Exam 6: Working With Windows and Dos Systems
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
Describe some of the open source whole disk encryption tools.
Free
(Essay)
4.9/5
(31)
Correct Answer:
The following list describes some available open-source encryption tools:
* TrueCrypt (www.Truecrypt.org) creates a virtual encrypted volume-a file mounted as though it were a disk drive.Data is encrypted automatically and in real time.
* CrossCrypt (www.scherrer.cc/crypt/) also creates a virtual encrypted volume and provides filedisk, a command-line utility with options for creating, mounting, dismounting, and encrypting volumes.
* FreeOTFE (on-the-fly encryption, www.freeotfe.org), like other open-source encryption tools, creates a virtual disk that can encrypt data with several popular algorithms.FreeOTFE can be used in Windows 2000 and XP as well as with PDAs.
Match each item with a statement below:
-an international data format
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
G
____ is a text file containing commands that typically run only at system startup to enhance the computer's DOS configuration.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
Match each item with a statement below:
-unused space in a cluster between the end of an active file and the end of the cluster
(Multiple Choice)
4.7/5
(39)
____ refers to the number of bits in one square inch of a disk platter.
(Multiple Choice)
4.8/5
(38)
____, located in the root folder of the system partition, is the device driver that allows the OS to communicate with SCSI or ATA drives that aren't related to the BIOS.
(Multiple Choice)
4.8/5
(29)
On an NTFS disk, the first data set is the ____________________, which starts at sector [0] of the disk.
(Short Answer)
4.8/5
(33)
Data streams can obscure valuable evidentiary data, intentionally or by coincidence.
(True/False)
4.8/5
(49)
The type of file system an OS uses determines how data is stored on the disk.
(True/False)
4.9/5
(33)
____ is a batch file containing customized settings for MS-DOS that runs automatically.
(Multiple Choice)
4.9/5
(40)
Match each item with a statement below:
-ways data can be appended to existing files
(Multiple Choice)
5.0/5
(38)
Match each item with a statement below:
-the space between each track
(Multiple Choice)
4.8/5
(41)
Match each item with a statement below:
-concentric circles on a disk platter where data is located
(Multiple Choice)
4.8/5
(34)
____ is how most manufacturers deal with a platter's inner tracks being shorter than its outer tracks.
(Multiple Choice)
4.7/5
(33)
When Microsoft created Windows 95, it consolidated initialization (.ini) files into the ____.
(Multiple Choice)
4.9/5
(34)
When Microsoft introduced Windows 2000, it added built-in encryption to NTFS called ____.
(Multiple Choice)
5.0/5
(45)
Match each item with a statement below:
-Microsoft's utility for protecting drive data
(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)