Exam 3: Data Acquisition
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
The ImageUSB utility can be used to create a bootable flash drive.
Free
(True/False)
4.8/5
(39)
Correct Answer:
True
What is a hashing collision?
Free
(Essay)
4.8/5
(45)
Correct Answer:
A hashing collision occurs when two files or data streams with different content produce the same digital fingerprint.
Which RAID type utilizes mirrored striping, providing fast access and redundancy?
Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
D
What is the name of the Microsoft solution for whole disk encryption?
(Multiple Choice)
4.9/5
(40)
The _______ copies evidence of intrusions to an investigation workstation automatically for further analysis over the network.
(Multiple Choice)
4.8/5
(36)
A forensics investigator should verify that acquisition tools can copy data in the HPA of a disk drive.
(True/False)
4.8/5
(34)
The _______ switch can be used with the split command to adjust the size of segmented volumes created by the dd command.
(Multiple Choice)
4.8/5
(44)
Match the terms with the correct definitions?.
-?An open-source data acquisition format that stores image data and metadata
(Multiple Choice)
4.8/5
(37)
The Linux command _____ can be used to write bit-stream data to files.
(Multiple Choice)
4.8/5
(36)
Match the terms with the correct definitions?.
-?A data acquisition method used when a suspect computer can't be shut down to perform a static acquisition
(Multiple Choice)
4.8/5
(41)
________________ software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
(Short Answer)
4.9/5
(37)
Match the terms with the correct definitions?.
-A data acquisition format that creates simple sequential flat files of a suspect drive or data set
(Multiple Choice)
4.8/5
(38)
What two command line utilities are available on Linux for validating files?
(Essay)
5.0/5
(44)
A RAID 3 array uses distributed data and distributed parity in a manner similar to a RAID 5 array.
(True/False)
4.8/5
(42)
An investigator wants to capture all data on a SATA drive connected to a Linux system. What should the investigator use for the "if=" portion of the dcfldd command?
(Multiple Choice)
4.9/5
(39)
Which RAID type provides increased speed and data storage capability, but lacks redundancy?
(Multiple Choice)
4.8/5
(26)
When using a target drive that is FAT32 formatted, what is the maximum size limitation for split files?
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)