Exam 3: Tools, Environments, Equipment, and Certifications

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

If volatile data must be acquired,you may need to do your analysis in a(n)

(Multiple Choice)
4.9/5
(31)

Match the following forensic tools with their attributes. -FTK

(Multiple Choice)
5.0/5
(39)

You may need to do a(n)________ analysis during a hacker attack or other intrusion.

(Short Answer)
4.9/5
(35)

Preserving e-evidence and good ________ of steps taken during the investigation are essential for success in computer crime cases.

(Short Answer)
4.7/5
(39)

Match the following forensic tools with their attributes. -UTK

(Multiple Choice)
4.8/5
(43)

Which of the following does NOT affect the choice of forensic tool(s)for a case?

(Multiple Choice)
4.7/5
(34)

Match the following forensic tools with their attributes. -dtSearch

(Multiple Choice)
4.9/5
(36)

Under no circumstances should you attempt to create a forensically clean drive by simply ________ the drive.

(Short Answer)
4.9/5
(35)

Match the following types of files to their description. -Write blocker

(Multiple Choice)
4.9/5
(38)

A forensics lab is typically considered to be a(n)________ environment.

(Short Answer)
4.7/5
(34)

Which factor(s)determine the type of tools needed for an analysis?

(Multiple Choice)
4.9/5
(29)

Data may be hidden by all of the following methods EXCEPT

(Multiple Choice)
4.9/5
(36)

A forensics lab should have all of the following applications on hand EXCEPT

(Multiple Choice)
4.8/5
(37)

________ data can include spreadsheets,databases,and word processing files.

(Short Answer)
4.9/5
(39)

Match the following forensic tools with their attributes. -Sleuth Kit

(Multiple Choice)
4.9/5
(36)

A defensible approach is an objective and unbiased approach that

(Multiple Choice)
4.8/5
(31)

The first step in analyzing data is to _________ it.

(Short Answer)
4.7/5
(45)

A(n)________ can cause MD5 hashes to be different if different tools are used to acquire a disk image.

(Short Answer)
4.8/5
(33)

________ is another name for the security key you need to access a system when using EnCase.

(Short Answer)
4.8/5
(35)
Match the following investigative objectives to their proper chain of custody practices.
Scanner
Used to break encrypted password files
Spoofer
Create a copy without altering the original
Presumption of evidence
Verify the integrity of the copy to the source
Correct Answer:
Verified
Premises:
Responses:
Scanner
Used to break encrypted password files
Spoofer
Create a copy without altering the original
Presumption of evidence
Verify the integrity of the copy to the source
Document the activities
Perform the technical analysis while retaining its integrity
Password cracker
Used to identify services running on a network
Anonymous remailer
Tools used to mask a person's online identity
Nuker
Keep detailed records and photographs
Preponderance of evidence
Software used to destroy system log trails
Proof beyond reasonable doubt
Ensure fairness in the evaluation
Presumption
Used to impersonate someone else's identity
(Matching)
4.8/5
(36)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)