Exam 10: Computer Forensics: Terminology and Requirements

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Evaluation of the ________ and unused space on the physical drive may identify the file systems present and determine if the entire physical size of the hard disk is accounted for.

(Short Answer)
4.8/5
(40)

Extraction of a file pertinent to an examination may be based on the file name and extension, file header, file content, and location on the drive.

(True/False)
4.8/5
(38)

The cluster size for a particular device is specified in which of the following?

(Multiple Choice)
4.9/5
(34)

A file system is the disk management platform employed by a particular operating system.

(True/False)
4.9/5
(33)

Which of the following is a single circular disk with concentric tracks that are turned by spindles under one or more heads?

(Multiple Choice)
4.8/5
(39)

Microsoft's ________ provides more security and is more efficient in terms of utilization of storage space than FAT.

(Short Answer)
4.8/5
(32)

A file system is the combination of a hardware device and computer instructions and data that reside as read-only software on that device.

(True/False)
4.9/5
(27)

ASCII code for defining characters is based on ________ code.

(Multiple Choice)
4.8/5
(35)

Explain how over-reliance on automated programs and self-proclaimed experts pose a problem in computer investigations.How can this problem be overcome?

(Essay)
4.9/5
(41)

What is the first step in the development of computer forensic capabilities? Describe the minimum hardware requirements for a dream field system.

(Short Answer)
4.7/5
(45)

The ________ determines the size of the appropriate FAT based on the number of clusters necessary to represent the entire disk space.

(Short Answer)
4.9/5
(33)

Which of the following tools are the most popular and stand-alone imaging utilities employed for forensic investigators?

(Multiple Choice)
4.8/5
(29)

Which lab system is capable of handling larger workloads simultaneously?

(Multiple Choice)
4.8/5
(38)

Raw image files increase the costs associated with the maintenance of forensic laboratories and software libraries because they exhibit backward compatibility issues.

(True/False)
4.8/5
(41)

Discuss the development within mobile device forensic tools and suggest issues that need to be addressed to improve them.

(Essay)
4.8/5
(43)

________ can be used to identify and eliminate known files through the comparison of calculated hash values to authenticated hash values.

(Short Answer)
4.8/5
(45)

Computer forensics helps ________ in pre-search warrant preparations and post-seizure handling of computer equipment.

(Short Answer)
4.9/5
(41)

Which of the following is NOT a traditional problem in computer investigations?

(Multiple Choice)
4.9/5
(42)

The logical file size refers to the exact size of a file in bytes.

(True/False)
4.9/5
(42)

File systems allow end-users to perceive their document as multiple streams of bytes while providing for its storage in contiguous sectors.

(True/False)
4.8/5
(36)
Showing 41 - 60 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)