Deck 12: Processing of Evidence and Report Preparation

Full screen (f)
exit full mode
Question
How long should the CMOS battery be kept disconnected for the memory to be lost?

A) 24 hours
B) 12 hours
C) 6 hours
D) 30 minutes
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following makes digital forensics a science?

A) Its processes are repeatable and proven.
B) It analyzes various computer programs in order to arrive at assumptions.
C) It follows a universal, standard procedure.
D) It is a universally accepted discipline in universities.
Question
Which of the following defines artifacts?

A) temporary data files that were created by applications
B) data files that pertain to or were created by an individual user
C) system-generated files that are created for operational purposes
D) files that pertain to Internet history and e-mail
Question
Why should the imaging of drives always be initiated by booting the suspect drive from a previously verified forensic floppy?

A) New floppy drives bear the danger of being virus carriers.
B) A previously verified forensic floppy can detect anomalies in the drive faster.
C) Some users will configure their system to erase/modify data if third-party access is determined.
D) The verified forensic floppy can disable the write-blocking program found on most original media.
Question
Which of the following can NOT be categorized as file viewer software?

A) Conversions Plus
B) CompuPic
C) DiskEdit
D) Thumbs Plus
Question
________ are designed to be the first line of defense for users, thus preventing individuals from booting the computer's operating system.

A) Software passwords
B) BIOS passwords
C) CMOS passwords
D) Document passwords
Question
What is the minimum number of imaging programs that any forensic labs should be equipped with?

A) two
B) three
C) four
D) one
Question
Which rule remains unchanged in every computer investigation?

A) encrypt all notes
B) search every single file
C) pull the battery
D) document
Question
Testing forensic software at the extremes and becoming familiar with its capabilities is ________.

A) unnecessary if manufacturers provide documentation
B) a way to validate the forensic software
C) not recommended due to the danger of acquiring viruses
D) more common among computer criminals than investigators
Question
According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.

A) experiment
B) question
C) probable answer
D) possible solution
Question
________ is a mechanism that prevents the destruction, contamination, or corruption of original media and that can be accomplished with many of the popular imaging programs, disk management software, or simple DOS commands.

A) Jumping
B) AUTOEXEC.BAT
C) CONFIG.SYS
D) Write-blocking
Question
Which of the following is the most time-consuming method of circumventing CMOS passwords?

A) key disks
B) default passwords
C) social engineering
D) jumping
Question
Which of the following refers to a category of software that allows users to effectively hide the content of selected files?

A) steganography
B) key discs
C) VFS
D) artifacts
Question
What does "establish forensically sterile conditions" mean in the context of computer-crime investigation?

A) Maintain secrecy about the developments at the forensic lab.
B) Ensure that the members of the staff have no criminal history.
C) Keep the room for forensic tests clean and hygienic.
D) Use new media that have been forensically wiped.
Question
What would enable investigators to establish a step-by-step preliminary investigative process which runs programs in a specified order?

A) CONFIG.SYS files
B) batch files
C) AUTOEXEC.BAT files
D) compressed files
Question
Which of the following is NOT an advantage of the creation of images on forensic machines?

A) revealing any passwords used in operating systems
B) preserving the integrity of the original image
C) preventing data contamination
D) establishing the veracity of subsequent analysis
Question
According to the Association of Chief Police Officers, which of the following is NOT a part of computer forensics?

A) collection of computer-related evidence
B) publication of computer-related evidence
C) preservation of computer-related evidence
D) analysis of computer-related evidence
Question
In which of the following techniques do the investigators try to develop a profile of the suspect or the suspect computer and manually attempt password cracking?

A) program specific cracking
B) social engineering
C) short-circuiting the chip
D) verification of image
Question
Which of the following programs can be employed by an investigating officer to counter alteration of file extensions?

A) Simple 6.0
B) BIOSTAR
C) DiskEdit
D) Mareswares HexDump
Question
________, located either by the BIOS or elsewhere on the motherboard, are utilized to bypass protections found in the CMOS.

