Exam 19: Computer Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Unauthorized intrusion into a computer is called:

(Multiple Choice)
4.8/5
(37)

What type of memory stores software programs and instructions while the computer is turned on? What special considerations must be taken to preserve this type of memory on a computer at a crime scene?

(Essay)
4.7/5
(37)

Mobile devices are often shut off to avoid the loss of data.

(True/False)
4.9/5
(34)

Evidentiary data may be recovered from which of the following?

(Multiple Choice)
4.9/5
(33)

Sectors are typically how many bytes in size?

(Multiple Choice)
4.8/5
(44)

The primary form of data storage within a personal computer is:

(Multiple Choice)
4.8/5
(33)

Visible data exists in areas of the drive that are,generally speaking,unknown and inaccessible to most end users.

(True/False)
4.8/5
(37)

A motherboard:

(Multiple Choice)
4.9/5
(38)

The boot (start-up)process for a computer is controlled by:

(Multiple Choice)
4.8/5
(28)

Name two situations in which an investigator would not immediately unplug a computer at an electronic crime scene.

(Essay)
5.0/5
(36)

The primary storage device on most computers is the hard disk drive (HDD).

(True/False)
4.8/5
(32)

What aspects of a computer should be photographed close-up at an electronic crime scene?

(Essay)
5.0/5
(45)

A software algorithm used to create a "fingerprint" of a file or an entire HDD is called:

(Multiple Choice)
4.9/5
(40)

One of the most common places to begin to look for evidential data is in:

(Multiple Choice)
4.8/5
(36)

Often mobile devices contain the same Internet artifacts as a computer,such as cookies and browser history.

(True/False)
4.8/5
(34)

Most web browsers use a(n)________ to expedite and streamline browsing.

(Multiple Choice)
4.9/5
(40)

A(n)________ address is a unique address given to every computer connected to the Internet.

(Short Answer)
4.9/5
(38)

The central processing unit,or CPU,is the part of the computer that actually computes.

(True/False)
4.9/5
(38)

The travel history of a suspect can be documented using ________ and map data from a mobile device.

(Short Answer)
4.9/5
(36)

What keeps track of the location of files and folders on the HDD?

(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 98
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)