Exam 2: Understanding Computer Investigations
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
When analyzing digital evidence, your job is to ____.
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
A
Many attorneys like to have printouts of the data you have recovered, but printouts can present problems when you have log files with several thousand pages of data.
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
During the ____________________ design or approach to the case, you outline the general steps you need to follow to investigate the case.
Free
(Short Answer)
4.8/5
(45)
Correct Answer:
preliminary
process of trying to get a suspect to confess to a specific incident or crime
(Multiple Choice)
4.9/5
(37)
What additional items are useful when setting up a forensic workstation?
(Essay)
4.8/5
(35)
A(n) ____________________ is usually conducted to collect information from a witness or suspect about specific facts related to an investigation.
(Short Answer)
5.0/5
(45)
What is required to conduct an investigation involving Internet abuse?
(Essay)
5.0/5
(36)
____ can be the most time-consuming task, even when you know exactly what to look for in the evidence.
(Multiple Choice)
5.0/5
(32)
To create an exact image of an evidence disk, copying the ____ to a target work disk that's identical to the evidence disk is preferable.
(Multiple Choice)
4.7/5
(33)
Match each item with a statement below:
-is the more well-known and lucrative side of the computer forensics business
(Multiple Choice)
4.8/5
(31)
Match each item with a statement below:
-an older computer forensics tool
(Multiple Choice)
4.8/5
(37)
____ from Technology Pathways is a forensics data analysis tool. You can use it to acquire and analyze data from several different file systems.
(Multiple Choice)
4.9/5
(47)
____ investigations typically include spam, inappropriate and offensive message content, and harassment or threats.
(Multiple Choice)
4.7/5
(32)
Use ____ to secure and catalog the evidence contained in large computer components.
(Multiple Choice)
4.8/5
(29)
Describe the process of creating a bit-stream copy of an evidence disk.
(Essay)
4.7/5
(47)
Describe some of the technologies used with hardware write-blocker devices. Identify some of the more commonly used vendors and their products.
(Essay)
4.8/5
(39)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)