Deck 10: Computer Forensics: Terminology and Requirements

ملء الشاشة (f)
exit full mode
سؤال
What are the two types of data extraction?

A) physical and logical
B) manual and automated
C) internal and external
D) accidental and intentional
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which lab system is capable of handling larger workloads simultaneously?

A) Better Lab System
B) Dream Lab System
C) Power Lab System
D) Basic Lab System
سؤال
Computer forensics helps which of the following groups in supporting claims of wrongful termination, sexual harassment, and age discrimination?

A) individuals
B) civil litigators
C) corporations
D) prosecutors
سؤال
ASCII code for defining characters is based on ________ code.

A) hexadecimal
B) binary
C) RAM
D) sector
سؤال
In which system are interpretative rules associated with a base of two with integers represented by zeroes and ones?

A) binary system
B) basic input/output system
C) hexadecimal system
D) encrypting file system
سؤال
What kind of programs should investigators employ to reveal hidden and deleted files, unlock encrypted files, and detect steganography?

A) both internal and external programs
B) only licensed programs
C) both manual and automated programs
D) only contemporary programs
سؤال
Which of the following programs reads disks a track at a time and calculates an algorithmic signature represented by unique file identifiers?

A) recovery
B) forensic
C) verification
D) imaging
سؤال
Which of the following is NOT true of computer forensic science?

A) It protects digital evidence from possible alterations.
B) It provides mechanisms for evidence duplication.
C) It encourages allegations of corruption on the part of investigators.
D) It enables the creation of forensically sound images useful for data analysis.
سؤال
Which of the following is NOT an advantage attributed to the introduction of disk operating systems?

A) It provides for the storage of documents in contiguous sectors.
B) It reduces the data management burden of applications.
C) It allows application-specific disk hierarchies.
D) It maximizes the use of limited space.
سؤال
Which of the following is NOT a traditional problem in computer investigations?

A) inadequate resources
B) lack of mechanisms for interpreting and relaying highly technical information
C) lack of communication and cooperation among agencies
D) evidence corruption
سؤال
Which of the following is an example of a disk recovery and extraction tool?

A) Tech Assist's ByteBack
B) Norton Utilities
C) Access Data's Forensic Toolkit
D) Ultimate Toolkit
سؤال
Which of the following can be attributed to the demand for a centralized disk operating system and the birth of DOS?

A) increased responsibilities among local police agencies
B) increased interest in emerging technology
C) increased consumer choice and market competition
D) increased concern for security of data
سؤال
Which of the following is NOT a step included in the logical extraction of data?

A) data reduction through comparison
B) extraction of file slack
C) recovery of deleted files
D) evaluation of the partition table
سؤال
Which of the following refers to the area of a computer that holds data during processing and is erased when power is shut down?

A) static memory
B) primary storage
C) volatile memory
D) secondary storage
سؤال
Which of the following are the three primary components of a computer?

A) hardware, firmware, operating systems
B) firmware, hardware, software
C) software, hardware, operating systems
D) firmware, software, Maresware
سؤال
Which of the following factors is most important in determining the type of tool to be used in a computer forensics investigation?

A) type of crime encountered
B) type of information
C) type of concealment
D) type of suspect device
سؤال
Which of the following is a single circular disk with concentric tracks that are turned by spindles under one or more heads?

A) logical drive
B) sector
C) fixed disk
D) floppy disk
سؤال
Which of the following is true of a hexadecimal system?

A) Interpretative rules are associated with a base of two with integers represented by zeroes and ones.
B) Interpretative rules are associated with a base of 16 with integers ranging from 0 to 9 and A to F.
C) The range of whole numbers that can be represented by a single byte is 0 to 255.
D) Investigators do not need to evaluate files with a hexadecimal viewer.
سؤال
A(n) ________FAT is used if a disk requires less than 65,536 but more than 4,096 clusters.

A) 4-bit
B) 16-bit
C) 8-bit
D) 32-bit
سؤال
The development and regular review of which of the following is essential as technology changes?

