Exam 6: Current Computer Forensics Tools
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
Match each term with its definition:
-A project sponsored by the National Institute of Standards and Technology to manage research on digital forensics tools?
(Multiple Choice)
4.9/5
(38)
Which of the following options is not a subfunction of extraction?
(Multiple Choice)
4.8/5
(41)
Match each term with its definition:
-The process of trying every combination of characters--letters, numbers, and special characters typically found on a keyboard-- to find a matching password or passphrase value for an encrypted file?
(Multiple Choice)
4.9/5
(37)
What guidelines exist for the selection and use of forensics software? Name at least three.
(Essay)
4.9/5
(42)
List the five (5) categories of functions that are meant as guidelines for evaluating digital forensic tools, with subfunctions for refining data analysis and recovery and ensuring data quality.
(Essay)
4.8/5
(38)
Match each term with its definition:
-A method of finding files or other information by entering relevant characters, words, or phrases in a search tool?
(Multiple Choice)
4.9/5
(29)
In what temporary location below might passwords be stored?
(Multiple Choice)
4.9/5
(35)
Describe two methods for filtering data- separating good data from suspicious data.
(Essay)
4.8/5
(35)
Making a logical acquisition of a drive with whole disk encryption can result in unreadable files.
(True/False)
4.8/5
(30)
All forensics acquisition tools have a method for verification of the data-copying process that compares the original drive with the image.
(True/False)
4.9/5
(37)
What program serves as the GUI front end for accessing Sleuth Kit's tools?
(Multiple Choice)
4.7/5
(38)
Match each term with its definition:
-The process of creating a duplicate image of data; one of the required functions of digital forensics tools?
(Multiple Choice)
4.8/5
(41)
Match each term with its definition:
-The process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools.?
(Multiple Choice)
5.0/5
(40)
Passwords are typically stored as one-way _____________ rather than in plaintext.
(Multiple Choice)
4.8/5
(42)
The purpose of having a ______________ function in a forensics tool is to re-create a suspect drive to show what happened during a crime or incident.
(Short Answer)
4.9/5
(38)
Match each term with its definition:
-A NIST project with the goal of collecting all known hash values for commercial software and OS files?
(Multiple Choice)
4.9/5
(43)
In general, what would a lightweight forensics workstation consist of?
(Multiple Choice)
4.8/5
(31)
Name at least four subfunctions of the extraction function that are used in forensics investigations.
(Essay)
4.9/5
(30)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)