Matching
Match the following investigative objectives to their proper chain of custody practices.
Premises:
Scanner
Spoofer
Presumption of evidence
Document the activities
Password cracker
Anonymous remailer
Nuker
Preponderance of evidence
Proof beyond reasonable doubt
Presumption
Responses:
Used to break encrypted password files
Create a copy without altering the original
Verify the integrity of the copy to the source
Perform the technical analysis while retaining its integrity
Used to identify services running on a network
Tools used to mask a person's online identity
Keep detailed records and photographs
Software used to destroy system log trails
Ensure fairness in the evaluation
Used to impersonate someone else's identity
Correct Answer:
Premises:
Responses:
Scanner
Spoofer
Presumption of evidence
Document the activities
Password cracker
Anonymous remailer
Nuker
Preponderance of evidence
Proof beyond reasonable doubt
Presumption
Premises:
Scanner
Spoofer
Presumption of evidence
Document the activities
Password cracker
Anonymous remailer
Nuker
Preponderance of evidence
Proof beyond reasonable doubt
Presumption
Responses:
Related Questions
Q35: Match the following forensic tools with their
Q36: A defensible approach is an objective and
Q37: The first step in analyzing data is
Q38: A(n)_ can cause MD5 hashes to be
Q39: _ is another name for the security
Q41: _ data is data that has been
Q42: Match the following types of files to
Q43: If you need to remove a password
Q44: One _ can be saved on numerous
Q45: A computer forensic specialist may examine the