Exam 19: Computer Forensics
Exam 1: Introduction106 Questions
Exam 2: The Crime Scene131 Questions
Exam 3: Physical Evidence72 Questions
Exam 4: Crime Scene Reconstruction: Blood Stain Pattern Analysis89 Questions
Exam 5: Death Investigation108 Questions
Exam 6: Fingerprints101 Questions
Exam 7: Forensic Biometrics83 Questions
Exam 8: The Microscope88 Questions
Exam 9: Firearms, tool Marks, and Other Impressions81 Questions
Exam 10: Matter, light, and Glass Examination106 Questions
Exam 11: Hairs and Fibers101 Questions
Exam 12: Drugs127 Questions
Exam 13: Forensic Toxicology92 Questions
Exam 14: Metals, paint, and Soil84 Questions
Exam 15: Forensic Serology77 Questions
Exam 16: DNA: the Indispensable Forensic Science Tool97 Questions
Exam 17: Forensic Aspects of Fire and Explosion Investigation126 Questions
Exam 18: Document Examination58 Questions
Exam 19: Computer Forensics98 Questions
Exam 20: Mobile Device Forensics69 Questions
Select questions type
Investigators would want to copy blank or unused portions of the HDD to preserve ________ data.
Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Latent
________ is a slang term for an unauthorized computer or network intrusion.
Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Hacking
Which of the following is NOT associated with the partitioning of a HDD?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
A
________ is a set of instructions compiled into a program that performs a particular task.
(Short Answer)
4.8/5
(37)
Extracting data from a mobile device is more complicated than extracting data from a computer.
(True/False)
4.8/5
(35)
ROM stores software programs and instructions while the computer is turned on.
(True/False)
4.7/5
(39)
The ________ is a complex network of wires that carry data from one hardware device to another.
(Multiple Choice)
4.8/5
(41)
Which of the following is NOT considered a hardware device?
(Multiple Choice)
4.9/5
(36)
MMS,or Multimedia Message Service,is text messaging with attachments.
(True/False)
4.9/5
(30)
A Message Digest 5 (MD5)/Secure Hash Algorithm (SHA)takes a ________ of a hard disk drive (HDD)before and after forensic imaging.
(Short Answer)
4.9/5
(34)
Which type of data are readily available to a computer user?
(Multiple Choice)
4.8/5
(30)
Three places where a forensic computer examiner might look to determine what websites a computer user has visited recently are the Internet cache,cookies,and the Internet history.
(True/False)
4.9/5
(35)
The best way to handle a mobile device and preserve data is:
(Multiple Choice)
4.8/5
(34)
The central processing unit is the main system board of a computer that delivers power,data,and instructions to the computer's components.
(True/False)
4.8/5
(32)
Which of the following is the best definition of latent data?
(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 98
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)