Exam 24: Forensic Techniques

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The ____ file is used when Windows goes into hibernation.

Free
(Multiple Choice)
5.0/5
(30)
Correct Answer:
Verified

A

The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

True

____ will search through a file or folder and report on all the ASCII strings it finds.

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

B

The printer spool files will have extensions of ____.

(Multiple Choice)
4.9/5
(24)

The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.

(Short Answer)
4.9/5
(35)

What is the pre-incident preparation that must take place for a CSIRT?

(Essay)
4.9/5
(37)

The ____ provides the platform on which computer hardware is managed and made available to the computer software applications.

(Multiple Choice)
4.9/5
(35)

List UNIX/Linux systems files that are of particular interest to the forensic examiner.

(Essay)
4.7/5
(33)

A ____ of a hard disk is a bit by bit duplicate, including the boot sector, the partition table, all partitions, hidden files, bad sectors, and even the unallocated space on the hard drive.

(Multiple Choice)
4.9/5
(39)

A ____ is a hardware device or software program designed to prevent any write operations from taking place on the original media.

(Multiple Choice)
4.8/5
(32)

List the steps in the incident response process.

(Essay)
4.8/5
(38)
Match each item with a statement below.
A group of individuals at an organization responsible for detecting, investigating, solving, and documenting computer security incidents
Honeypot
A computer that is made deliberately vulnerable in order to make it attractive to hackers
CSIRT
A symbolic representation of a family of strings that can be generated from the expression
Slack space
Correct Answer:
Verified
Premises:
Responses:
A group of individuals at an organization responsible for detecting, investigating, solving, and documenting computer security incidents
Honeypot
A computer that is made deliberately vulnerable in order to make it attractive to hackers
CSIRT
A symbolic representation of a family of strings that can be generated from the expression
Slack space
The part of a cluster that is not used when a file is written to it
Restore Point
A snapshot of the state of the system at a point in time
Regular expression
(Matching)
4.7/5
(36)

Each RP folder contains a set of files that were changed since the last Restore Point.

(True/False)
4.9/5
(29)

The ____________________ contains items that were recently deleted from a Windows computer system.

(Short Answer)
4.7/5
(31)

Working with the Registry is easy for the inexperienced user.

(True/False)
4.7/5
(39)

____ is a very common file system used by computers and is supported by many different operating systems.

(Multiple Choice)
4.9/5
(29)

List five laws that have been put into effect to help monitor and control the use of electronic communication systems and computers as well as provide guidelines for prosecution of computer and information-related crimes.

(Essay)
4.7/5
(31)

Information that is transferred to an external device should also have a(n) ____ calculated to verify integrity during collection and at a later date.

(Multiple Choice)
4.8/5
(33)

A network of honeypots is called a(n) ____________________.

(Short Answer)
4.9/5
(40)

A ____ contains a copy of the Registry that existed at the time the Restore Point was created.

(Multiple Choice)
4.9/5
(26)
Showing 1 - 20 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)