Exam 10: Computer Forensics: Terminology and Requirements

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following programs reads disks a track at a time and calculates an algorithmic signature represented by unique file identifiers?

(Multiple Choice)
4.9/5
(38)

During analysis of digital evidence, which of the following elements is addressed?

(Multiple Choice)
4.9/5
(43)

The statement of compliance or noncompliance with certain specifications or other requirements must be included in a report.

(True/False)
4.8/5
(44)

Which of the following is NOT true of computer forensic science?

(Multiple Choice)
4.8/5
(42)

The use of ________ may force agencies to update software licenses or lose company support.

(Short Answer)
4.9/5
(35)

What are the two types of data extraction?

(Multiple Choice)
4.9/5
(31)
Match the techno term with the visual comparison.
Megabyte
one-half page of text
Kilobyte
Small novel
Nibble
a single character
Correct Answer:
Verified
Premises:
Responses:
Megabyte
one-half page of text
Kilobyte
Small novel
Nibble
a single character
Terabyte
one tenth of the Library of Congress
Gigabyte
truck full of paper
(Matching)
4.8/5
(29)

Forensic laboratories should be equipped with ________ so that criminal contraband can be permanently removed from suspect machines.

(Short Answer)
4.9/5
(43)

Describe the five general categories of data analysis tools.Illustrate with an example how file viewer software is used in child pornography cases.

(Essay)
4.9/5
(36)

The advent of ________ required a corresponding mechanism to ensure that applications did not interfere with one another's data storage.

(Short Answer)
4.8/5
(38)

Computer forensics helps which of the following groups in supporting claims of wrongful termination, sexual harassment, and age discrimination?

(Multiple Choice)
4.8/5
(37)

________ is the fear of new technology.

(Short Answer)
4.9/5
(39)

Overt files are not hidden, deleted, or encrypted.

(True/False)
4.8/5
(35)

Electronic data recovery should be reserved for instances when the instrumentality of computer technology has been demonstrated.

(True/False)
4.8/5
(33)

What kind of programs should investigators employ to reveal hidden and deleted files, unlock encrypted files, and detect steganography?

(Multiple Choice)
4.8/5
(35)

Which of the following can be attributed to the demand for a centralized disk operating system and the birth of DOS?

(Multiple Choice)
4.8/5
(44)

In which system are interpretative rules associated with a base of two with integers represented by zeroes and ones?

(Multiple Choice)
4.7/5
(49)

Forensic imaging programs must be capable of making a bitstream duplicate or an image of an original disk or partition onto fixed or removable media.

(True/False)
4.9/5
(33)

________ enable investigators to perfectly duplicate a suspect drive onto a form of removable media.

(Short Answer)
4.8/5
(37)
Match the software with the category.
En Case Forensic
imaging and verification software
Disk edit
access data
Byte Back
guidance software
Correct Answer:
Verified
Premises:
Responses:
En Case Forensic
imaging and verification software
Disk edit
access data
Byte Back
guidance software
FTK Imager
wiping program
The Coroner’s Toolkit
data recovery/extraction tool
(Matching)
4.7/5
(37)
Showing 21 - 40 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)