
Everything Computer Forensics
Authored by Gavin Henley
Information Technology (IT)
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
90 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Windows 95 was the first OS to support this older file system?
FAT32
NTFS
ReFS
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
This is about obfuscating a message so that it cannot be read?
Cryptography
Steganography
Scientology
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
This calculation is used to calculate single loss expectency?
SLE
ALE
NIST
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
_______________ memory analysis is a live-system forensic technique in which you collect a memory dump and perform analysis in an isolated environment?
Static
Volatile
System
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
If the computer is turned on when you arrive, what does the Secret Service recommend you do?
Begin investigation immediately
Shut the computer down according to the recommended Secret Service procedure
Transport the computer with power on
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following might contain data that was live in memory and not stored on the hard-drive?
Swap File
Registry Hive
Log File
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the most important reason that you not touch the actual original evidence any more than you have to?
Each time you touch digital data, there is some chance of altering it.
You might be accused of planting evidence
You might accidentally decrypt files
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?