Exam 10: Computer Forensics: Terminology and Requirements
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
Which of the following is NOT an advantage attributed to the introduction of disk operating systems?
Free
(Multiple Choice)
5.0/5
(43)
Correct Answer:
A
Which of the following is an example of a disk recovery and extraction tool?
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
B
The BIOS is stored in the Encrypting File System (EFS).
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
The familiarity and utilization of ________ may result in a situation where investigators know just enough to make them potentially hazardous to the investigation.
(Short Answer)
4.8/5
(44)
Which of the following refers to the area of a computer that holds data during processing and is erased when power is shut down?
(Multiple Choice)
4.8/5
(30)
A(n) ________FAT is used if a disk requires less than 65,536 but more than 4,096 clusters.
(Multiple Choice)
4.9/5
(41)
Which of the following are the three primary components of a computer?
(Multiple Choice)
4.8/5
(45)
Which of the following factors is most important in determining the type of tool to be used in a computer forensics investigation?
(Multiple Choice)
4.8/5
(33)
Which of the following terms refers to a suspect's guilty mind or intent, as might be demonstrated by the use of data hiding or drive wiping techniques?
(Multiple Choice)
4.7/5
(38)
Most contemporary integrated packages have stand-alone imaging programs.
(True/False)
4.8/5
(34)
The physical extraction phase identifies and recovers files and data based on the installed operating system, file system, and/or application.
(True/False)
4.9/5
(47)
Which of the following programs extends decryption capabilities beyond a single computer by using the distributed power of multiple computers across a network to decrypt files and recover passwords?
(Multiple Choice)
4.9/5
(43)
Traditionally, suspect drivers and disks were copied at the ________ level.
(Short Answer)
4.8/5
(30)
Which of the following is NOT a step included in the logical extraction of data?
(Multiple Choice)
4.8/5
(44)
A ________ is the number of bytes that represent about one-half page of text.
(Short Answer)
4.8/5
(37)
Many agencies do not avail themselves of the free training courses provided by the FBI and the Federal Law Enforcement Training Center as the agencies are unable to afford the loss of personnel.
(True/False)
4.7/5
(33)
________ allow front-page viewing of multiple files, thus enabling investigators to quickly identify questionable graphics files.
(Short Answer)
4.8/5
(35)
The development and regular review of which of the following is essential as technology changes?
(Multiple Choice)
4.8/5
(31)
________ are devices and data at the electronic or machine level.
(Short Answer)
4.8/5
(46)
Showing 1 - 20 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)