Exam 19: Computer Forensics
Exam 1: Introduction109 Questions
Exam 2: The Crime Scene136 Questions
Exam 3: Physical Evidence80 Questions
Exam 4: Crime Scene Reconstruction: Blood Stain Pattern Analysis96 Questions
Exam 5: Death Investigation118 Questions
Exam 6: Fingerprints115 Questions
Exam 7: Forensic Biometrics92 Questions
Exam 8: The Microscope101 Questions
Exam 9: Firearms, Tool Marks, and Other Impressions95 Questions
Exam 10: Matter, Light, and Glass Examination110 Questions
Exam 11: Hairs and Fibers120 Questions
Exam 12: Drugs141 Questions
Exam 13: Forensic Toxicology104 Questions
Exam 14: Metals, Paint, and Soil91 Questions
Exam 15: Forensic Serology91 Questions
Exam 16: DNA: The Indispensable Forensic Science Tool105 Questions
Exam 17: Forensic Aspects of Fire and Explosion Investigation142 Questions
Exam 18: Document Examination67 Questions
Exam 19: Computer Forensics109 Questions
Exam 20: Mobile Device Forensics77 Questions
Select questions type
Software comprises the physical components of the computer.
Free
(True/False)
4.9/5
(26)
Correct Answer:
False
An investigator would like to take a forensic "image" of a suspect's HDD. What is the primary goal in obtaining data from a HDD? What tools can the investigator use to achieve this goal?
Free
(Essay)
4.8/5
(37)
Correct Answer:
(should include points such as):
The primary goal in obtaining data from a HDD is to do so without altering even one bit of data. A Message Digest 5 (MD5)/Secure Hash Algorithm (SHA)takes a "fingerprint" of a hard disk drive (HDD)before and after forensic imaging. A forensic computer examiner would run such an algorithm to demonstrate that the forensic image recovered is all-inclusive of the original contents and that nothing was altered in the process.
List four mobile services that are offered on today's mobile devices and explain their potential evidentiary value.
(Essay)
4.8/5
(26)
Which of the following actions taken at the crime scene involving a computer is incorrect?
(Multiple Choice)
4.7/5
(38)
Investigators would want to copy blank or unused portions of the HDD to preserve ________ data.
(Essay)
4.7/5
(31)
An IP address may lead to the identity of the person who was using a particular computer to access the Internet.
(True/False)
4.7/5
(29)
An IP address typically takes the form ###.###.###.###, in which ### can be any number from 0 to 255.
(True/False)
4.9/5
(34)
Most web browsers use a(n)________ to expedite and streamline browsing.
(Multiple Choice)
4.9/5
(40)
ROM stores software programs and instructions while the computer is turned on.
(True/False)
4.8/5
(39)
Which of the following carries data from one hardware device to another?
(Multiple Choice)
5.0/5
(37)
Which of the following is/are potential sources for forensic evidence on a suspect's personal computer?
(Multiple Choice)
4.9/5
(40)
Match the word in Column 1 to its definition in Column 2. Each answer can only be used once.
A)A set of instructions compiled into a program that performs a particular task
B)A group of sectors in multiples of two; typically the minimum space allocated to a file
C)A standard method by which Internet sites are addressed
D)All data that the operating system is presently aware of, and thus is readily accessible to the user
E)Files placed on a computer from a visited website that are used to track visits and usage of that site
F)Hardware or software designed to protect against intrusions into a computer network
G)Typically the main storage location within the computer, consisting of magnetic platters contained in a case
H)The smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes
I)The main chip within the computer, also referred to as the brain of the computer. This microprocessor chip handles most of the operations (code and instructions)of the computer.
J)Portions of visited Web pages placed on the local hard disk drive to facilitate quicker retrieval once revisited
K)The main system board of a computer (and many other electronic devices)that delivers power, data, and instructions to the computer's components
L)Areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless
-Cluster
(Essay)
4.8/5
(31)
Extraction of data from a mobile device can be done on a physical level and a(n)________ level.
(Essay)
4.8/5
(29)
________ is a set of instructions compiled into a program that performs a particular task.
(Essay)
4.9/5
(34)
What type of memory stores software programs and instructions while the computer is turned on? What special considerations must be taken to preserve this type of memory on a computer at a crime scene?
(Essay)
4.8/5
(41)
Showing 1 - 20 of 109
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)