Filters
Question type

Study Flashcards

________ links are simply pointers to other files and aren't included in the link count.​

Correct Answer

verifed

verified

Match each term with its definition: -?A key part of the Linux file system, these informatuin nodes contain descriptive file or directory data, such as UIDS, GIDs, modification times, access times, creation times, and file locations.


A) B*-tree
B) data block
C) logical block
D) inodes
E) Volume Control Block
F) Allocation Block
G) header node
H) data fork
I) superblock
J) resource fork

Correct Answer

verifed

verified

Select below the command that can be used to display bad block information on a Linux file system, but also has the capability to destroy valuable information.​


A) ​dd
B) ​fdisk
C) badblocks
D) mke2fs

Correct Answer

verifed

verified

After making an acquisition on a Mac computer, the next step is examining the image of the file system with a forensics tool. ​Explain how to select the proper forensics tool for the task.

Correct Answer

verifed

verified

After making an acquisition, the next st...

View Answer

In UNIX and Linux, everything except monitors are considered files.​

Correct Answer

verifed

verified

Adding the _____________ flag to the ​ls -l command has the effect of of showing all files beginning with the "." character in addition to other files.


A) -s​
B) ​-d
C) -l
D) -a

Correct Answer

verifed

verified

D

Capitalization, or lack thereof, makes no difference with UNIX and Linux commands.​

Correct Answer

verifed

verified

________________ is a specialized carving tool that can read many image file formats, such as RAW and Expert Witness.​


A) ​AccessData FTK
B) ​X-Ways Forensics
C) Guidance Software EnCase
D) Foremost

Correct Answer

verifed

verified

​On Mac OS X systems, what utility can be used to encrypt ​/ decrypt a user's home directory?


A) ​Disk Utility
B) ​BitLocker
C) FileVault
D) iCrypt

Correct Answer

verifed

verified

What are bad blocks, and how do you find them?​

Correct Answer

verifed

verified

Some forensics tools ignore inode 1 and fail to recover valuable data for cases. Someone trying to mislead an investigator can access the bad block inode, list good sectors in it, and then hide information in these supposedly "bad" sectors. To find bad blocks on your Linux computer, you can use the badblocks command, although you must log in as root to do so. Linux includes two other commands that supply bad block information: mke2fs and e2fsck. The badblocks command can destroy valuable data, but the mke2fs and e2fsck commands include safeguards that prevent them from overwriting important information.

​________________ contain file and directory metadata and provide a mechanism for linking data stored in data blocks.


A) ​Blocks
B) ​Clusters
C) Inodes
D) Plist files

Correct Answer

verifed

verified

A hash that begins with "$6" in the shadow file indicates that it is a hash from what hashing algorithm? ​


A) ​MD5
B) ​Blowfish
C) SHA-1
D) SHA-512

Correct Answer

verifed

verified

UNIX and Linux ​have four components defining the file system. Identify and give a brief description of each.

Correct Answer

verifed

verified

UNIX​/ Linux has four components definin...

View Answer

Match each term with its definition: -?A node that stores information about B*-tree file.


A) B*-tree
B) data block
C) logical block
D) inodes
E) Volume Control Block
F) Allocation Block
G) header node
H) data fork
I) superblock
J) resource fork

Correct Answer

verifed

verified

Explain why one should have Apple factory training before attempting an acquisition on a Mac computer.​

Correct Answer

verifed

verified

To examine a Mac computer, you need to m...

View Answer

Match each term with its definition: -?A block in the Linux file system that specifies and keep tracks of the disk geometry and available space and manages the file system.


A) B*-tree
B) data block
C) logical block
D) inodes
E) Volume Control Block
F) Allocation Block
G) header node
H) data fork
I) superblock
J) resource fork

Correct Answer

verifed

verified

I

Where is the root user's home directory located on a Mac OS X file system?​


A) ​​/ root
B) ​​/ private​/ var​/ root
C) ​/ private​/ spool​/ root
D) ​/ home​/ root

Correct Answer

verifed

verified

Within the ​/ etc​/ shadow file, what field contains the password hash for a user account if one exists?​


A) ​1st field
B) ​2nd field
C) 3rd field
D) 4th field

Correct Answer

verifed

verified

Linux is a certified UNIX operating system.​

Correct Answer

verifed

verified

Explain the differences between a hard link and a symbolic link.​

Correct Answer

verifed

verified

A hard link is a pointer that allows acc...

View Answer

Showing 1 - 20 of 48

Related Exams

Show Answer