Exam 9: Computer Forensics Analysis and Validation
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
The defense request for full discovery of digital evidence applies only to criminal cases in the United States.
Free
(True/False)
4.7/5
(36)
Correct Answer:
True
How can you hide data by marking bad clusters?
Free
(Essay)
4.8/5
(38)
Correct Answer:
One data-hiding technique is placing sensitive or incriminating data in free space on disk partition clusters.This method is more common in FAT file systems.This technique involves using a disk editor, such as Norton DiskEdit, to mark good clusters as bad clusters.The OS then considers these clusters unusable.The only way they can be accessed from the OS is by changing them to good clusters with a disk editor.
To mark a good cluster as bad using Norton Disk Edit, you type the letter B in the FAT entry corresponding to that cluster.You can then use any DOS disk editor to write and read data to this cluster, which is effectively hidden because it appears as bad to the OS.
A nonsteganographic graphics file has a different size than an identical steganographic graphics file.
Free
(True/False)
4.9/5
(39)
Correct Answer:
False
FTK provides two options for searching for keywords: indexed search and ____________________ search.
(Short Answer)
4.8/5
(36)
Match each item with a statement below:
-defines the investigation's goal and scope, the materials needed, and the tasks to perform
(Multiple Choice)
4.8/5
(43)
For most law-enforcement-related computing investigations, the investigator is limited to working with data defined in the search ____________________.
(Short Answer)
4.7/5
(40)
Match each item with a statement below:
-a password recovery program available from AccessData
(Multiple Choice)
4.8/5
(27)
Briefly describe the differences between brute-force attacks and dictionary attacks to crack passwords.
(Essay)
4.9/5
(45)
____ are handy when you need to image the drive of a computer far away from your location or when you don't want a suspect to be aware of an ongoing investigation.
(Multiple Choice)
4.9/5
(41)
One way to hide partitions is to create a partition on a disk, and then use a disk editor such as ____ to manually delete any reference to it.
(Multiple Choice)
4.7/5
(29)
For target drives, use only recently wiped media that have been reformatted and inspected for computer viruses.
(True/False)
4.7/5
(48)
Match each item with a statement below:
-one of the most critical aspects of computer forensics
(Multiple Choice)
4.8/5
(41)
____ is defined as the art and science of hiding messages in such a way that only the intended recipient knows the message is there.
(Multiple Choice)
4.9/5
(37)
FTK and other computer forensics programs use ____ to tag and document digital evidence.
(Multiple Choice)
4.9/5
(44)
You begin any computer forensics case by creating a(n) ____.
(Multiple Choice)
4.9/5
(34)
____ search can locate items such as text hidden in unallocated space that might not turn up in an indexed search.
(Multiple Choice)
4.9/5
(39)
Describe the effects of scope creep on an investigation in the corporate environment.
(Essay)
4.8/5
(35)
Marking bad clusters data-hiding technique is more common with ____ file systems.
(Multiple Choice)
4.8/5
(31)
____ recovery is a fairly easy task in computer forensic analysis.
(Multiple Choice)
4.8/5
(45)
People who want to hide data can also use advanced encryption programs, such as PGP or ____.
(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)