A) cyclical redundancy checksum
B) master boot record
C) standard operating procedures
D) cipher combination locks
سؤال
The BIOS is stored in the Encrypting File System (EFS).
سؤال
File systems allow end-users to perceive their document as multiple streams of bytes while providing for its storage in contiguous sectors.
سؤال
Which of the following tools are the most popular and stand-alone imaging utilities employed for forensic investigators?

A) EnCase and FastBloc
B) ByteBack and Safeback
C) DECLASFY and BRANDIT
D) Data Dumper and Grep
سؤال
Extraction of a file pertinent to an examination may be based on the file name and extension, file header, file content, and location on the drive.
سؤال
Which of the following programs extends decryption capabilities beyond a single computer by using the distributed power of multiple computers across a network to decrypt files and recover passwords?

A) Password Recovery Toolkit
B) FTK Imager
C) Distributed Network Attack
D) Registry Viewer
سؤال
Forensic imaging programs must be capable of making a bitstream duplicate or an image of an original disk or partition onto fixed or removable media.
سؤال
The physical extraction phase identifies and recovers files and data based on the installed operating system, file system, and/or application.
سؤال
The logical file size refers to the exact size of a file in bytes.
سؤال
Many agencies do not avail themselves of the free training courses provided by the FBI and the Federal Law Enforcement Training Center as the agencies are unable to afford the loss of personnel.
سؤال
The cluster size for a particular device is specified in which of the following?

A) master boot record
B) read-only memory
C) BIOS parameter block
D) file allocation table
سؤال
The statement of compliance or noncompliance with certain specifications or other requirements must be included in a report.
سؤال
A file system is the combination of a hardware device and computer instructions and data that reside as read-only software on that device.
سؤال
The smallest forms of data storage are represented by binary digits.
سؤال
Overt files are not hidden, deleted, or encrypted.
سؤال
Raw image files increase the costs associated with the maintenance of forensic laboratories and software libraries because they exhibit backward compatibility issues.
سؤال
Electronic data recovery should be reserved for instances when the instrumentality of computer technology has been demonstrated.
سؤال
Most contemporary integrated packages have stand-alone imaging programs.
سؤال
During analysis of digital evidence, which of the following elements is addressed?

A) password crackers
B) truncated entries
C) case number
D) actus reus
سؤال
A file system is the disk management platform employed by a particular operating system.
سؤال
Which of the following terms refers to a suspect's guilty mind or intent, as might be demonstrated by the use of data hiding or drive wiping techniques?

