Exam 18: Digital Evidence on Unix Systems
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
On UNIX systems, e-mails and all attachments are stored as plaintext in
"/var/spool/mail," or "/var/mail," or in a directory under the user's account.
(True/False)
4.7/5
(38)
Why is it important to determine the level of network connectivity on a UNIX system as soon as possible?
(Multiple Choice)
4.8/5
(46)
The "istat" command, found in The Coroner's Toolkit, can be used to examine specific inode bitmaps.
(True/False)
4.8/5
(31)
When examining a UNIX system, searching for network traces is not usually necessary.
(True/False)
4.8/5
(34)
Deleting a file has the effect of preserving its inode until it is reused because:
(Multiple Choice)
4.8/5
(30)
The mainstay of acquiring digital evidence using UNIX is the "icopy" command.
(True/False)
4.8/5
(39)
The file system mount table shows local and remote file systems that are automatically mounted when the system is booted. This information is stored in:
(Multiple Choice)
4.9/5
(38)
UNIX log files (or those of any operating system, for that matter) can provide a great deal of useful information to the examiner.
(True/False)
4.9/5
(39)
When a target system is connected to other systems in remote locations, it is expedient for the digital investigator to access these systems via remote access.
(True/False)
4.9/5
(37)
Showing 21 - 30 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)