Exam 3: Tools, Environments, Equipment, and Certifications
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Match the following forensic tools with their attributes.
-MacQuisition Boot CD
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
C
A dead analysis is also referred to as a(n)________ analysis.
Free
(Short Answer)
4.9/5
(39)
Correct Answer:
postmortem
Match the following terms to their meanings.
Premises:
Active data
Responses:
File space that is now available for being written to
A file renamed to look like an operating system file
Cache files and history files
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.9/5
(24)
Correct Answer:
________,from Paraben Forensics,is a comprehensive tool for investigating the contents of Palm Pocket PCs that run on Windows CE.
(Short Answer)
4.7/5
(51)
Documentation of the evidence can include which of the following?
(Multiple Choice)
4.7/5
(38)
Match the following types of files to their description.
-Cyclic redundancy check
(Multiple Choice)
4.8/5
(38)
Match the following types of files to their description.
-Drive imaging
(Multiple Choice)
4.7/5
(32)
Match the following forensic tools with their attributes.
-PDA Seizure
(Multiple Choice)
4.9/5
(42)
A drive image is "fingerprinted" using an encryption technique called ________.
(Short Answer)
4.8/5
(33)
When a copy is made,the contents of a hard drive are stored as a series of compressed ________ files.
(Short Answer)
4.9/5
(34)
Which of the following tools is designed for use with Linux systems?
(Multiple Choice)
4.9/5
(37)
Which of the following is the preferred way to make a forensic copy?
(Multiple Choice)
4.9/5
(37)
Match the following types of files to their description.
-Message digest
(Multiple Choice)
4.9/5
(37)
Match the following forensic tools with their attributes.
-HeaderBuilder
(Multiple Choice)
5.0/5
(40)
Match the following forensic tools with their attributes.
-WinHex
(Multiple Choice)
4.8/5
(35)
Match the following terms to their meanings.
-Automatically stored data
(Multiple Choice)
4.8/5
(43)
Match the following forensic tools with their attributes.
-EnCase software
(Multiple Choice)
4.8/5
(32)
The current best approach to powering down a suspect PC is to
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)