Exam 7: Investigating Windows, linux, and Graphic Files

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following GREP tokens with their related functions. -*

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

C

Match the type of directory to its definition. -/lost+found

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

A

Clues that may indicate stego use include all of the following EXCEPT

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

The ________ subfolder lists the files that the user has accessed over several time periods.

(Short Answer)
4.8/5
(35)

Match the hex signature with its file extension. -89 50 4E 47 OD 0A 1A 0A

(Multiple Choice)
4.8/5
(36)

In steganography,the original file that contains the hidden information is the

(Multiple Choice)
4.8/5
(34)

Match the hex signature with its file extension. -42 4D

(Multiple Choice)
4.8/5
(44)

Examples of user data include all of the following EXCEPT

(Multiple Choice)
4.9/5
(48)

Match the following to their definitions. -Temp files

(Multiple Choice)
4.7/5
(42)
Match the following to their definitions.
Premises:
User profiles
Responses:
Though used only briefly, they are not deleted
Installed applications
Data created by a user
Correct Answer:
Verified
Premises:
Responses:
User profiles
Though used only briefly, they are not deleted
(Matching)
4.8/5
(37)

Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?

(Multiple Choice)
4.9/5
(41)

The ________ folder generally contains information concerning the programs the user typically works with.

(Short Answer)
4.8/5
(34)

One application of metadata used by Windows is an uncommon storage concept called ________.

(Short Answer)
4.7/5
(34)

Match the following to their data structures. -Data block

(Multiple Choice)
4.8/5
(42)

System data and artifacts are files generated by the ________.

(Short Answer)
4.8/5
(35)

All of the following are key differences in identifying an operating system EXCEPT

(Multiple Choice)
4.8/5
(51)

Match the hex signature with its file extension. -00 00 01 00

(Multiple Choice)
4.8/5
(33)

The ________ folder is used by Internet sites to store information about the user.

(Short Answer)
4.9/5
(45)

In a forensics context,hidden information about files and folders is called

(Multiple Choice)
5.0/5
(28)

If you change a file extension by renaming the file,

(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 59
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)