Exam 4: Data Acquisition

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is the default format for acquisitions for Guidance Software EnCase.

(Short Answer)
5.0/5
(45)

The most common and flexible data-acquisition method is ____.

(Multiple Choice)
4.9/5
(33)

Explain the use of hash algorithms to verify the integrity of lossless compressed data.

(Essay)
4.9/5
(38)

Microsoft has recently added ____ in its Vista Ultimate and Enterprise editions, which makes performing static acquisitions more difficult.

(Multiple Choice)
5.0/5
(31)

What are some of the features offered by proprietary data acquisition formats?

(Essay)
4.9/5
(38)

What are the requirements for acquiring data on a suspect computer using Linux?

(Essay)
4.9/5
(44)

Many acquisition tools don't copy data in the host protected area (HPA) of a disk drive.

(True/False)
4.8/5
(33)

Match each item with a statement below: -used with .jpeg files to reduce file size and doesn't affect image quality when the file is restored and viewed

(Multiple Choice)
4.8/5
(49)

If your time is limited, consider using a logical acquisition or ____ acquisition data copy method.

(Multiple Choice)
4.8/5
(35)

Match each item with a statement below: -shows the known drives connected to your computer

(Multiple Choice)
4.8/5
(36)

Match each item with a statement below: -open source data acquisition format

(Multiple Choice)
5.0/5
(46)

____ has developed the Rapid Action Imaging Device (RAID) to make forensically sound disk copies.

(Multiple Choice)
4.7/5
(37)

What are the advantages and disadvantages of using Windows acquisition tools?

(Essay)
4.8/5
(36)

Match each item with a statement below: -forensic tool developed by Guidance Software

(Multiple Choice)
4.8/5
(38)

The most common and time-consuming technique for preserving evidence is creating a duplicate copy of your evidence image file.

(True/False)
4.9/5
(45)

Bit-stream data to files copy technique creates simple sequential flat files of a suspect drive or data set. The output of these flat files is referred to as a(n) ____________________ format.

(Short Answer)
4.8/5
(33)

Popular archiving tools, such as PKZip and WinZip, use an algorithm referred to as ____________________ compression.

(Short Answer)
4.9/5
(39)

What are the steps to update the Registry for Windows XP SP2 to enable write-protection with USB devices?

(Essay)
4.7/5
(31)

FTK Imager requires that you use a device such as a USB or parallel port dongle for licensing.

(True/False)
4.8/5
(41)

SafeBack and SnapCopy must run from a(n) ____ system.

(Multiple Choice)
4.8/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)