Exam 5: Working With Windows and Cli Systems
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
A typical disk drive stores how many bytes in a single sector?
(Multiple Choice)
4.9/5
(36)
The ______________ is the device that reads and writes data to a drive.
(Short Answer)
4.7/5
(40)
What third party encryption tool creates a virtual encrypted volume, which is a file mounted as though it were a disk drive?
(Multiple Choice)
4.9/5
(32)
When using the File Allocation Table (FAT), where is the FAT database typically written to?
(Multiple Choice)
4.9/5
(33)
What term below describes a column of tracks on two or more disk platters?
(Multiple Choice)
4.8/5
(41)
___________ are made up of one or more platters coated with magnetic material, and data is stored in a particular way.
(Short Answer)
4.7/5
(37)
Select below the file system that was developed for mobile personal storage devices, such as flash memory devices, secure digital eXtended capacity (SDCX), and memory sticks:
(Multiple Choice)
4.8/5
(34)
Match each term with the correct definition below:
-?Information contained in ROM that a computer accesses during startup; this information tells the computer how to access the OS and hard drive.
(Multiple Choice)
4.9/5
(38)
To help prevent loss of information, software vendors, including Microsoft, now provide whole disk encryption. This feature creates new challenges in examining and recovering data from drivers. What are four features offered by whole disk encryption tools that forensics examiners should be aware of?
(Essay)
5.0/5
(35)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)