Create an account
FTK Imager supports the encryption of forensic image files. What two methods may be used for encryption?
-Certificate (.pfx, .p12, .pem)
When creating a file hash list in imager, what information is included in the resulting file?
-File names (Includes path)
Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2?
FTK Imager allows what type of evidence to be added?
-Contents of a folder
Name three features of the image mounting function in imager and in FTK.
-Navigate file systems in Windows Explorer (Ext2, HFS+, etc) normally not recognized.
-Run antivirus software against mounted images.
-Make "Virtual writes" to the mounted image using a cache file?
-Run third party software against the mounted image
-Navigate the directory structure without making changes using the "Read-Only" mounting option.
What types of image file formats can be created by imager?
-RAW (DD) .001
-Advanced Forensic Format .AFF
-AD Custom Content (Logical Image) .AD1
When creating a forensic image using Imager, what happens automatically to the summary information file regarding Location and File Naming
Location - created in the same directory as the original image file.
File Naming - uses the same file name as the original image file with a .txt extension added.
True or False - FTK Imager includes write blocking capability to protect a drive during acquisition?
False - Although Imager is not included to make writes to a system, the Windows OS it runs on may still make writes. A hardware write blocker should be used whenever possible.
Name four characteristics of custom content images.
-File extension of .AD1
-Logical files only (no file slack)
-Can include recursive sub-directories
-Can include unallocated space
Which AccessData forensic tools have Hex Value Interpreter functionality?
Name three functions of a Registry Viewer Summary Report
-Can display specific values within a registry key
-Wildcard function allows creation of registry templates
-Multiple areas of a registry file can be documented.
Name two functions of a Registry Viewer Common Area?
-Provides shortcuts or bookmarks for frequently accessed registry keys.
-Additional keys can be added by the user for customization.
Name three fields shown for a windows user's account in the registry viewer properties pane when viewing the SAM file.
-SID Unique Identifier
-Last Logon Time
-Last Password Change
What types of searches can be performed in Registry Viewer?
-Standard Search shows the next occurrence of a search term.
-Advanced search shows all occurrences of a search term.
-Search for key with a last written date (During or before or after a given date)
How is the golden dictionary in the PRTK created?
-It is auto-generated from successfuly recovered passwords on the local computer.
Name three methods by which a recovered password may be documented using PRTK.
-A PDF report can be documented from the File menu.
-A password can be copied onto the windows clipboard.
-A decrypted version of a file can be created.
Name the four types of attacks listed in PRTK Help > Recovery Modules menu?
Name the four major sections of a PTRK attack profile.
Which of the 5 registry files (SAM, SYSTEM, SECURITY, SOFTWARE, NTUSER.DAT) can be attacked by PRTK for possible encrypted information or passwords?
What types of fields are available in the PRTK Biographical Dictionary?
-Name, Address, City, State, Zip code, Country, Phone Number, Date, Number, Word, Phrase.
How can an automatically carved item's location and parent be determined in FTK?
-When clicking on the newly carved item, its parent will be listed in the path shown at the bottom of the screen. The parent name is to the left of the childs name.
-The carved item's location (offset/cursor position) within the parent is indicated by the number in the file name.
What are the major sections in the FTK report?
Name three restrictions of a user assigned case reviewer status in FTK.
-Cannot view Privlileged files
-Cannot add Evidence
-Cannot perform additional analysis
-cannot decrypt files
-cannot create filters
What would be the advantage of performing data carving after case creation?
-It can be performed on a smaller group of files (checked, Quick Picked) instead of on the entire case.
Which of the following files would not be found in the internet/chat files container in the FTK overview tab?
B.Internet Explorer index.dat
What are the advantages of importing a list of search terms into FTK's Indexed search tab?
-Faster than manual entry
-A list of commonly searched terms can be used in multiple cases.
List the steps needed for recovery of an EFS encrypted file in FTK.
-Identify the encrypted file (Overview > File Status > Encrypted files).
-view the file i the explore tab tree; view the $EFS stream in file List.
-note the windows user who in encrypted the file in $EFS stream.
-export then SAM and SYSTEM files for decryption in PRTK. (Dictionary attack)
-After obtaining windows password from SAM file, input the password into FTK
-view decrypted file as a subitem of encrypted file or file status > Decrypted Files
When can the expand compound files processing option be performed?
-after case creation -evidence >additional analysis
what types of files benefit from the expand compound files processing option?
-Zip files, EVTX, Mail (PST, mbox,msg,NSF), MS Office OLE, Registry, SQLite)
What five types of customized settings can be shared among cases via the manage menu in FTK?
-KFF hash sets and groups
what are the two options for generating thumbnails of video files in FTK?
-Percentage (Every "n" percent)
-Interval (Every "n" seconds)
How is the volatile tab in FTK populated?
-Through the Manage >Add Remote data menu
-Through the manage >Import memory Dump
what is the advantage of opening registry files using registry viewer within a case in FTK?
-A more detailed view is available than the FTK default view.
-Reports generated in registry viewer can be linked to the FTK report.
which applications can be launched from within FTK?
- Language Selector
Which registry files will display content in a HTML table in FTK using default processing?
-SAM (User account info)
-SOFTWARE (Install info)
-SYSTEM (Time zone info)
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together