A) mens rea
B) harm
C) actus reus
D) ownership
سؤال
The ________ determines the size of the appropriate FAT based on the number of clusters necessary to represent the entire disk space.
سؤال
What is the first step in the development of computer forensic capabilities? Describe the minimum hardware requirements for a dream field system.
سؤال
________ is the fear of new technology.
سؤال
________ are devices and data at the electronic or machine level.
سؤال
The familiarity and utilization of ________ may result in a situation where investigators know just enough to make them potentially hazardous to the investigation.
سؤال
Microsoft's ________ provides more security and is more efficient in terms of utilization of storage space than FAT.
سؤال
Forensic laboratories should be equipped with ________ so that criminal contraband can be permanently removed from suspect machines.
سؤال
Evaluation of the ________ and unused space on the physical drive may identify the file systems present and determine if the entire physical size of the hard disk is accounted for.
سؤال
The use of ________ may force agencies to update software licenses or lose company support.
سؤال
________ enable investigators to perfectly duplicate a suspect drive onto a form of removable media.
سؤال
The advent of ________ required a corresponding mechanism to ensure that applications did not interfere with one another's data storage.
سؤال
________ can be used to identify and eliminate known files through the comparison of calculated hash values to authenticated hash values.
سؤال
A ________ is the number of bytes that represent about one-half page of text.
سؤال
Computer forensics helps ________ in pre-search warrant preparations and post-seizure handling of computer equipment.
سؤال
Explain how over-reliance on automated programs and self-proclaimed experts pose a problem in computer investigations.How can this problem be overcome?
سؤال
Define firmware.Describe the boot up sequence of a computer with particular reference to the BIOS found in IBM-compatible personal computers.
سؤال
Traditionally, suspect drivers and disks were copied at the ________ level.
سؤال
________ allow front-page viewing of multiple files, thus enabling investigators to quickly identify questionable graphics files.
سؤال
Discuss the development within mobile device forensic tools and suggest issues that need to be addressed to improve them.
سؤال
Describe the five general categories of data analysis tools.Illustrate with an example how file viewer software is used in child pornography cases.
سؤال
Match between columns
En Case Forensic
data recovery/extraction tool
En Case Forensic
guidance software
En Case Forensic
access data
En Case Forensic
imaging and verification software
En Case Forensic
wiping program
Disk edit
data recovery/extraction tool
Disk edit
guidance software
Disk edit
access data
Disk edit
imaging and verification software
Disk edit
wiping program
Byte Back
data recovery/extraction tool
Byte Back
guidance software
Byte Back
access data
Byte Back
imaging and verification software
Byte Back
wiping program
FTK Imager
data recovery/extraction tool
FTK Imager
guidance software
FTK Imager
access data
FTK Imager
imaging and verification software
FTK Imager
wiping program
The Coroner’s Toolkit
data recovery/extraction tool
The Coroner’s Toolkit
guidance software
The Coroner’s Toolkit
access data
The Coroner’s Toolkit
imaging and verification software
The Coroner’s Toolkit
wiping program
سؤال
Match between columns
Megabyte
one-half page of text
Megabyte
truck full of paper
Megabyte
a single character
Megabyte
one tenth of the Library of Congress
Megabyte
Small novel
Kilobyte
one-half page of text
Kilobyte
truck full of paper
Kilobyte
a single character
Kilobyte
one tenth of the Library of Congress
Kilobyte
Small novel
Nibble
one-half page of text
Nibble
truck full of paper
Nibble
a single character
Nibble
one tenth of the Library of Congress
Nibble
Small novel
Terabyte
one-half page of text
Terabyte
truck full of paper
Terabyte
a single character
Terabyte
one tenth of the Library of Congress
Terabyte
Small novel
Gigabyte
one-half page of text
Gigabyte
truck full of paper
Gigabyte
a single character
Gigabyte
one tenth of the Library of Congress
Gigabyte
Small novel
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Computer Forensics: Terminology and Requirements
1
What are the two types of data extraction?

A) physical and logical
B) manual and automated
C) internal and external
D) accidental and intentional
A
2
Which lab system is capable of handling larger workloads simultaneously?

A) Better Lab System
B) Dream Lab System
C) Power Lab System
D) Basic Lab System
C
3
Computer forensics helps which of the following groups in supporting claims of wrongful termination, sexual harassment, and age discrimination?

A) individuals
B) civil litigators
C) corporations
D) prosecutors
A
4
ASCII code for defining characters is based on ________ code.

A) hexadecimal
B) binary
C) RAM
D) sector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
5
In which system are interpretative rules associated with a base of two with integers represented by zeroes and ones?

A) binary system
B) basic input/output system
C) hexadecimal system
D) encrypting file system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
6
What kind of programs should investigators employ to reveal hidden and deleted files, unlock encrypted files, and detect steganography?

A) both internal and external programs
B) only licensed programs
C) both manual and automated programs
D) only contemporary programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following programs reads disks a track at a time and calculates an algorithmic signature represented by unique file identifiers?

A) recovery
B) forensic
C) verification
D) imaging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is NOT true of computer forensic science?

A) It protects digital evidence from possible alterations.
B) It provides mechanisms for evidence duplication.
C) It encourages allegations of corruption on the part of investigators.
D) It enables the creation of forensically sound images useful for data analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is NOT an advantage attributed to the introduction of disk operating systems?

A) It provides for the storage of documents in contiguous sectors.
B) It reduces the data management burden of applications.
C) It allows application-specific disk hierarchies.
D) It maximizes the use of limited space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is NOT a traditional problem in computer investigations?

