Exam 3: Data Acquisition

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How can data acquisition be performed on an encrypted drive?

(Essay)
4.8/5
(36)

Match the terms with the correct definitions?. -Two or more disks combined into one large drive in several configurations for special needs

(Multiple Choice)
4.8/5
(34)

Match the terms with the correct definitions?. -An area of a disk drive reserved for booting utilities and diagnostic programs; it is not visible to the computer's OS

(Multiple Choice)
4.8/5
(39)

​Which technology below is not a hot-swappable technology?

(Multiple Choice)
4.8/5
(42)

Which RAID type utilizes a parity bit and ​allows for the failure of one drive without losing data?

(Multiple Choice)
4.9/5
(39)

_____________ software is used in a Linux environment to mount and write data only to NTFS partitions.​

(Short Answer)
4.8/5
(34)

Match the terms with the correct definitions?. -An encryption technique that performs a sector-by-sector encryption of an entire drive; each sector is encrypted in its entirety, making it unreadable when copied with a static acquisition method

(Multiple Choice)
4.9/5
(37)

​Which option below is not a hashing function used for validation checks?

(Multiple Choice)
4.9/5
(39)

The Linux command _______ can be used to list the current disk devices connected to the computer.

(Multiple Choice)
4.8/5
(34)

In Linux, how is a specific partition acquired, as opposed to an entire drive?​

(Essay)
4.8/5
(41)

Hardware and software errors or incompatibilities are a common problem when dealing with older hard drives.​

(True/False)
4.8/5
(32)

Which option below is not a Linux Live CD meant for use as a digital forensics tool?​

(Multiple Choice)
4.8/5
(30)

The _______ command was developed by Nicholas Harbour of the Defense Computer Forensics Laboratory.

(Multiple Choice)
5.0/5
(36)

Describe RAID 3.

(Essay)
4.9/5
(40)

The ___________ file type uses lossy compression to reduce file size and doesn't affect image quality when the file is restored and viewed.?

(Short Answer)
4.9/5
(41)

FTK Imager software can acquire a drive's host protected area.​

(True/False)
4.9/5
(45)

​Which open-source acquisition format is capable of producing compressed or uncompressed image files, and uses the .afd extension for segmented image files?

(Multiple Choice)
5.0/5
(52)

When two files with different contents generate the same digital fingerprint using a hashing function, a(n) ____________ has occurred.​

(Short Answer)
4.8/5
(33)

The ______________ imaging tool produces three proprietary formats: IDIF, IRBF, and IEIF.

(Short Answer)
4.7/5
(37)

_______ can be used with the dcfldd command to compare an image file to the original medium.

(Multiple Choice)
4.7/5
(33)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)