Exam 14: Introduction to Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Using Linux to wipe the target drive,the command-line command would be ___ .

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

The chain of custody accounts for the handling of evidence and documents that handling.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

The Windows Registry contains a list of USB devices that have been connected to the machine.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

The Linux log file that can reveal attempts to compromise the system or the presence of a virus or spyware is ______________.

(Multiple Choice)
4.9/5
(37)

_______ is a free tool that can be used to recover Windows files.

(Multiple Choice)
4.8/5
(35)

netstat is a command you can use with a forensic copy of a machine to compare two files.

(True/False)
4.8/5
(39)

The Linux log file that contains activity related to the web server is ______.

(Multiple Choice)
4.8/5
(36)

If you fail to handle evidence properly ___________.

(Multiple Choice)
4.8/5
(27)

The Windows command to list any shared files that are currently open is ___________.

(Multiple Choice)
4.8/5
(39)

Documentation of every person who had access to evidence,how they interacted with it,and where it was stored is called the ________________.

(Multiple Choice)
4.7/5
(28)

Frequently the first responder to a computer crime is the network administrator.

(True/False)
4.8/5
(34)

Using Linux to backup your hard drive,if you want to create a hash,you would use the command-line command ___________.

(Multiple Choice)
4.9/5
(37)

_________ can include logs,portable storage,emails,tablets,and cell phones.

(Multiple Choice)
4.9/5
(35)

In Linux the command to set up a target forensics server to receive a copy of a drive is dd.

(True/False)
4.8/5
(39)

Most Windows logs are turned on automatically.

(True/False)
4.8/5
(31)

You may use Linux to make a ______________ of the hard drive.

(Multiple Choice)
4.8/5
(39)

The Windows Registry lists USB devices that have been connected to the machine.

(True/False)
4.8/5
(32)

The Windows command fc lists all active sessions to the computer.

(True/False)
4.8/5
(28)

Windows logging can be turned on and off with a tool called auditpol.exe.

(True/False)
4.9/5
(38)

In Windows the log that contains events collected from remote computers is the ____________ log.

(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)