A) inadequate resources
B) lack of mechanisms for interpreting and relaying highly technical information
C) lack of communication and cooperation among agencies
D) evidence corruption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is an example of a disk recovery and extraction tool?

A) Tech Assist's ByteBack
B) Norton Utilities
C) Access Data's Forensic Toolkit
D) Ultimate Toolkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following can be attributed to the demand for a centralized disk operating system and the birth of DOS?

A) increased responsibilities among local police agencies
B) increased interest in emerging technology
C) increased consumer choice and market competition
D) increased concern for security of data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is NOT a step included in the logical extraction of data?

A) data reduction through comparison
B) extraction of file slack
C) recovery of deleted files
D) evaluation of the partition table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following refers to the area of a computer that holds data during processing and is erased when power is shut down?

A) static memory
B) primary storage
C) volatile memory
D) secondary storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following are the three primary components of a computer?

A) hardware, firmware, operating systems
B) firmware, hardware, software
C) software, hardware, operating systems
D) firmware, software, Maresware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following factors is most important in determining the type of tool to be used in a computer forensics investigation?

A) type of crime encountered
B) type of information
C) type of concealment
D) type of suspect device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is a single circular disk with concentric tracks that are turned by spindles under one or more heads?

A) logical drive
B) sector
C) fixed disk
D) floppy disk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is true of a hexadecimal system?

A) Interpretative rules are associated with a base of two with integers represented by zeroes and ones.
B) Interpretative rules are associated with a base of 16 with integers ranging from 0 to 9 and A to F.
C) The range of whole numbers that can be represented by a single byte is 0 to 255.
D) Investigators do not need to evaluate files with a hexadecimal viewer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
19
A(n) ________FAT is used if a disk requires less than 65,536 but more than 4,096 clusters.

A) 4-bit
B) 16-bit
C) 8-bit
D) 32-bit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
20
The development and regular review of which of the following is essential as technology changes?

A) cyclical redundancy checksum
B) master boot record
C) standard operating procedures
D) cipher combination locks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
21
The BIOS is stored in the Encrypting File System (EFS).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
22
File systems allow end-users to perceive their document as multiple streams of bytes while providing for its storage in contiguous sectors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following tools are the most popular and stand-alone imaging utilities employed for forensic investigators?

A) EnCase and FastBloc
B) ByteBack and Safeback
C) DECLASFY and BRANDIT
D) Data Dumper and Grep
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
24
Extraction of a file pertinent to an examination may be based on the file name and extension, file header, file content, and location on the drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following programs extends decryption capabilities beyond a single computer by using the distributed power of multiple computers across a network to decrypt files and recover passwords?

A) Password Recovery Toolkit
B) FTK Imager
C) Distributed Network Attack
D) Registry Viewer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
26
Forensic imaging programs must be capable of making a bitstream duplicate or an image of an original disk or partition onto fixed or removable media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
27
The physical extraction phase identifies and recovers files and data based on the installed operating system, file system, and/or application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
28
The logical file size refers to the exact size of a file in bytes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
29
Many agencies do not avail themselves of the free training courses provided by the FBI and the Federal Law Enforcement Training Center as the agencies are unable to afford the loss of personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
30
The cluster size for a particular device is specified in which of the following?

A) master boot record
B) read-only memory
C) BIOS parameter block
D) file allocation table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
31
The statement of compliance or noncompliance with certain specifications or other requirements must be included in a report.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
32
A file system is the combination of a hardware device and computer instructions and data that reside as read-only software on that device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
33
The smallest forms of data storage are represented by binary digits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
34
Overt files are not hidden, deleted, or encrypted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
35
Raw image files increase the costs associated with the maintenance of forensic laboratories and software libraries because they exhibit backward compatibility issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
36
Electronic data recovery should be reserved for instances when the instrumentality of computer technology has been demonstrated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
37
Most contemporary integrated packages have stand-alone imaging programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
38
During analysis of digital evidence, which of the following elements is addressed?

