Deck 19: Computer Forensics

Full screen (f)
exit full mode
Question
Which of the following is NOT classified as software?

A)Operating systems
B)Word processors
C)Web browsers
D)Flash drives
Use Space or
up arrow
down arrow
to flip the card.
Question
The primary form of data storage within a personal computer is:

A)The CD-ROM.
B)The hard disk drive.
C)A zip drive.
D)The recycle bin.
Question
What keeps track of the location of files and folders on the HDD?

A)The search engine
B)The HDD itself
C)The CPU
D)The FAT
Question
The ultimate goal of obtaining an image of a hard disk drive is to:

A)Locate as much incriminating information as possible.
B)Preserve the photographs and video stored on the drive.
C)Give priority to the text files on the drive.
D)Obtain information without altering the drive in any way.
Question
A software algorithm used to create a "fingerprint" of a file or an entire HDD is called:

A)MD5.
B)ROM.
C)RAM.
D)MAC OS.
Question
Which of the following is NOT considered a type of software?

A)Linux
B)Firefox
C)Excel
D)Random Access Memory
Question
A cluster is a group of ________ in multiples of ________.

A)Partitions, two
B)Disks, four
C)Cylinders, three
D)Sectors, two
Question
The boot (start-up)process for a computer is controlled by:

A)The hard disk drive.
B)ROM.
C)RAM.
D)USB thumb drives.
Question
Evidentiary data may be recovered from which of the following?

A)Slack space on the HDD
B)Unallocated space on the HDD
C)RAM swap files
D)All of the above
Question
One gigabyte can be expressed as:

A)1,000 bytes.
B)1,000 megabytes (MB).
C)1,000 kilobytes (KB).
D)8,000 bits.
Question
Which of the following is NOT associated with the partitioning of a HDD?

A)Quadrant
B)Sector
C)Track
D)Cluster
Question
Which is the best definition of latent data?

A)Anything readily available to the user, also known as visible data
B)Data that are hidden from view
C)An automatically saved copy of a file that was recently modified
D)Data which are typically of little use to forensic investigators
Question
Once a file is deleted by a user, it:

A)Is obliterated from the system and cannot be recovered.
B)Is retained until the disk space it occupies is allocated for another use.
C)May be identified using forensic image acquisition software.
D)Both B and C
Question
One of the most common places to begin to look for evidential data is in:

A)The spreadsheet files.
B)A photograph editing program.
C)A CAD package.
D)The word processing or text-based document files.
Question
The first thing a crime scene investigator should do when encountering computer forensic evidence is:

A)Unplug every device from the CPU to preserve the hard disk drive.
B)Procure a warrant to search.
C)Remove the system to the laboratory for processing.
D)Document the scene.
Question
A motherboard:

A)Is the main circuit board within a computer.
B)Has a socket to accept RAM.
C)Connects to every device used by the system.
D)All of the above
Question
The term "bit" is short for:

A)Tidbit.
B)Byte.
C)Binary digit.
D)Database.
Question
When is it necessary to make a "fingerprint" of a HDD?

A)In most cases
B)Only sometimes
C)Before and after imaging its contents
D)Rarely
Question
Which of the following is NOT considered a hardware device?

A)Monitor
B)Hard disk drive
C)Mouse
D)Operating system
Question
A Network Interface Card (NIC)enables a personal computer to communicate with other computers via:

A)A wired connection.
B)A wireless connection.
C)A satellite connection.
D)Both A and B
Question
Which of the following actions taken at the crime scene involving a computer is incorrect?

A)Upon arrival, sketching the overall layout as well as photographing it
B)Photographing any running monitors
C)Removing the plug from the back of the computer, not from the wall
D)None of the above
Question
Which of the following is/are potential sources for forensic evidence on a suspect's personal computer?

A)Internet "cookies"
B)Internet history
C)Cache
D)All of the above
Question
URL stands for:

A)Uniform Replacement Listing.
B)Unlimited Real-time Link.
C)Uniform Resource Locator.
D)User-Resource Link.
Question
Sectors are typically how many bytes in size?

