Exam 7: Current Computer Forensics Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below: -letters embedded near the beginning of all JPEG files

(Multiple Choice)
5.0/5
(34)

Many password recovery tools have a feature that allows generating potential lists for a ____ attack.

(Multiple Choice)
4.7/5
(38)

Although a disk editor gives you the most flexibility in ____, it might not be capable of examining a ____ file's contents.

(Multiple Choice)
4.8/5
(34)

Software forensics tools are commonly used to copy data from a suspect's disk drive to a(n) ____.

(Multiple Choice)
5.0/5
(41)

Match each item with a statement below: -command-line disk acquisition tool from New Technologies, Inc.

(Multiple Choice)
4.9/5
(31)

In general, forensics workstations can be divided into ____ categories.

(Multiple Choice)
4.9/5
(32)

The standards document, ____, demands accuracy for all aspects of the testing process, meaning that the results must be repeatable and reproducible.

(Multiple Choice)
4.7/5
(43)

One way to compare your results and verify your new forensic tool is by using a ____, such as HexWorkshop, or WinHex.

(Multiple Choice)
4.7/5
(36)

Match each item with a statement below: -European term for carving

(Multiple Choice)
4.9/5
(43)

____ of data involves sorting and searching through all investigation data.

(Multiple Choice)
4.8/5
(39)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)