Exam 23: Computer Forensics
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
There are four different types of evidence: direct,real,documentary,and _______________.
Free
(Short Answer)
4.8/5
(40)
Correct Answer:
demonstrative
A(n)_______________ is the result of applying the hash function to data.
Free
(Short Answer)
4.8/5
(35)
Correct Answer:
message digest
The term forensics relates to the application of ____________ knowledge to ___________ problems.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
C
The cluster that holds the fragment of the original file is referred to as _______________,because the operating system has marked it as usable when needed.
(Short Answer)
4.8/5
(33)
What are three environmental factors that evidence needs to be protected from?
(Essay)
4.8/5
(33)
_______________ performs a function similar to the familiar parity bits,checksum,or cyclical redundancy check (CRC).
(Short Answer)
4.9/5
(34)
_______________ evidence refers to evidence in the form of business records,printouts,manuals and the like.
(Short Answer)
4.9/5
(42)
What type of evidence is used to aid a jury and may be in the form of a model,experiment,chart,and so on,to indicate that an event occurred?
(Multiple Choice)
4.9/5
(45)
To be credible in court proceedings,what are the three standards that evidence must meet?
(Short Answer)
4.8/5
(33)
Generally speaking,you should back up the computer using DOS instead of Windows.
(True/False)
4.9/5
(43)
Business records,printouts,and manuals are what type of evidence?
(Multiple Choice)
4.8/5
(40)
Evidence that is material to the case or has bearing on the matter at hand is what standard of evidence?
(Multiple Choice)
4.9/5
(29)
Evidence must meet the three standards of being sufficient,competent,and _______________.
(Short Answer)
4.9/5
(33)
When performing forensics on a computer system you should use the utilities provided by that system.
(True/False)
4.8/5
(36)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)