Exam 24: Forensic Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. -A group of individuals at an organization responsible for detecting,investigating,solving,and documenting computer security incidents

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

Using the System Reset tool a Restore Point may be chosen and the system returned back to that point in time.

Free
(True/False)
4.8/5
(25)
Correct Answer:
Verified

False

List five laws that have been put into effect to help monitor and control the use of electronic communication systems and computers as well as provide guidelines for prosecution of computer and information-related crimes.

Free
(Essay)
4.8/5
(36)
Correct Answer:
Verified

Computer Fraud and Abuse Act of 1986
Electronic Communications Privacy Act of 1986
National Information Infrastructure Protection Act of 1996
No Electronic Theft (NET)Act of 1997
Digital Millennium Copyright Act of 1998
Gramm-Leach-Bliley Act of 1999
Sarbanes-Oxley Act of 2002
Cyber Security Enhancement Act of 2002
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003

Information that is transferred to an external device should also have a(n)____ calculated to verify integrity during collection and at a later date.

(Multiple Choice)
4.9/5
(33)

The FAT stores files in dynamic chains of ____________________.

(Short Answer)
4.9/5
(33)

Match each item with a statement below. -The part of a cluster that is not used when a file is written to it

(Multiple Choice)
4.9/5
(31)

The ____ provides the platform on which computer hardware is managed and made available to the computer software applications.

(Multiple Choice)
4.9/5
(34)

Working with the Registry is easy for the inexperienced user.

(True/False)
4.9/5
(39)

____ is a very common file system used by computers and is supported by many different operating systems.

(Multiple Choice)
4.9/5
(31)

Match each item with a statement below. -A snapshot of the state of the system at a point in time

(Multiple Choice)
4.8/5
(36)

____ will search through a file or folder and report on all the ASCII strings it finds.

(Multiple Choice)
4.8/5
(38)

The ____________________ contains items that were recently deleted from a Windows computer system.

(Short Answer)
4.9/5
(29)

____________________ tools are programs designed to look at specific data structures within the operating system.

(Short Answer)
4.8/5
(33)

A ____ contains a copy of the Registry that existed at the time the Restore Point was created.

(Multiple Choice)
4.9/5
(36)

Match each item with a statement below. -A computer that is made deliberately vulnerable in order to make it attractive to hackers

(Multiple Choice)
4.7/5
(38)

The printer spool files will have extensions of ____.

(Multiple Choice)
4.7/5
(39)

The ____ file is used by the system to assist with virtual memory paging and is quite large.

(Multiple Choice)
4.7/5
(41)

The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.

(Short Answer)
4.9/5
(34)

A ____ is a hardware device or software program designed to prevent any write operations from taking place on the original media.

(Multiple Choice)
4.8/5
(24)

List the steps in the incident response process.

(Essay)
4.7/5
(40)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)