A)126 bytes
B)256 bytes
C)512 bytes
D)1024 bytes
Question
One should not search for "visible" data in:

A)Swap files.
B)Temporary files.
C)Unallocated space.
D)Windows.
Question
If a file system defines a cluster as six sectors, how many bytes of information can be stored on each cluster?

A)24,576
B)512
C)3,072
D)307.2
Question
The best way to handle a mobile device and preserve data is:

A)Turn the mobile device off.
B)Leave the mobile device on.
C)Leave the mobile device on, but place it in a Faraday shield.
D)None of the above
Question
The two types of slack space are ________ slack and ________ slack.

A)File; RAM
B)RAM; ROM
C)Cluster; file
D)IP; TTI
Question
Unauthorized intrusion into a computer is called:

A)Crashing.
B)Whacking.
C)Hacking.
D)Spamming.
Question
In which of the following places would a computer forensic investigator look for latent data?

A)RAM slack
B)File slack
C)Unallocated space
D)All of the above
Question
Which of the following is NOT a type of RAM?

A)SSIM
B)DDIM
C)SD
D)DAB
Question
Which source will NOT be useful to investigators seeking to determine a user's Internet history?

A)Cookies
B)Cache
C)Favorite sites
D)Slack files
Question
Which of the following carries data from one hardware device to another?

A)System bus
B)Central processing unit (CPU)
C)Random-access memory (RAM)
D)Network interface card (NIC)
Question
The complex of wires located on the motherboard which serves to carry data from one hardware device to another is:

A)RAM.
B)ROM.
C)System bus.
D)Central processing unit.
Question
Hard drive partitions are typically divided into:

A)Sectors.
B)Clusters.
C)Tracks.
D)All of the above
Question
Files containing chat and instant messaging are most likely stored in:

A)Swap files.
B)RAM.
C)ROM.
D)Slack files.
Question
Text messaging is also known as:

A)SMS.
B)MMS.
C)GPS.
D)RAM.
Question
One should not look for "latent" data in:

A)RAM slack.
B)File slack.
C)Unallocated space.
D)Temporary files.
Question
Most web browsers use a(n)________ to expedite and streamline browsing.

A)Area network
B)Cable modem
C)Domain
D)Caching system
Question
A(n)________ is placed on a hard disk drive by a website to track certain information about its visitors.

A)Phish
B)IP address
C)E-mail
D)Cookie
Question
The primary goal in obtaining data from a HDD is to do so without altering even one bit of data.
Question
A device that permits only requested traffic to enter a computer system is known as a(n):

A)Central processing unit (CPU).
B)Firewall.
C)Cookie.
D)Internet cache.
Question
Swap space is empty space on a hard disk drive (HDD)created because of the way the HDD stores files.
Question
A FAT tracks the location of files and folders on the hard disk drive.
Question
The two main types of evidentiary computer data are visible data and latent data.
Question
Which type of data are readily available to a computer user?

A)Swap
B)Latent
C)Visible
D)Allocated
Question
A bit, or a binary digit, is the smallest unit of information on a computer.
Question
The ________ is a complex network of wires that carry data from one hardware device to another.

A)Motherboard
B)Central processing unit (CPU)
C)Hard disk drive
D)Operating system
Question
Visible data exists in areas of the drive that are, generally speaking, unknown and inaccessible to most end users.
Question
A cluster is the smallest unit of data that a hard drive can address.
Question
The primary storage device on most computers is the hard disk drive (HDD).
Question
The central processing unit is the main system board of a computer that delivers power, data, and instructions to the computer's components.
Question
Before an OS can be formatted, it must write to a HDD.
Question
The central processing unit, or CPU, is the part of the computer that actually computes.
Question
The definition of software is:

