Exam 3: Tools, Environments, Equipment, and Certifications
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Match the following types of files to their description.
-Drive slack
(Multiple Choice)
4.9/5
(37)
If you need to remove a password from files,you could use a program such as
(Multiple Choice)
4.8/5
(34)
One ________ can be saved on numerous servers and be forwarded to a person unknown to its author.
(Short Answer)
4.9/5
(39)
A computer forensic specialist may examine the ________ to ascertain the true identity of a file.
(Short Answer)
4.9/5
(33)
Encase softwarecan be used for all e-mail investigations EXCEPT which of the following?
(Multiple Choice)
4.8/5
(29)
Match the following terms to their meanings.
-Deleted files
(Multiple Choice)
4.9/5
(29)
Which of the following tasks should be performed to maximize search results?
(Multiple Choice)
4.9/5
(37)
Match the following forensic tools with their attributes.
-BlackBag
(Multiple Choice)
4.8/5
(33)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)