Exam 18: Computer Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The definition of software is:

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

C

Describe the difference between read-only memory and random-access memory.

Free
(Short Answer)
4.7/5
(35)
Correct Answer:
Answered by Examlex AI Copilot

Read-only Memory (ROM) and Random-Access Memory (RAM) are two fundamental types of memory used in computers and electronic devices, each serving distinct purposes and having different characteristics.

Read-only Memory (ROM):
1. Non-volatile: ROM retains its data even when the power is turned off. This makes it ideal for storing firmware or permanent software that should not be altered or lost when the device is powered down.
2. Pre-programmed: Data in ROM is typically written during the manufacturing process and is not intended to be modified by the end-user. Some types of ROM, like EEPROM, can be rewritten, but this is a slow process and not done frequently.
3. Read-only: As the name suggests, ROM is primarily designed to be read from, not written to. It is used to store the instructions for booting up the computer or device (the bootloader or BIOS).
4. Speed: ROM is generally slower than RAM in terms of data access speeds.

Random-Access Memory (RAM):
1. Volatile: RAM requires power to maintain its data. When the device is turned off, the data stored in RAM is lost. This is why you lose unsaved work if your computer crashes or is turned off unexpectedly.
2. Read and Write: RAM is used by the CPU to read and write data quickly. It is where a computer temporarily stores data that is actively being used or processed, which allows for fast access and manipulation.
3. Dynamic: The contents of RAM change frequently as programs are opened and closed and as different tasks are performed. It is the workspace for the computer's processor.
4. Speed: RAM is much faster than ROM. This speed allows the CPU to access instructions and data quickly, which is essential for the smooth operation of programs.

In summary, ROM is non-volatile and used for permanent storage of critical instructions that do not change, while RAM is volatile and used for temporary storage of data that is actively being used or processed by the CPU. ROM is about long-term stability and preservation, whereas RAM is about speed and flexibility for on-the-fly data manipulation.

Evidentiary data may be recovered from which of the following?

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

D

A cluster is a group of ________ in multiples of ________.

(Multiple Choice)
4.9/5
(33)

Which of the following actions taken at the crime scene involving a computer are incorrect?

(Multiple Choice)
4.8/5
(32)

One should not search for "visible" data in:

(Multiple Choice)
4.9/5
(34)

A device that permits only requested traffic to enter a computer system is known as a(n) :

(Multiple Choice)
4.7/5
(22)

One should not look for "latent" data in:

(Multiple Choice)
4.9/5
(36)

One of the most common places to begin to look for evidential data is in:

(Multiple Choice)
4.9/5
(34)

The first thing a crime scene investigator should do when encountering computer forensic evidence is:

(Multiple Choice)
4.8/5
(30)

What are the areas of the computer that forensic examiners will examine to retrieve forensic data.

(Short Answer)
4.9/5
(37)

What keeps track of the location of files and folders on the HDD?

(Multiple Choice)
4.8/5
(35)

The complex of wires located on the motherboard which serves to carry data from one hardware device to another is:

(Multiple Choice)
4.8/5
(35)

A motherboard:

(Multiple Choice)
4.7/5
(33)

Explain the various areas found on the computer where a user's Internet activities can be investigated.

(Essay)
4.9/5
(37)

Which of the following is NOT considered a type of software?

(Multiple Choice)
4.9/5
(33)

What is the difference between and location of visible and latent data?

(Short Answer)
4.8/5
(24)

List and describe the hardware and the software components of a computer.

(Essay)
4.9/5
(34)

Describe how a hard disk is partitioned.

(Essay)
4.7/5
(31)

Which of the following is/are potential sources for forensic evidence on a suspect's personal computer?

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 47
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)