FIS 201 – Digital Forensics Study Guide
Shown below is EXIF data associated with a file used as part of a cyberbullying attack. What kind
of device created the file? - ANS✔✔ A digital camera
An investigator took this picture at a crime scene. Please indicate the SD memory card in the
picture (SD stands for "Secure Digital"). - ANS✔✔ 434, 228
the card in the laptop
The photo above is a nice illustration of a close up picture that doesn't have any context. What
kind of digital device is being photographed? - ANS✔✔ A laptop computer
Cell phones should be packaged in a . . . in order to prevent them sending or receiving wireless
signals. - ANS✔✔ faraday cage
A wife believes that her husband has been carrying on an illicit affair, and deleting any text
messages he receives from his side chick. What method should an investigator use to recover
these messages? - ANS✔✔ Targeted
I am extracting evidence from a seized hard drive. I attach the write blocker, and use a hash
algorithm to create the following signature string: dbf1cb1ec3dbc6d74cb5ef9182e7fbf8
I copy the information onto a blank hard drive, and run the same algorithm to create the
following signature string: dbf1cb1ec3dbc6d74cb5ef9182e7fbf8
What conclusion should I draw from these results? - ANS✔✔ I have made a 100% complete
copy of the data on the seized hard drive.
We are able to recover digital data because even though we need a computer to decipher it, the
information exists in the physical world. - ANS✔✔ True
Shown below is EXIF data associated with a file used as part of a cyberbullying attack. What kind
of device created the file? - ANS✔✔ A digital camera
An investigator took this picture at a crime scene. Please indicate the SD memory card in the
picture (SD stands for "Secure Digital"). - ANS✔✔ 434, 228
the card in the laptop
The photo above is a nice illustration of a close up picture that doesn't have any context. What
kind of digital device is being photographed? - ANS✔✔ A laptop computer
Cell phones should be packaged in a . . . in order to prevent them sending or receiving wireless
signals. - ANS✔✔ faraday cage
A wife believes that her husband has been carrying on an illicit affair, and deleting any text
messages he receives from his side chick. What method should an investigator use to recover
these messages? - ANS✔✔ Targeted
I am extracting evidence from a seized hard drive. I attach the write blocker, and use a hash
algorithm to create the following signature string: dbf1cb1ec3dbc6d74cb5ef9182e7fbf8
I copy the information onto a blank hard drive, and run the same algorithm to create the
following signature string: dbf1cb1ec3dbc6d74cb5ef9182e7fbf8
What conclusion should I draw from these results? - ANS✔✔ I have made a 100% complete
copy of the data on the seized hard drive.
We are able to recover digital data because even though we need a computer to decipher it, the
information exists in the physical world. - ANS✔✔ True