Exam 7: Current Computer Forensics Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____________________ function is the most demanding of all tasks for computer investigators to master.

(Short Answer)
4.9/5
(27)

The ____ publishes articles, provides tools, and creates procedures for testing and validating computer forensics software.

(Multiple Choice)
4.8/5
(35)

Briefly explain the NIST general approach for testing computer forensics tools.

(Essay)
4.9/5
(32)

The primary hash algorithm used by the NSRL project is ____.

(Multiple Choice)
4.7/5
(45)

____ can be software or hardware and are used to protect evidence disks by preventing you from writing any data to the evidence disk.

(Multiple Choice)
4.9/5
(42)

Briefly explain the purpose of the NIST NSRL project.

(Essay)
4.8/5
(42)

To complete a forensic disk analysis and examination, you need to create a ____.

(Multiple Choice)
4.9/5
(40)

In software acquisition, there are three types of data-copying methods.

(True/False)
4.7/5
(31)

Match each item with a statement below: -software-enabled write-blocker

(Multiple Choice)
4.7/5
(36)

In Windows 2000 and XP, the ____ command shows you the owner of a file if you have multiple users on the system or network.

(Multiple Choice)
4.7/5
(38)

Because there are a number of different versions of UNIX and Linux, these platforms are referred to as ____________________ platforms.

(Short Answer)
4.8/5
(37)

Computer forensics tools are divided into ____ major categories.

(Multiple Choice)
4.8/5
(34)

Explain the validation of evidence data process.

(Essay)
4.8/5
(41)

Match each item with a statement below: -a direct copy of a disk drive

(Multiple Choice)
4.9/5
(34)

The first tools that analyzed and extracted data from floppy disks and hard disks were MS-DOS tools for ____ PC file systems.

(Multiple Choice)
4.8/5
(43)

The simplest method of duplicating a disk drive is using a tool that does a direct ____ copy from the original disk to the target disk.

(Multiple Choice)
4.7/5
(39)

The Windows application of EnCase requires a(n) ____________________ device, such as FastBloc, to prevent Windows from accessing and corrupting a suspect disk drive.

(Short Answer)
4.9/5
(37)

Raw data is a direct copy of a disk drive. An example of a Raw image is output from the UNIX/Linux ____ command.

(Multiple Choice)
4.7/5
(34)

Illustrate how to consider hardware needs when planning your lab budget.

(Essay)
4.9/5
(32)

Describe some of the problems you may encounter if you decide to build your own forensics workstation.

(Essay)
4.8/5
(31)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)