Exam 7: Current Computer Forensics Tools
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
Hardware manufacturers have designed most computer components to last about ____________________ months between failures.
Free
(Short Answer)
4.7/5
(39)
Correct Answer:
18
eighteen
The Windows platforms have long been the primary command-line interface OSs.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
To help determine what computer forensics tool to purchase, a comparison table of functions, subfunctions, and vendor products is useful.
Free
(True/False)
4.8/5
(42)
Correct Answer:
True
What are some of the advantages of using command-line forensics tools?
(Essay)
4.8/5
(34)
To make a disk acquisition with En.exe requires only a PC running ____ with a 12-volt power connector and an IDE, a SATA, or a SCSI connector cable.
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below:
-system file where passwords may have been written temporarily
(Multiple Choice)
4.7/5
(39)
Software forensic tools are grouped into command-line applications and ____________________ applications.
(Short Answer)
4.8/5
(43)
The NIST project that has as a goal to collect all known hash values for commercial software applications and OS files is ____.
(Multiple Choice)
4.7/5
(41)
When you research for computer forensics tools, strive for versatile, flexible, and robust tools that provide technical support.
(True/False)
4.9/5
(39)
Many vendors have developed write-blocking devices that connect to a computer through FireWire,____ 2.0,and SCSI controllers.
(Multiple Choice)
4.9/5
(39)
Match each item with a statement below:
-a tower with several bays and many peripheral devices
(Multiple Choice)
4.9/5
(42)
Match each item with a statement below:
-usually a laptop computer built into a carrying case with a small selection of peripheral options
(Multiple Choice)
4.8/5
(29)
Explain the difference between repeatable results and reproducible results.
(Essay)
4.8/5
(38)
Match each item with a statement below:
-one of the first MS-DOS tools used for a computer investigation
(Multiple Choice)
4.8/5
(36)
A forensics workstation consisting of a laptop computer with a built-in LCD monitor and almost as many bays and peripherals as a stationary workstation is also known as a ____.
(Multiple Choice)
4.8/5
(39)
After retrieving and examining evidence data with one tool, you should verify your results by performing the same tasks with other similar forensics tools.
(True/False)
4.7/5
(38)
What are the five major function categories of any computer forensics tool?
(Essay)
4.8/5
(38)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)