Exam 3: Tools, Environments, Equipment, and Certifications
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
If volatile data must be acquired,you may need to do your analysis in a(n)
(Multiple Choice)
4.9/5
(31)
Match the following forensic tools with their attributes.
-FTK
(Multiple Choice)
5.0/5
(39)
You may need to do a(n)________ analysis during a hacker attack or other intrusion.
(Short Answer)
4.9/5
(35)
Preserving e-evidence and good ________ of steps taken during the investigation are essential for success in computer crime cases.
(Short Answer)
4.7/5
(39)
Match the following forensic tools with their attributes.
-UTK
(Multiple Choice)
4.8/5
(43)
Which of the following does NOT affect the choice of forensic tool(s)for a case?
(Multiple Choice)
4.7/5
(34)
Match the following forensic tools with their attributes.
-dtSearch
(Multiple Choice)
4.9/5
(36)
Under no circumstances should you attempt to create a forensically clean drive by simply ________ the drive.
(Short Answer)
4.9/5
(35)
Match the following types of files to their description.
-Write blocker
(Multiple Choice)
4.9/5
(38)
A forensics lab is typically considered to be a(n)________ environment.
(Short Answer)
4.7/5
(34)
Which factor(s)determine the type of tools needed for an analysis?
(Multiple Choice)
4.9/5
(29)
A forensics lab should have all of the following applications on hand EXCEPT
(Multiple Choice)
4.8/5
(37)
________ data can include spreadsheets,databases,and word processing files.
(Short Answer)
4.9/5
(39)
Match the following forensic tools with their attributes.
-Sleuth Kit
(Multiple Choice)
4.9/5
(36)
A defensible approach is an objective and unbiased approach that
(Multiple Choice)
4.8/5
(31)
A(n)________ can cause MD5 hashes to be different if different tools are used to acquire a disk image.
(Short Answer)
4.8/5
(33)
________ is another name for the security key you need to access a system when using EnCase.
(Short Answer)
4.8/5
(35)
Match the following investigative objectives to their proper chain of custody practices.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(36)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)