Exam 12: Digital Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____ is used to sniff network traffic.

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

C

There are various ways to prepare sterile media, but a common method is to write ____ to every block on the device to erase any previous contents and then, if needed, format the device with a file system.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

B

Match each item with a statement below. a.Discoverable f.Carving b.Cartwheeling g.FTK c.Jump bag h.EnCase Forensic d.Desiccants i.Write blocker e.Faraday Cage -Has a set of all the portable equipment and tools needed for an investigation

Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Verified

C

Match each item with a statement below. a.Discoverable f.Carving b.Cartwheeling g.FTK c.Jump bag h.EnCase Forensic d.Desiccants i.Write blocker e.Faraday Cage -Drying agents to absorb any moisture

(Short Answer)
4.8/5
(33)

When prioritizing collected evidence, which term refers to the likelihood that the information will be useful?

(Multiple Choice)
5.0/5
(43)

Match each item with a statement below. a.Discoverable f.Carving b.Cartwheeling g.FTK c.Jump bag h.EnCase Forensic d.Desiccants i.Write blocker e.Faraday Cage -A technique in which a term is extended via links to subsidiary terms

(Short Answer)
4.9/5
(30)

One of the more perplexing problems in collecting digital data concerns so-called volatile information, such as the contents of a ____.

(Multiple Choice)
4.8/5
(31)

____________________ is collecting evidence from a currently running system.

(Short Answer)
4.7/5
(34)

Why is tagging equipment vital to the organization's business as evidence a very real issue for commercial organizations?

(Essay)
5.0/5
(36)

The ____ handles computer crimes that are categorized as felonies.

(Multiple Choice)
4.9/5
(38)

Match each item with a statement below. a.Discoverable f.Carving b.Cartwheeling g.FTK c.Jump bag h.EnCase Forensic d.Desiccants i.Write blocker e.Faraday Cage -An enclosure that ensures that electromagnetic waves are blocked so that a device cannot transmit or receive radio waves while in custody

(Short Answer)
4.7/5
(38)

Which audience is interested in analysis report issues in terms of compliance with organizational policies?

(Multiple Choice)
4.8/5
(35)

In a live acquisition, the investigator has a good idea of what the attacker did to the system during the compromise.

(True/False)
4.8/5
(29)

An organization's ____ policy must spell out the procedures for initiating the investigative process, including management approvals.

(Multiple Choice)
4.8/5
(35)

In a dead acquisition, an investigator seeks to obtain a forensic image of the disk or device.

(True/False)
4.8/5
(36)

Why does encrypted information present challenges to forensic investigators?

(Essay)
4.8/5
(31)

In large organizations, ____ know operating systems and networks as well as how to interpret the information gleaned by the examiners.

(Multiple Choice)
4.9/5
(37)

If an organization routinely searches every employee's computer or if it conducts truly random searches and uncovers potential evidentiary material, then the findings are admissible in any legal proceeding.

(True/False)
5.0/5
(32)

Media that is used to collect digital evidence must be forensically ____.

(Multiple Choice)
4.9/5
(33)

List the four steps considered to be at the heart of digital evidence collection.

(Essay)
4.7/5
(43)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)