Exam 24: Forensic Techniques
Exam 1: What Is a Computer Network26 Questions
Exam 2: Network Topology26 Questions
Exam 3: Networking Hardware26 Questions
Exam 4: Ethernet Technology26 Questions
Exam 5: Token-Ring, Fddi, and Other Lan Technologies26 Questions
Exam 6: Network Design and Troubleshooting Scenarios26 Questions
Exam 7: Low-Level Protocols26 Questions
Exam 8: The Tcpip Protocols26 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols26 Questions
Exam 10: Switching and Routing26 Questions
Exam 11: Network Management and Security26 Questions
Exam 12: Electronic Mail26 Questions
Exam 13: Ftp and Telnet26 Questions
Exam 14: Multimedia Networking26 Questions
Exam 15: The Internet26 Questions
Exam 16: Writing a Network Application26 Questions
Exam 17: An Introduction to Networking With Windows26 Questions
Exam 18: Windows Domains26 Questions
Exam 19: Unix and Linux26 Questions
Exam 20: Other Network Operating Systems26 Questions
Exam 21: Cryptography and Security26 Questions
Exam 22: Security Hardware26 Questions
Exam 23: Security Software26 Questions
Exam 24: Forensic Techniques26 Questions
Select questions type
The ____ file is used when Windows goes into hibernation.
Free
(Multiple Choice)
5.0/5
(30)
Correct Answer:
A
The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.
Free
(True/False)
4.9/5
(36)
Correct Answer:
True
____ will search through a file or folder and report on all the ASCII strings it finds.
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
B
The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.
(Short Answer)
4.9/5
(35)
What is the pre-incident preparation that must take place for a CSIRT?
(Essay)
4.9/5
(37)
The ____ provides the platform on which computer hardware is managed and made available to the computer software applications.
(Multiple Choice)
4.9/5
(35)
List UNIX/Linux systems files that are of particular interest to the forensic examiner.
(Essay)
4.7/5
(33)
A ____ of a hard disk is a bit by bit duplicate, including the boot sector, the partition table, all partitions, hidden files, bad sectors, and even the unallocated space on the hard drive.
(Multiple Choice)
4.9/5
(39)
A ____ is a hardware device or software program designed to prevent any write operations from taking place on the original media.
(Multiple Choice)
4.8/5
(32)
Match each item with a statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(36)
Each RP folder contains a set of files that were changed since the last Restore Point.
(True/False)
4.9/5
(29)
The ____________________ contains items that were recently deleted from a Windows computer system.
(Short Answer)
4.7/5
(31)
____ is a very common file system used by computers and is supported by many different operating systems.
(Multiple Choice)
4.9/5
(29)
List five laws that have been put into effect to help monitor and control the use of electronic communication systems and computers as well as provide guidelines for prosecution of computer and information-related crimes.
(Essay)
4.7/5
(31)
Information that is transferred to an external device should also have a(n) ____ calculated to verify integrity during collection and at a later date.
(Multiple Choice)
4.8/5
(33)
A ____ contains a copy of the Registry that existed at the time the Restore Point was created.
(Multiple Choice)
4.9/5
(26)
Showing 1 - 20 of 26
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)