A) password crackers
B) truncated entries
C) case number
D) actus reus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
39
A file system is the disk management platform employed by a particular operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following terms refers to a suspect's guilty mind or intent, as might be demonstrated by the use of data hiding or drive wiping techniques?

A) mens rea
B) harm
C) actus reus
D) ownership
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
41
The ________ determines the size of the appropriate FAT based on the number of clusters necessary to represent the entire disk space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is the first step in the development of computer forensic capabilities? Describe the minimum hardware requirements for a dream field system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ is the fear of new technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
44
________ are devices and data at the electronic or machine level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
45
The familiarity and utilization of ________ may result in a situation where investigators know just enough to make them potentially hazardous to the investigation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
46
Microsoft's ________ provides more security and is more efficient in terms of utilization of storage space than FAT.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
47
Forensic laboratories should be equipped with ________ so that criminal contraband can be permanently removed from suspect machines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
48
Evaluation of the ________ and unused space on the physical drive may identify the file systems present and determine if the entire physical size of the hard disk is accounted for.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
49
The use of ________ may force agencies to update software licenses or lose company support.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
50
________ enable investigators to perfectly duplicate a suspect drive onto a form of removable media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
51
The advent of ________ required a corresponding mechanism to ensure that applications did not interfere with one another's data storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
52
________ can be used to identify and eliminate known files through the comparison of calculated hash values to authenticated hash values.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
53
A ________ is the number of bytes that represent about one-half page of text.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
54
Computer forensics helps ________ in pre-search warrant preparations and post-seizure handling of computer equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
55
Explain how over-reliance on automated programs and self-proclaimed experts pose a problem in computer investigations.How can this problem be overcome?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
56
Define firmware.Describe the boot up sequence of a computer with particular reference to the BIOS found in IBM-compatible personal computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
57
Traditionally, suspect drivers and disks were copied at the ________ level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
58
________ allow front-page viewing of multiple files, thus enabling investigators to quickly identify questionable graphics files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
59
Discuss the development within mobile device forensic tools and suggest issues that need to be addressed to improve them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
60
Describe the five general categories of data analysis tools.Illustrate with an example how file viewer software is used in child pornography cases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
61
Match between columns
En Case Forensic
data recovery/extraction tool
En Case Forensic
guidance software
En Case Forensic
access data
En Case Forensic
imaging and verification software
En Case Forensic
wiping program
Disk edit
data recovery/extraction tool
Disk edit
guidance software
Disk edit
access data
Disk edit
imaging and verification software
Disk edit
wiping program
Byte Back
data recovery/extraction tool
Byte Back
guidance software
Byte Back
access data
Byte Back
imaging and verification software
Byte Back
wiping program
FTK Imager
data recovery/extraction tool
FTK Imager
guidance software
FTK Imager
access data
FTK Imager
imaging and verification software
FTK Imager
wiping program
The Coroner’s Toolkit
data recovery/extraction tool
The Coroner’s Toolkit
guidance software
The Coroner’s Toolkit
access data
The Coroner’s Toolkit
imaging and verification software
The Coroner’s Toolkit
wiping program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
62
Match between columns
Megabyte
one-half page of text
Megabyte
truck full of paper
Megabyte
a single character
Megabyte
one tenth of the Library of Congress
Megabyte
Small novel
Kilobyte
one-half page of text
Kilobyte
truck full of paper
Kilobyte
a single character
Kilobyte
one tenth of the Library of Congress
Kilobyte
Small novel
Nibble
one-half page of text
Nibble
truck full of paper
Nibble
a single character
Nibble
one tenth of the Library of Congress
Nibble
Small novel
Terabyte
one-half page of text
Terabyte
truck full of paper
Terabyte
a single character
Terabyte
one tenth of the Library of Congress
Terabyte
Small novel
Gigabyte
one-half page of text
Gigabyte
truck full of paper
Gigabyte
a single character
Gigabyte
one tenth of the Library of Congress
Gigabyte
Small novel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.