Exam 7: Investigating Windows, linux, and Graphic Files
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Match the following keys to their hive file.
-HKEY_CLASSES_ROOT
(Multiple Choice)
4.9/5
(44)
Which of the following is NOT one of the file types available within Linux?
(Multiple Choice)
4.8/5
(35)
Match the following file types to their description.
-Block devices
(Multiple Choice)
4.8/5
(32)
The ________ command gives Linux users the ability to perform administrative duties,which require a separate password for each user.
(Short Answer)
4.7/5
(33)
The ________ tracks those actions deemed as events by the software application.
(Short Answer)
4.8/5
(32)
In an NTFS system,by default,which of the following have access to files and folders not uniquely theirs?
(Multiple Choice)
4.8/5
(40)
The process of retrieving image data from unallocated or slack space is called ________.
(Short Answer)
4.8/5
(32)
Which of the following is one of the default directories created when installing Linux?
(Multiple Choice)
4.7/5
(50)
________ are used to determine where data starts and ends when graphic files are located in unallocated or slack space.
(Short Answer)
4.8/5
(41)
Match the following GREP tokens with their related functions.
-[]
(Multiple Choice)
4.9/5
(35)
Match the hex signature with its file extension.
-FF D8 FF E1 xx xx 45 78 69 66 00
(Multiple Choice)
4.9/5
(40)
Match the following to their data structures.
-Dentry object
(Multiple Choice)
4.9/5
(34)
Match the following file types to their description.
Premises:
Sockets
Responses:
Buffered files used to exchange data
Unbuffered files used to exchange data
Virtual connections between two processes
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(38)
Match the following keys to their hive file.
-HKEY_USERS Default
(Multiple Choice)
4.9/5
(35)
In Linux,everything-including all devices,partitions,and folders-is seen as a unified ________.
(Short Answer)
4.8/5
(30)
Sources of e-evidence within Windows subfolders can include all of the following EXCEPT
(Multiple Choice)
4.8/5
(35)
Showing 41 - 59 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)