Exam 22: Applying Forensic Science to Networks

arrow

10,781 students have unlocked this exam

  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Examination of digital evidence includes (but is not limited to) which of the following activities?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

B

Preservation of digital evidence can involve which of the following?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

D

When a website is under investigation, before obtaining authorization to seize the systems it is necessary to:

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

Occasionally, an intrusion detection system may trigger an alarm caused by an innocent packet that coincidentally contains intrusion class characteristics. This type of alert is called:

(Multiple Choice)
4.9/5
(33)

Although it was not designed with evidence collection in mind, can still be useful for examining network traffic.

(Multiple Choice)
4.9/5
(36)

What are the limitations of the message digest of digital evidence?

(Essay)
4.7/5
(40)

If you are investigating a homicide and, while executing a search warrant, you find a computer in the suspect's home that appears to contain child pornography, what would you do?

(Essay)
4.9/5
(31)

Different types of analysis include which of the following?

(Multiple Choice)
4.7/5
(41)

No two files can have the same MD5 value.

(True/False)
4.8/5
(44)

A forensic image of a drive preserves which of the following?

(Multiple Choice)
4.9/5
(33)

All forensic tools acquire digital evidence from storage media in the same way.

(True/False)
4.9/5
(32)

Digital investigators should remember that evidence can reside in unexpected places, such as network routers.

(True/False)
4.8/5
(43)

When drawing up an affidavit for a warrant, it is important to specifically mention all desired digital evidence.

(True/False)
5.0/5
(37)

What does a digital signature tell you?

(Essay)
4.8/5
(34)

Chain of custody enables anyone to determine where a piece of evidence has been, who handled it when, and what was done to it since it was seized.

(True/False)
4.8/5
(33)

Other than verifying the integrity of a file, how can the MD5 value of a file be useful?

(Essay)
4.9/5
(43)

Issues to be aware of when connecting to a computer over a network and collecting information include:

(Multiple Choice)
4.9/5
(41)

It is not necessary to sanitize/wipe a hard drive purchased directly from a manufacturer.

(True/False)
4.8/5
(37)

When a computer contains digital evidence, it is always advisable to turn it off immediately.

(True/False)
4.9/5
(37)

Which of the following are situations where a bitstream copy may not be viable?

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 35
close modal

Filters

  • Essay(6)
  • Multiple Choice(14)
  • Short Answer(0)
  • True False(15)
  • Matching(0)