A)Storage programs used to start the boot process.
B)A set of instructions compiled into a program that performs a particular task.
C)A complex network of wires that carry data from one hardware device to another.
D)A primary component of storage in the personal computer.
Question
RAM is not permanent; its contents are lost forever once power is taken away from the computer.
Question
A computer forensic investigator would most likely look for latent data in temporary files.
Question
Software comprises the physical components of the computer.
Question
ROM stores software programs and instructions while the computer is turned on.
Question
A domain manages traffic between computers on a network.
Question
________ space is a file or defined space on the HDD to which data is written to free RAM for applications that are in use.
Question
An IP address may lead to the identity of the person who was using a particular computer to access the Internet.
Question
Clusters are groups of ________.
Question
MMS, or Multimedia Message Service, is text messaging with attachments.
Question
The computer's ________ system is the bridge between the human user and the computer's electronic components.
Question
________ is a set of instructions compiled into a program that performs a particular task.
Question
Three places where a forensic computer examiner might look to determine what websites a computer user has visited recently are the Internet cache, cookies, and the Internet history.
Question
Investigators would want to copy blank or unused portions of the HDD to preserve ________ data.
Question
The operating systems of mobile devices are usually the same.
Question
Often mobile devices contain the same Internet artifacts as a computer, such as cookies and browser history.
Question
________ space is empty space on a hard disk drive (HDD)created because of the way the HDD stores files.
Question
The ________ is the main chip within the computer.
Question
________ consists of programs that are used to start the computer's boot process.
Question
A Message Digest 5 (MD5)/Secure Hash Algorithm (SHA)takes a ________ of a hard disk drive (HDD)before and after forensic imaging.
Question
An IP address typically takes the form ###.###.###.###, in which ### can be any number from 0 to 255.
Question
________ comprises the physical components of the computer.
Question
The call history for a mobile device is generally not able to be used in an investigation.
Question
Mobile devices are often shut off to avoid the loss of data.
Question
________ data includes all information that the operating system is presently aware of, and thus is readily accessible to the user.
Question
Extracting data from a mobile device is more complicated than extracting data from a computer.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/109
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 19: Computer Forensics
1
Which of the following is NOT classified as software?

A)Operating systems
B)Word processors
C)Web browsers
D)Flash drives
D
2
The primary form of data storage within a personal computer is:

A)The CD-ROM.
B)The hard disk drive.
C)A zip drive.
D)The recycle bin.
B
3
What keeps track of the location of files and folders on the HDD?

A)The search engine
B)The HDD itself
C)The CPU
D)The FAT
D
4
The ultimate goal of obtaining an image of a hard disk drive is to:

A)Locate as much incriminating information as possible.
B)Preserve the photographs and video stored on the drive.
C)Give priority to the text files on the drive.
D)Obtain information without altering the drive in any way.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
5
A software algorithm used to create a "fingerprint" of a file or an entire HDD is called:

A)MD5.
B)ROM.
C)RAM.
D)MAC OS.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT considered a type of software?

A)Linux
B)Firefox
C)Excel
D)Random Access Memory
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
7
A cluster is a group of ________ in multiples of ________.

A)Partitions, two
B)Disks, four
C)Cylinders, three
D)Sectors, two
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
8
The boot (start-up)process for a computer is controlled by:

A)The hard disk drive.
B)ROM.
C)RAM.
D)USB thumb drives.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
9
Evidentiary data may be recovered from which of the following?

A)Slack space on the HDD
B)Unallocated space on the HDD
C)RAM swap files
D)All of the above
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
10
One gigabyte can be expressed as:

A)1,000 bytes.
B)1,000 megabytes (MB).
C)1,000 kilobytes (KB).
D)8,000 bits.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT associated with the partitioning of a HDD?

A)Quadrant
B)Sector
C)Track
D)Cluster
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
12
Which is the best definition of latent data?

