Exam 9: Computer Forensics Analysis and Validation
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
The AccessData program has a hashing database, ________________, which is available only with FTK, and can be used to filter known program files from view and contains the hash values of known illegal files.
(Multiple Choice)
4.7/5
(37)
Match the following terms with the correct definitions below:?
-?The pnrocess of shifting one or more digits in a binary number to the left or right to produce a different value.
(Multiple Choice)
4.7/5
(31)
Many commercial encryption programs use a technology called _____________, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.
(Multiple Choice)
4.9/5
(50)
Match the following terms with the correct definitions below:?
-?In steganalysis, the file containing the hidden message.
(Multiple Choice)
4.7/5
(30)
Select the tool below that does not use dictionary attacks or brute force attacks to crack passwords:
(Multiple Choice)
4.9/5
(34)
In addition to steganography, _____________________ was developed as a way to protect file ownership.
(Short Answer)
4.8/5
(38)
Match the following terms with the correct definitions below:?
-?In steganalysis, the original file with no hidden message.
(Multiple Choice)
4.8/5
(34)
The term for detecting and analyzing steganography files is _________________.
(Multiple Choice)
4.8/5
(28)
In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.
(Multiple Choice)
4.9/5
(41)
Match the following terms with the correct definitions below:?
-?A cryptographic technique for embedding information in another file for the purpose of hiding the information from casual observers.
(Multiple Choice)
4.8/5
(28)
List and explain the five steganalysis methods described by Neil F. Johnson and Sushil Jajodia.
(Essay)
4.8/5
(38)
In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?
(Multiple Choice)
4.8/5
(31)
Because attorneys do not have the right of full discovery of digital evidence, it is not possible for new evidence to come to light while complying with a defense request for full discovery.
(True/False)
4.7/5
(46)
In private sector cases, like criminal and civil cases, the scope is always defined by a search warrant.
(True/False)
4.7/5
(36)
Within Windows Vista and later, partition gaps are _____________ bytes in length.
(Multiple Choice)
4.8/5
(38)
The _______________________ maintains a national database of updated file hash values for a variety of OSs, applications, and images, but does not list hash values of known illegal files.
(Multiple Choice)
4.7/5
(38)
The advantage of recording hash values is that you can determine whether data has changed.
(True/False)
4.9/5
(34)
Which of the following file systems can't be analyzed by OSForensics?
(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)