Exam 9: Computer Forensics Analysis and Validation
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
Describe with examples why the approach you take for a forensics case depends largely on the specific type of case you're investigating.
(Essay)
4.8/5
(37)
Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system data failure.
(Multiple Choice)
4.9/5
(39)
In FTK ____ search mode, you can also look for files that were accessed or changed during a certain time period.
(Multiple Choice)
4.9/5
(28)
The term ____ comes from the Greek word for"hidden writing."
(Multiple Choice)
4.8/5
(27)
To generate reports with the FTK ReportWizard, first you need to ____________________ files during an examination.
(Short Answer)
4.7/5
(43)
Briefly describe how to use steganography for creating digital watermarks.
(Essay)
4.8/5
(33)
How should you approach a case in which an employee is suspected of industrial espionage?
(Essay)
4.8/5
(34)
The ____ search feature allows you to look for words with extensions such as "ing,""ed," and so forth.
(Multiple Choice)
4.9/5
(36)
Match each item with a statement below:
-program used to clean all data from the target drive you plan to use
(Multiple Choice)
4.8/5
(40)
There are ____ searching options for keywords which FTK offers.
(Multiple Choice)
4.8/5
(38)
Match each item with a statement below:
-a disk-partitioning utility
(Multiple Choice)
4.9/5
(34)
In civil and criminal cases, the scope is often defined by search warrants or ____, which specify what data you can recover.
(Multiple Choice)
5.0/5
(31)
The data-hiding technique ____________________ changes data from readable code to data that looks like binary executable code.
(Short Answer)
4.8/5
(33)
____ attacks use every possible letter, number, and character found on a keyboard when cracking a password.
(Multiple Choice)
5.0/5
(41)
Match each item with a statement below:
-an FTK searching option
(Multiple Choice)
4.7/5
(42)
____ is a remote access program for communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer's file system.
(Multiple Choice)
4.8/5
(26)
AccessData ____ compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data.
(Multiple Choice)
4.7/5
(35)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)