A)Anything readily available to the user, also known as visible data
B)Data that are hidden from view
C)An automatically saved copy of a file that was recently modified
D)Data which are typically of little use to forensic investigators
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
13
Once a file is deleted by a user, it:

A)Is obliterated from the system and cannot be recovered.
B)Is retained until the disk space it occupies is allocated for another use.
C)May be identified using forensic image acquisition software.
D)Both B and C
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
14
One of the most common places to begin to look for evidential data is in:

A)The spreadsheet files.
B)A photograph editing program.
C)A CAD package.
D)The word processing or text-based document files.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
15
The first thing a crime scene investigator should do when encountering computer forensic evidence is:

A)Unplug every device from the CPU to preserve the hard disk drive.
B)Procure a warrant to search.
C)Remove the system to the laboratory for processing.
D)Document the scene.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
16
A motherboard:

A)Is the main circuit board within a computer.
B)Has a socket to accept RAM.
C)Connects to every device used by the system.
D)All of the above
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
17
The term "bit" is short for:

A)Tidbit.
B)Byte.
C)Binary digit.
D)Database.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
18
When is it necessary to make a "fingerprint" of a HDD?

A)In most cases
B)Only sometimes
C)Before and after imaging its contents
D)Rarely
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is NOT considered a hardware device?

A)Monitor
B)Hard disk drive
C)Mouse
D)Operating system
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
20
A Network Interface Card (NIC)enables a personal computer to communicate with other computers via:

A)A wired connection.
B)A wireless connection.
C)A satellite connection.
D)Both A and B
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following actions taken at the crime scene involving a computer is incorrect?

A)Upon arrival, sketching the overall layout as well as photographing it
B)Photographing any running monitors
C)Removing the plug from the back of the computer, not from the wall
D)None of the above
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is/are potential sources for forensic evidence on a suspect's personal computer?

A)Internet "cookies"
B)Internet history
C)Cache
D)All of the above
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
23
URL stands for:

A)Uniform Replacement Listing.
B)Unlimited Real-time Link.
C)Uniform Resource Locator.
D)User-Resource Link.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
24
Sectors are typically how many bytes in size?

A)126 bytes
B)256 bytes
C)512 bytes
D)1024 bytes
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
25
One should not search for "visible" data in:

A)Swap files.
B)Temporary files.
C)Unallocated space.
D)Windows.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
26
If a file system defines a cluster as six sectors, how many bytes of information can be stored on each cluster?

A)24,576
B)512
C)3,072
D)307.2
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
27
The best way to handle a mobile device and preserve data is:

A)Turn the mobile device off.
B)Leave the mobile device on.
C)Leave the mobile device on, but place it in a Faraday shield.
D)None of the above
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
28
The two types of slack space are ________ slack and ________ slack.

A)File; RAM
B)RAM; ROM
C)Cluster; file
D)IP; TTI
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
29
Unauthorized intrusion into a computer is called:

A)Crashing.
B)Whacking.
C)Hacking.
D)Spamming.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
30
In which of the following places would a computer forensic investigator look for latent data?

A)RAM slack
B)File slack
C)Unallocated space
D)All of the above
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is NOT a type of RAM?

A)SSIM
B)DDIM
C)SD
D)DAB
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
32
Which source will NOT be useful to investigators seeking to determine a user's Internet history?

A)Cookies
B)Cache
C)Favorite sites
D)Slack files
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following carries data from one hardware device to another?

A)System bus
B)Central processing unit (CPU)
C)Random-access memory (RAM)
D)Network interface card (NIC)
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
34
The complex of wires located on the motherboard which serves to carry data from one hardware device to another is:

A)RAM.
B)ROM.
C)System bus.
D)Central processing unit.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
35
Hard drive partitions are typically divided into:

A)Sectors.
B)Clusters.
C)Tracks.
D)All of the above
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
36
Files containing chat and instant messaging are most likely stored in:

A)Swap files.
B)RAM.
C)ROM.
D)Slack files.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
37
Text messaging is also known as:

A)SMS.
B)MMS.
C)GPS.
D)RAM.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
38
One should not look for "latent" data in:

A)RAM slack.
B)File slack.
C)Unallocated space.
D)Temporary files.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
39
Most web browsers use a(n)________ to expedite and streamline browsing.

