A) Using special characters in the actual name
B) Renaming to a common name used by the operating system
C) Encrypting the file
D) Password-protecting the file
Correct Answer
verified
Multiple Choice
A) Trusted environment
B) Postmortem environment
C) Untrusted environment
D) Dead environment
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Unique digital signature of data
B) Additional sectors created to fill a cluster
C) Application that prevents changes to a hard drive
D) Captures a "snapshot" of everything on the drive
E) Mathematical computations that validate a copy
Correct Answer
verified
Matching
Correct Answer
Short Answer
Correct Answer
verified
Multiple Choice
A) The universal hexadecimal editor
B) Invaluable for combing through large amounts of data
C) Exclusively for Macs
D) AccessData tool designed for finding and examining evidence
E) Primarily for computer crime investigators
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Is performed in accordance with forensic science principles
B) Is conducted with verified tools
C) Is documented thoroughly
D) All the above
Correct Answer
verified
Multiple Choice
A) Microsoft Office versions
B) ClarisWorks
C) Peachtree Accounting
D) Visual Basic
Correct Answer
verified
Multiple Choice
A) The environment
B) The power sources available where the analysis will be done
C) The make of the equipment to be analyzed
D) None of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) The operating system
B) State of the data
C) Availability of an expert witness
D) Domestic and international laws
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) The universal hexadecimal editor
B) Invaluable for combing through large amounts of data
C) Exclusively for Macs
D) AccessData tool designed for finding and examining evidence
E) Primarily for computer crime investigators
Correct Answer
verified
Multiple Choice
A) Investigates the contents of BlackBerry devices
B) Graphical user interface consists of a series of panes
C) Safely and easily images Mac drives
D) Reads the first 32 bits of a file to identify its type
E) Open-source program that runs on UNIX plattorms
Correct Answer
verified
Multiple Choice
A) The universal hexadecimal editor
B) Invaluable for combing through large amounts of data
C) Exclusively for Macs
D) AccessData tool designed for finding and examining evidence
E) Primarily for computer crime investigators
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 21 - 40 of 50
Related Exams