A) Artifacts
B) Key disks
C) Steganographic containers
D) Jumpers
Question
Disk editors list all files on the suspect drive after the recovery of erased, deleted, hidden, and compressed files.
Question
Licenses for forensic software that is expected to be employed in the analysis of suspect media are not required.
Question
The Net Section of an IP address may be used to identify the individual computer.
Question
Short-circuiting the chip often involves short-circuiting two pins of the BIOS chip for a few seconds.
Question
Investigators validate forensic software to be used by testing the software at the extremes and being familiarized with its capabilities.
Question
Unlike other types of passwords which may be defeated using traditional password cracking software, CMOS passwords often require hardware manipulation on the part of the investigator.
Question
According to popular science Web sites, the process of digital forensics normally starts with a hypothesis that forms into a question.
Question
In a suspect Linux/Unix machine, the /etc/passwd file contains all the following EXCEPT ________.

A) account ID
B) home directory
C) local domain name system entries
D) login shell
Question
Batch files provide a platform of consistency that validates their procedures to the court.
Question
The MAC address is a binary number made up of four octets or 32 bits.
Question
Traceroute is a tool designed to trace the path a packet takes upon traveling from one device to another.
Question
Program files are software applications that are installed in the computer.
Question
Jumping the CMOS involves the manipulation of software in which the password is cleared after the jumper has been reset.
Question
In the context of computer forensics, which of the following is NOT required as minimum documentation?

A) physical description of media
B) time, date, and place of analysis
C) methodology employed
D) a list of standardized defaults for password location
Question
Whois is a tool which can query a database that includes domain names, IP addresses, and points of contact.
Question
Which of the following is the unique identifier assigned to network interfaces for communications on the physical network segment?

A) DNS
B) MAC Address
C) Traceroute
D) IP address
Question
Which of the following is a tool that can query a database that includes domain names, IP addresses, and points of contact, including names, postal addresses, and telephone numbers?

A) whois
B) ARIN
C) Back Orifice
D) RIPE
Question
UFED is a stand-alone self-contained system that provides data extraction of content stored in mobile phones.
Question
Which of the following is NOT a cell phone forensics software?

A) Device Seizure
B) UFED
C) XRY Complete
D) Grep
Question
Linux systems are different in that they are characterized by a unified file system on three partitions: root, boot, and swap.
Question
In its most basic form, ________ refers to the process of converting a message from its original form ("plaintext") into an indecipherable or scrambled form ("ciphertext").
Question
Which are the most common places in a suspect computer where traces of evidence from Internet activity can be found?
Question
Investigators should validate any forensic software to be used by testing it at the ________ and familiarizing themselves with its capabilities.
Question
The ________ for a computer is the unique identifier assigned to network interfaces for communications on the physical network segment.
Question
Steganographic messages have two parts: the container, which is the file that conceals data, and the ________, which is the actual data.
Question
On Windows systems, ________ are system-generated files created for operational purposes.
Question
Briefly discuss some basic strategies for circumventing CMOS passwords.
Question
Some computers allow a BIOS bypass by inserting a ________ in the floppy disk drive while booting.
Question
________ is a software application designed for Windows-based systems which provides extraction and analysis tools for a multitude of devices, including smartphones and tablets.
Question
When investigators pull the CMOS battery to circumvent a password, the battery should be disconnected for at least ________ hours.
Question
The most time-consuming and exasperating method of circumventing CMOS passwords involves the use of ________.
Question
________ the CMOS involves the manipulation of hardware in which the password is cleared after the jumper has been reset.
Question
All media used in the analysis of computer evidence must be forensically ________ for courtroom purposes.
Question
________ contains the precise location of the satellite and the locations of all other satellites in the system.
Question
The most important aspect of data analysis is ________.
Question
________ may be created to incorporate all of the forensic software employed, including write-blocking, imaging and verification, disk management, and virus scan.
Question
In a rare case where investigators cannot remove a suspect drive, they may be confounded by the presence of a ________.
Question
Discuss forensic investigation in non-Window operating systems.
Question
What are the areas that should be documented in a forensic investigation? What, in your opinion, makes documentation the most important aspect of forensic science?
Question
Discuss some of the ways to recover passwords.Why do you think they are important to forensic investigation?
Question
Match between columns
Conversions Plus
commercial viewer capable of reading MAC formats
Conversions Plus
provides for thumbnails and batch editing, and may be run on Windows systems
Conversions Plus
allows users to access, view, and print any document irtespective of creative platform
Quick View Plus
commercial viewer capable of reading MAC formats
Quick View Plus
provides for thumbnails and batch editing, and may be run on Windows systems
Quick View Plus
allows users to access, view, and print any document irtespective of creative platform
Thumbs Plus
commercial viewer capable of reading MAC formats
Thumbs Plus
provides for thumbnails and batch editing, and may be run on Windows systems
Thumbs Plus
allows users to access, view, and print any document irtespective of creative platform
Question
Match between columns
System registry
computer memory files written to the hard drive
System registry
database employed with the operating system which stores configuration information
System registry
files which record and document any significant occurrence in a system or program
Log files
computer memory files written to the hard drive
Log files
database employed with the operating system which stores configuration information
Log files
files which record and document any significant occurrence in a system or program
Swap tiles
computer memory files written to the hard drive
Swap tiles
database employed with the operating system which stores configuration information
Swap tiles
files which record and document any significant occurrence in a system or program
Question
Match between columns
MAC Address
protocol within the TCP/IP suite which translates a fully qualified domain name that identifies a computer or server on the network into an IP address
MAC Address
unique identifier assigned to network interfaces for communications on the physical network segment
MAC Address
tool designed to trace the path a packet takes up on traveling from one device to another
MAC Address
unique address assigned to every computer connected to the network
Traceroute
protocol within the TCP/IP suite which translates a fully qualified domain name that identifies a computer or server on the network into an IP address
Traceroute
unique identifier assigned to network interfaces for communications on the physical network segment
Traceroute
tool designed to trace the path a packet takes up on traveling from one device to another
Traceroute
unique address assigned to every computer connected to the network
Domain Name System
protocol within the TCP/IP suite which translates a fully qualified domain name that identifies a computer or server on the network into an IP address
Domain Name System
unique identifier assigned to network interfaces for communications on the physical network segment
Domain Name System
tool designed to trace the path a packet takes up on traveling from one device to another
Domain Name System
unique address assigned to every computer connected to the network
Internet Protocol (IP) Addresses
protocol within the TCP/IP suite which translates a fully qualified domain name that identifies a computer or server on the network into an IP address
Internet Protocol (IP) Addresses
unique identifier assigned to network interfaces for communications on the physical network segment
Internet Protocol (IP) Addresses
tool designed to trace the path a packet takes up on traveling from one device to another
Internet Protocol (IP) Addresses
unique address assigned to every computer connected to the network
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/63
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Processing of Evidence and Report Preparation
1
How long should the CMOS battery be kept disconnected for the memory to be lost?