A)Area network
B)Cable modem
C)Domain
D)Caching system
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)________ is placed on a hard disk drive by a website to track certain information about its visitors.

A)Phish
B)IP address
C)E-mail
D)Cookie
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
41
The primary goal in obtaining data from a HDD is to do so without altering even one bit of data.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
42
A device that permits only requested traffic to enter a computer system is known as a(n):

A)Central processing unit (CPU).
B)Firewall.
C)Cookie.
D)Internet cache.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
43
Swap space is empty space on a hard disk drive (HDD)created because of the way the HDD stores files.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
44
A FAT tracks the location of files and folders on the hard disk drive.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
45
The two main types of evidentiary computer data are visible data and latent data.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
46
Which type of data are readily available to a computer user?

A)Swap
B)Latent
C)Visible
D)Allocated
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
47
A bit, or a binary digit, is the smallest unit of information on a computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
48
The ________ is a complex network of wires that carry data from one hardware device to another.

A)Motherboard
B)Central processing unit (CPU)
C)Hard disk drive
D)Operating system
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
49
Visible data exists in areas of the drive that are, generally speaking, unknown and inaccessible to most end users.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
50
A cluster is the smallest unit of data that a hard drive can address.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
51
The primary storage device on most computers is the hard disk drive (HDD).
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
52
The central processing unit is the main system board of a computer that delivers power, data, and instructions to the computer's components.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
53
Before an OS can be formatted, it must write to a HDD.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
54
The central processing unit, or CPU, is the part of the computer that actually computes.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
55
The definition of software is:

A)Storage programs used to start the boot process.
B)A set of instructions compiled into a program that performs a particular task.
C)A complex network of wires that carry data from one hardware device to another.
D)A primary component of storage in the personal computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
56
RAM is not permanent; its contents are lost forever once power is taken away from the computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
57
A computer forensic investigator would most likely look for latent data in temporary files.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
58
Software comprises the physical components of the computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
59
ROM stores software programs and instructions while the computer is turned on.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
60
A domain manages traffic between computers on a network.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
61
________ space is a file or defined space on the HDD to which data is written to free RAM for applications that are in use.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
62
An IP address may lead to the identity of the person who was using a particular computer to access the Internet.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
63
Clusters are groups of ________.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
64
MMS, or Multimedia Message Service, is text messaging with attachments.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
65
The computer's ________ system is the bridge between the human user and the computer's electronic components.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
66
________ is a set of instructions compiled into a program that performs a particular task.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
67
Three places where a forensic computer examiner might look to determine what websites a computer user has visited recently are the Internet cache, cookies, and the Internet history.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
68
Investigators would want to copy blank or unused portions of the HDD to preserve ________ data.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
69
The operating systems of mobile devices are usually the same.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
70
Often mobile devices contain the same Internet artifacts as a computer, such as cookies and browser history.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
71
________ space is empty space on a hard disk drive (HDD)created because of the way the HDD stores files.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
72
The ________ is the main chip within the computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
73
________ consists of programs that are used to start the computer's boot process.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
74
A Message Digest 5 (MD5)/Secure Hash Algorithm (SHA)takes a ________ of a hard disk drive (HDD)before and after forensic imaging.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
75
An IP address typically takes the form ###.###.###.###, in which ### can be any number from 0 to 255.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
76
________ comprises the physical components of the computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
77
The call history for a mobile device is generally not able to be used in an investigation.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
78
Mobile devices are often shut off to avoid the loss of data.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
79
________ data includes all information that the operating system is presently aware of, and thus is readily accessible to the user.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
80
Extracting data from a mobile device is more complicated than extracting data from a computer.
Unlock Deck
Unlock for access to all 109 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 109 flashcards in this deck.