Exam 15: Computer Basics for Digital Investigators
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
By default, computers will boot from a floppy disk if one is present in the system.
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
On Intel-based computers, system date and time information is maintained in:
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
Many digital forensics laboratories have the capability to recover overwritten data from a hard drive.
(True/False)
4.8/5
(36)
The number of sectors on any hard drive is calculated by multiplying its CHS values.
(True/False)
4.9/5
(35)
Sectors are 557 bytes long but only 512 bytes are used to store data.
(True/False)
4.7/5
(37)
Describe the main steps that your computer takes during the boot process from the time you press the power switch to the first appearance of the operating system. Why is this important to a forensic examiner?
(Essay)
4.8/5
(25)
The Sun OpenBoot PROM can be interrupted by depressing the "Stop" key.
(True/False)
4.9/5
(31)
What is the storage capacity of a hard drive with 64 heads, 63 sectors, and 787 cylinders?
(Essay)
4.8/5
(30)
Encrypted data can be recovered using which of the following methods?
(Multiple Choice)
4.8/5
(38)
Although storage media come in many forms, hard disks are the richest sources of digital evidence on computers.
(True/False)
4.9/5
(35)
How do you remove data from a hard drive to prevent it from being recovered (e.g., delete partition table, reformat drive, delete files)?
(Essay)
4.8/5
(42)
Digital forensics examiners do not need to be concerned about the distinction between little-endian and big-endian representations because automated tools make the necessary translation.
(True/False)
4.9/5
(33)
The storage capacity of a hard drive with 256 heads, 63 sectors, and 1024 cylinders is:
(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 34
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)