p>Their email address and hacker handle (A)</p> Signup and view all the answers

What was one of the sources investigators planned to examine for relevant information?

<p>The computer's Recycle Bin (C)</p> Signup and view all the answers

What is the purpose of Look@LAN tool in the context of the text?

<p>Monitoring network traffic (A)</p> Signup and view all the answers

Which tool is specifically designed for password recovery in Microsoft Windows?

<p>Cain and Abel (B)</p> Signup and view all the answers

What is the primary function of NetStumbler?

<p>Wireless LAN detection (D)</p> Signup and view all the answers

Which tool is an Internet Relay Chat client for Windows?

<p>mIRC (C)</p> Signup and view all the answers

What is the main feature of Cain and Abel tool according to the text?

<p>Password recovery (A)</p> Signup and view all the answers

Which tool facilitates the detection of Wireless LANs using different WLAN standards?

<p>NetStumbler (B)</p> Signup and view all the answers

What kind of data can the ultramodern version of the tool mentioned in the text recover from smart phones?

<p>Call statistics, photos, SMS, and text messages (A)</p> Signup and view all the answers

What is the primary purpose of U.HELIX3 in digital forensics?

<p>To provide a virtual forensic environment for incident response (C)</p> Signup and view all the answers

What type of data can the device discussed in the text acquire during a forensic analysis?

<p>Physical memory contents and chat logs (A)</p> Signup and view all the answers

What happened to the Helix3 project after the release of the Free version in 2009R1?

<p>It was taken over by a commercial vendor (A)</p> Signup and view all the answers

Which of the following is NOT one of the types of data that the device mentioned in the text can acquire during forensic analysis?

<p>Sports scores and news updates (C)</p> Signup and view all the answers

What is the main function of the software component in the device discussed in the text?

<p>To generate reports based on analyzed data (C)</p> Signup and view all the answers

What is the main focus of database forensics according to the text?

<p>Analyzing database contents, log files, and in-RAM data (B)</p> Signup and view all the answers

Which of the following is NOT a capability of computer forensics mentioned in the text?

<p>Investigating call logs and text messages from mobile devices (A)</p> Signup and view all the answers

What is the main purpose of mobile device forensics according to the text?

<p>Recovering digital evidence from mobile devices, including call logs, text messages, and communication stores (B)</p> Signup and view all the answers

Which of the following is NOT mentioned as a type of digital forensics framework in the text?

<p>Financial Fraud Forensics (B)</p> Signup and view all the answers

What is the primary focus of database forensics according to the text?

<p>Analyzing database contents, log files, and in-RAM data (A)</p> Signup and view all the answers

What is the main purpose of using cyber forensic tools according to the text?

<p>Manipulating and analyzing data (B)</p> Signup and view all the answers

Which paper discusses a technique to prevent false fire alarms and fatal casualties?

<p>Kanakam, Hussain, and Chakravarthy, 'Electronic noses: Forestalling fire disasters: A technique to prevent false fire alarms and fatal casualties' (B)</p> Signup and view all the answers

Which paper highlights a technique to upgrade security in ATM transactions?

<p>Prasanthi et al., 'Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions' (D)</p> Signup and view all the answers

Which paper discusses the focus of digital forensics trends and future?

<p>Dezfoli et al., 'Digital Forensic Trends &amp; Future' (C)</p> Signup and view all the answers

Which paper focuses on the history of digital forensics?

<p>Pollitt, 'A History of Digital Forensics' (C)</p> Signup and view all the answers

Which paper discusses a comparative study of digital forensic tools?

<p>Jain and Kalbande, 'A Comparative Study based Digital Forensic Tool: Complete Automated Tool' (B)</p> Signup and view all the answers

Which paper discusses a novel scheme for providing security using biometric smart cards?

<p>Hussain, Chakravarthy, and Sarma, 'BSC: A Novel Scheme for Providing Security using Biometric Smart Card' (D)</p> Signup and view all the answers

What is the primary purpose of the UFED solution mentioned in the text?

<p>To acquire, analyze, and act on mobile data efficiently (C)</p> Signup and view all the answers

What is the purpose of free computer forensic tools?

<p>To assist law enforcement agencies in crime investigations (C)</p> Signup and view all the answers

What is the main reason cited for the increasing prominence of cyber forensics?

<p>The increased use of digital data and mobile phones (C)</p> Signup and view all the answers

What is the primary goal of Cyber Forensic Investigation according to the text?

<p>To recover and analyze digital evidence for legal proceedings (A)</p> Signup and view all the answers

Which of the following is NOT mentioned as a capability of the UFED solution?

<p>Developing new mobile forensic techniques (A)</p> Signup and view all the answers

What is the primary role of cyber forensic tools according to the text?

<p>To assist in the investigation of cybercrimes (A)</p> Signup and view all the answers

What is one of the key features of X-Ways Forensics according to the text?

<p>It can perform bulk hash calculations and view binary data structures using templates. (C)</p> Signup and view all the answers

Which of the following file systems is NOT supported by X-Ways Forensics?

<p>HFS+ (B)</p> Signup and view all the answers

What is one of the capabilities of X-Ways Forensics mentioned in the text?

<p>It can automatically detect and recover deleted or lost hard disk partitions. (C)</p> Signup and view all the answers

Which of the following is NOT mentioned as a feature of X-Ways Forensics?

<p>It can perform live forensics on running systems. (D)</p> Signup and view all the answers

What is one of the features of X-Ways Forensics related to data integrity?

<p>It can verify the authenticity of data using cryptographic hashing. (A)</p> Signup and view all the answers

What is one of the capabilities of X-Ways Forensics mentioned in the text?

<p>It has a built-in case management system for organizing evidence. (C)</p> Signup and view all the answers

Related Documents

Forensics.pdf
Week 3 and 4 - Tutorials.pdf

More Like This

Use Quizgecko on...
Browser
Browser