Exam 13: Cell Phone and Mobile Device Forensics
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
The ______________ tool can be used to bypass a virtual machine's hypervisor, and can be used with OpenStack.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
B
In the United States, the Electronic Communications Privacy Act (ECPA) describes 5 mechanisms the government can use to get electronic information from a provider.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
What information below is not something recorded in Google Drive's snapshot.db file?
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
D
Specially trained system and network administrators are often a CSP's first responders.
(True/False)
4.8/5
(35)
The __________________ file contains cid (client ID), clientType, clientVersion, device, deviceID, and timeUtc values relevant to OneDrive.
(Short Answer)
4.8/5
(39)
What cloud service listed below provides a freeware type 1 hypervisor used for public and private clouds?
(Multiple Choice)
4.8/5
(44)
Math each item with a statement below
-Destroying, altering, hiding, or failing to preserve evidence, whether it's intentional or a result of negligence.?
(Multiple Choice)
4.9/5
(32)
Metadata in a prefetch file contains an application's _____________ times in UTC format and a counter of how many times the application has run since the prefect file was created.
(Multiple Choice)
4.7/5
(32)
At what offset is a prefetch file's create date & time located?
(Multiple Choice)
5.0/5
(41)
The __________________________ is an organization that has developed resource documentation for CSPs and their staff. It provides guidance for privacy agreements, security measures, questionnaires, and more.
(Multiple Choice)
4.8/5
(34)
Explain why digital forensics examiners should be most concerned with restrictions applied to customers and security measures.
(Essay)
4.8/5
(37)
Math each item with a statement below
-A shared cloud service that provides access to common or shared data.?
(Multiple Choice)
4.9/5
(31)
Which of the following is not one of the five mechanisms the government can use to get electronic information from a provider?
(Multiple Choice)
4.9/5
(42)
Math each item with a statement below
-Deallocating cloud resources that were assigned to a user or an organization.?
(Multiple Choice)
4.7/5
(37)
A search warrant can be used in any kind of case, either civil or criminal.
(True/False)
4.9/5
(34)
A _____________ is a contract between a CSP and a customer that describes what services are being provided and at what level.
(Short Answer)
4.7/5
(38)
The Google drive file _________________ contains a detailed list of a user's cloud transactions.
(Multiple Choice)
4.9/5
(45)
A _________________ is a tool with application programming interfaces (APIs) that allow reconfiguring a cloud on the fly; it's accessed through the application's Web interface.
(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)