Exam 19: Computer Forensics
Exam 1: Introduction106 Questions
Exam 2: The Crime Scene131 Questions
Exam 3: Physical Evidence72 Questions
Exam 4: Crime Scene Reconstruction: Blood Stain Pattern Analysis89 Questions
Exam 5: Death Investigation108 Questions
Exam 6: Fingerprints101 Questions
Exam 7: Forensic Biometrics83 Questions
Exam 8: The Microscope88 Questions
Exam 9: Firearms, tool Marks, and Other Impressions81 Questions
Exam 10: Matter, light, and Glass Examination106 Questions
Exam 11: Hairs and Fibers101 Questions
Exam 12: Drugs127 Questions
Exam 13: Forensic Toxicology92 Questions
Exam 14: Metals, paint, and Soil84 Questions
Exam 15: Forensic Serology77 Questions
Exam 16: DNA: the Indispensable Forensic Science Tool97 Questions
Exam 17: Forensic Aspects of Fire and Explosion Investigation126 Questions
Exam 18: Document Examination58 Questions
Exam 19: Computer Forensics98 Questions
Exam 20: Mobile Device Forensics69 Questions
Select questions type
Which of the following actions taken at the crime scene involving a computer are incorrect?
(Multiple Choice)
4.8/5
(35)
Extraction of data from a mobile device can be done on a physical level and a(n)________ level.
(Short Answer)
4.8/5
(47)
The two main types of evidentiary computer data are visible data and latent data.
(True/False)
4.8/5
(33)
The two types of slack space are ________ slack and ________ slack.
(Multiple Choice)
4.8/5
(32)
An IP address may lead to the identity of the person who was using a particular computer to access the Internet.
(True/False)
4.9/5
(39)
A Network Interface Card (NIC)enables a personal computer to communicate with other computers via:
(Multiple Choice)
4.8/5
(38)
A(n)________ is placed on a hard disk drive by a website to track certain information about its visitors.
(Multiple Choice)
4.8/5
(42)
Which source will NOT be useful to investigators seeking to determine a user's Internet history?
(Multiple Choice)
4.7/5
(40)
________ consists of programs that are used to start the computer's boot process.
(Short Answer)
4.7/5
(41)
A(n)________ is a device that permits only requested traffic to enter a computer system.
(Short Answer)
4.9/5
(32)
Match the word in Column 1 to its definition in Column 2.Each answer can only be used once.
A)A set of instructions compiled into a program that performs a particular task
B)A group of sectors in multiples of two; typically the minimum space allocated to a file
C)A standard method by which Internet sites are addressed
D)All data that the operating system is presently aware of, and thus is readily accessible to the user
E)Files placed on a computer from a visited website; they are used to track visits and usage of that site
F)Hardware or software designed to protect against intrusions into a computer network
G)Typically the main storage location within the computer, consisting of magnetic platters contained in a case
H)The smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes
I)The main chip within the computer; also referred to as the brain of the computer.This microprocessor chip handles most of the operations (code and instructions)of the computer.
J)Portions of visited Web pages placed on the local hard disk drive to facilitate quicker retrieval once revisited
K)The main system board of a computer (and many other electronic devices)that delivers power, data, and instructions to the computer's components
L)Areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless
1)Central processing unit (CPU)
2)Cluster
3)Hard disk drive (HDD)
4)Latent data
5)Motherboard
6)Sector
7)Software
8)Visible data
9)Cookies
10)Firewall
11)Internet cache
12)Uniform resource locater (URL)
(Essay)
4.7/5
(44)
An investigator would like to take a forensic "image" of a suspect's HDD.What is the primary goal in obtaining data from a HDD?
What tools can the investigator use to achieve this goal?
(Essay)
4.8/5
(35)
Showing 61 - 80 of 98
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)