Exam 6: Current Computer Forensics Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each term with its definition: -A hardware device or software program that prevents a computer from writing data to an evidence drive?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

J

_______________ proves that two sets of data are identical by calculating hash values or using another similar method.​

Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
Verified

D

What option below is an example of a platform specific encryption tool?

Free
(Multiple Choice)
4.8/5
(46)
Correct Answer:
Verified

D

The _____________ utility is designed to be installed on Linux distributions, and can be used to analyze a variety of different file systems, while also offering the ability to use plugins.

(Short Answer)
4.8/5
(35)

Match each term with its definition: -An attack that uses a collection of words or phrases that might be passwords for an encrypted file.

(Multiple Choice)
5.0/5
(35)

What hex value is the standard indicator for jpeg graphics files?​

(Multiple Choice)
4.7/5
(30)

Reconstructing fragments of files that have been deleted from a suspect drive, is known as ____________ in North America.​

(Multiple Choice)
4.8/5
(38)

Which of the following is stated within the ISO 27037 standard?​

(Multiple Choice)
4.8/5
(34)

Match each term with its definition: -?The process of rebuilding data files; one of the required functions of digital forensics tools.

(Multiple Choice)
4.8/5
(38)

How does a password dictionary attack work?​

(Essay)
4.9/5
(29)

What tool below was written for MS-DOS and was commonly used for manual digital investigations?​

(Multiple Choice)
4.9/5
(34)

In what mode do most write-blockers run??

(Multiple Choice)
4.8/5
(42)

A keyword search is part of the ​analysis process within what forensic function?

(Multiple Choice)
4.7/5
(32)

__________ can be platform specific, such as BitLocker, or done with third-party tools, such as Pretty Good Privacy (PGP) ​and GNuPG

(Short Answer)
4.7/5
(34)

Match each term with its definition: -A way to confirm that a tool is functioning as intended; one of the functions of digital forensics tools.?

(Multiple Choice)
4.7/5
(38)

​Software forensics tools are grouped into command-line applications and GUI applications

(True/False)
4.7/5
(45)

Explain the difference between validation and verification.

(Essay)
4.8/5
(40)

List three of the six subfunctions that exist under the reconstruction function.​

(Essay)
4.8/5
(40)

ISO standard 27037 sta​tes that the most important factors in data acquisition are the DEFR's competency and the use of validated tools.

(True/False)
4.9/5
(39)

What two different options are available for write blockers, and how do these options work?​

(Essay)
4.9/5
(38)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)