Exam 3: Data Acquisition
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
Match the terms with the correct definitions?.
-Two or more disks combined into one large drive in several configurations for special needs
(Multiple Choice)
4.8/5
(34)
Match the terms with the correct definitions?.
-An area of a disk drive reserved for booting utilities and diagnostic programs; it is not visible to the computer's OS
(Multiple Choice)
4.8/5
(39)
Which RAID type utilizes a parity bit and allows for the failure of one drive without losing data?
(Multiple Choice)
4.9/5
(39)
_____________ software is used in a Linux environment to mount and write data only to NTFS partitions.
(Short Answer)
4.8/5
(34)
Match the terms with the correct definitions?.
-An encryption technique that performs a sector-by-sector encryption of an entire drive; each sector is encrypted in its entirety, making it unreadable when copied with a static acquisition method
(Multiple Choice)
4.9/5
(37)
Which option below is not a hashing function used for validation checks?
(Multiple Choice)
4.9/5
(39)
The Linux command _______ can be used to list the current disk devices connected to the computer.
(Multiple Choice)
4.8/5
(34)
In Linux, how is a specific partition acquired, as opposed to an entire drive?
(Essay)
4.8/5
(41)
Hardware and software errors or incompatibilities are a common problem when dealing with older hard drives.
(True/False)
4.8/5
(32)
Which option below is not a Linux Live CD meant for use as a digital forensics tool?
(Multiple Choice)
4.8/5
(30)
The _______ command was developed by Nicholas Harbour of the Defense Computer Forensics Laboratory.
(Multiple Choice)
5.0/5
(36)
The ___________ file type uses lossy compression to reduce file size and doesn't affect image quality when the file is restored and viewed.?
(Short Answer)
4.9/5
(41)
Which open-source acquisition format is capable of producing compressed or uncompressed image files, and uses the .afd extension for segmented image files?
(Multiple Choice)
5.0/5
(52)
When two files with different contents generate the same digital fingerprint using a hashing function, a(n) ____________ has occurred.
(Short Answer)
4.8/5
(33)
The ______________ imaging tool produces three proprietary formats: IDIF, IRBF, and IEIF.
(Short Answer)
4.7/5
(37)
_______ can be used with the dcfldd command to compare an image file to the original medium.
(Multiple Choice)
4.7/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)