Exam 4: Data Acquisition
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
Unlike RAID 0, RAID 3 stripes tracks across all disks that make up one volume.
Free
(True/False)
4.8/5
(38)
Correct Answer:
False
Match each item with a statement below:
-ILook imaging tool
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
E
Linux ISO images are referred to as ____.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
Typically, a(n) ____ acquisition is done on a computer seized during a police raid, for example.
(Multiple Choice)
4.7/5
(41)
The ____ command creates a raw format file that most computer forensics analysis tools can read, which makes it useful for data acquisitions.
(Multiple Choice)
4.8/5
(42)
There are two types of acquisitions: static acquisitions and ____________________ acquisitions.
(Short Answer)
4.9/5
(41)
Match each item with a statement below:
-process of copying data
(Multiple Choice)
4.8/5
(38)
Match each item with a statement below:
-example of a lossless compression tool
(Multiple Choice)
4.9/5
(36)
EnCase Enterprise is set up with an Examiner workstation and a Secure Authentication for EnCase (____) workstation
(Multiple Choice)
4.9/5
(33)
For computer forensics, ____ is the task of collecting digital evidence from electronic media.
(Multiple Choice)
4.8/5
(41)
SafeBack performs a(n) ____ calculation for each sector copied to ensure data integrity
(Multiple Choice)
4.7/5
(41)
The ____ command displays pages from the online help manual for information on Linux commands and their options.
(Multiple Choice)
4.8/5
(35)
What are some of the main characteristics of Linux ISO images designed for computer forensics?
(Essay)
4.7/5
(36)
What are the advantages and disadvantages of using raw data acquisition format?
(Essay)
4.9/5
(33)
Image files can be reduced by as much as ____% of the original.
(Multiple Choice)
4.8/5
(39)
The ____ DOS program En.exe requires using a forensic MS-DOS boot floppy or CD and a network crossover cable.
(Multiple Choice)
4.8/5
(34)
Dr. Simson L. Garfinkel of Basis Technology Corporation recently developed a new open-source acquisition format called ____________________.
(Short Answer)
4.8/5
(38)
If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available.
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)