Exam 2: Understanding Computer Investigations

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When analyzing digital evidence, your job is to ____.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

A

Many attorneys like to have printouts of the data you have recovered, but printouts can present problems when you have log files with several thousand pages of data.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

During the ____________________ design or approach to the case, you outline the general steps you need to follow to investigate the case.

Free
(Short Answer)
4.8/5
(45)
Correct Answer:
Verified

preliminary

process of trying to get a suspect to confess to a specific incident or crime

(Multiple Choice)
4.9/5
(37)

What additional items are useful when setting up a forensic workstation?

(Essay)
4.8/5
(35)

an essential part of professional growth

(Multiple Choice)
4.9/5
(34)

A(n) ____________________ is usually conducted to collect information from a witness or suspect about specific facts related to an investigation.

(Short Answer)
5.0/5
(45)

What is required to conduct an investigation involving Internet abuse?

(Essay)
5.0/5
(36)

____ can be the most time-consuming task, even when you know exactly what to look for in the evidence.

(Multiple Choice)
5.0/5
(32)

To create an exact image of an evidence disk, copying the ____ to a target work disk that's identical to the evidence disk is preferable.

(Multiple Choice)
4.7/5
(33)

a type of evidence custody form

(Multiple Choice)
4.9/5
(37)

Match each item with a statement below: -is the more well-known and lucrative side of the computer forensics business

(Multiple Choice)
4.8/5
(31)

Match each item with a statement below: -an older computer forensics tool

(Multiple Choice)
4.8/5
(37)

also known as a computer forensics workstation

(Multiple Choice)
4.9/5
(34)

____ from Technology Pathways is a forensics data analysis tool. You can use it to acquire and analyze data from several different file systems.

(Multiple Choice)
4.9/5
(47)

____ investigations typically include spam, inappropriate and offensive message content, and harassment or threats.

(Multiple Choice)
4.7/5
(32)

Use ____ to secure and catalog the evidence contained in large computer components.

(Multiple Choice)
4.8/5
(29)

A bit-stream image is also known as a(n) ____.

(Multiple Choice)
4.8/5
(37)

Describe the process of creating a bit-stream copy of an evidence disk.

(Essay)
4.7/5
(47)

Describe some of the technologies used with hardware write-blocker devices. Identify some of the more commonly used vendors and their products.

(Essay)
4.8/5
(39)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)