Exam 9: Computer Forensics Analysis and Validation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe with examples why the approach you take for a forensics case depends largely on the specific type of case you're investigating.

(Essay)
4.8/5
(37)

Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system data failure.

(Multiple Choice)
4.9/5
(39)

In FTK ____ search mode, you can also look for files that were accessed or changed during a certain time period.

(Multiple Choice)
4.9/5
(28)

The term ____ comes from the Greek word for"hidden writing."

(Multiple Choice)
4.8/5
(27)

To generate reports with the FTK ReportWizard, first you need to ____________________ files during an examination.

(Short Answer)
4.7/5
(43)

Briefly describe how to use steganography for creating digital watermarks.

(Essay)
4.8/5
(33)

How should you approach a case in which an employee is suspected of industrial espionage?

(Essay)
4.8/5
(34)

The ____ search feature allows you to look for words with extensions such as "ing,""ed," and so forth.

(Multiple Choice)
4.9/5
(36)

Match each item with a statement below: -program used to clean all data from the target drive you plan to use

(Multiple Choice)
4.8/5
(40)

There are ____ searching options for keywords which FTK offers.

(Multiple Choice)
4.8/5
(38)

Match each item with a statement below: -a disk-partitioning utility

(Multiple Choice)
4.9/5
(34)

In civil and criminal cases, the scope is often defined by search warrants or ____, which specify what data you can recover.

(Multiple Choice)
5.0/5
(31)

The data-hiding technique ____________________ changes data from readable code to data that looks like binary executable code.

(Short Answer)
4.8/5
(33)

What are the file systems supported by FTK for forensic analysis?

(Essay)
4.9/5
(31)

What are the basic guidelines to identify steganography files?

(Essay)
4.7/5
(41)

FTK cannot perform forensics analysis on FAT12 file systems.

(True/False)
4.7/5
(43)

____ attacks use every possible letter, number, and character found on a keyboard when cracking a password.

(Multiple Choice)
5.0/5
(41)

Match each item with a statement below: -an FTK searching option

(Multiple Choice)
4.7/5
(42)

____ is a remote access program for communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer's file system.

(Multiple Choice)
4.8/5
(26)

AccessData ____ compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data.

(Multiple Choice)
4.7/5
(35)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)