Exam 7: Investigating Windows, linux, and Graphic Files
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Match the following GREP tokens with their related functions.
-*
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
C
Match the type of directory to its definition.
-/lost+found
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
A
Clues that may indicate stego use include all of the following EXCEPT
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
The ________ subfolder lists the files that the user has accessed over several time periods.
(Short Answer)
4.8/5
(35)
Match the hex signature with its file extension.
-89 50 4E 47 OD 0A 1A 0A
(Multiple Choice)
4.8/5
(36)
In steganography,the original file that contains the hidden information is the
(Multiple Choice)
4.8/5
(34)
Match the following to their definitions.
Premises:
User profiles
Responses:
Though used only briefly, they are not deleted
Installed applications
Data created by a user
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
Which of the following is considered an excellent source to obtain information on when passwords were last changed within a Linux system?
(Multiple Choice)
4.9/5
(41)
The ________ folder generally contains information concerning the programs the user typically works with.
(Short Answer)
4.8/5
(34)
One application of metadata used by Windows is an uncommon storage concept called ________.
(Short Answer)
4.7/5
(34)
System data and artifacts are files generated by the ________.
(Short Answer)
4.8/5
(35)
All of the following are key differences in identifying an operating system EXCEPT
(Multiple Choice)
4.8/5
(51)
Match the hex signature with its file extension.
-00 00 01 00
(Multiple Choice)
4.8/5
(33)
The ________ folder is used by Internet sites to store information about the user.
(Short Answer)
4.9/5
(45)
In a forensics context,hidden information about files and folders is called
(Multiple Choice)
5.0/5
(28)
Showing 1 - 20 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)