- Computer Forensics Interview Questions
What is MD5 checksum?
MD5 checksum is a 128 bit value that helps identify the uniqueness of a file
What is an
An ISO file contains an application or CD image of several files and executables.
What is a SAM file?
A SAM, or Security Accounts Manager,
What is data mining?
Data mining is
What is data carving?
Data carving
What is steganography?
Steganography conceals a message within a message.
Describe the SHA-1 hash
The secure hash algorithm 1 is a hash algorithm that creates a 160-bit or 20-byte message digest.
How would you handle retrieving data from an encrypted hard drive?
First determine the encryption method used. For simple encryption types, try finding the configuration file. Use tools such as EaseUS Data Recovery, Advanced EFS Data Recovery or
What is an ACL?
An access control list. It is a list used to grant users and processes access to system resources.
How would you be able to tell at the hex level that
Run
Run
This will return information about deleted files and the
What is
XOR (exclusive OR)
If you needed to encrypt and compress data for transmission, which would you do first and why?
Compress then encrypt. Because encryption takes up resources and can be cumbersome to perform, it makes sense to compress the data first.
What is the difference between threat, vulnerability and risk?
A threat is what a potential attacker poses, by potentially using a system vulnerability that
A threat is the possibility of an attack.
A vulnerability is a weakness in the system.
Risks are items that may cause harm to the system or organization
https://resources.infosecinstitute.com/category/computerforensics/introduction/computer-forensics-interview-questions/#gref