A) 24 hours
B) 12 hours
C) 6 hours
D) 30 minutes
A
2
Which of the following makes digital forensics a science?

A) Its processes are repeatable and proven.
B) It analyzes various computer programs in order to arrive at assumptions.
C) It follows a universal, standard procedure.
D) It is a universally accepted discipline in universities.
A
3
Which of the following defines artifacts?

A) temporary data files that were created by applications
B) data files that pertain to or were created by an individual user
C) system-generated files that are created for operational purposes
D) files that pertain to Internet history and e-mail
C
4
Why should the imaging of drives always be initiated by booting the suspect drive from a previously verified forensic floppy?

A) New floppy drives bear the danger of being virus carriers.
B) A previously verified forensic floppy can detect anomalies in the drive faster.
C) Some users will configure their system to erase/modify data if third-party access is determined.
D) The verified forensic floppy can disable the write-blocking program found on most original media.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following can NOT be categorized as file viewer software?

A) Conversions Plus
B) CompuPic
C) DiskEdit
D) Thumbs Plus
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
6
________ are designed to be the first line of defense for users, thus preventing individuals from booting the computer's operating system.

A) Software passwords
B) BIOS passwords
C) CMOS passwords
D) Document passwords
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
7
What is the minimum number of imaging programs that any forensic labs should be equipped with?

A) two
B) three
C) four
D) one
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
8
Which rule remains unchanged in every computer investigation?

A) encrypt all notes
B) search every single file
C) pull the battery
D) document
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
9
Testing forensic software at the extremes and becoming familiar with its capabilities is ________.

A) unnecessary if manufacturers provide documentation
B) a way to validate the forensic software
C) not recommended due to the danger of acquiring viruses
D) more common among computer criminals than investigators
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
10
According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.

A) experiment
B) question
C) probable answer
D) possible solution
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
11
________ is a mechanism that prevents the destruction, contamination, or corruption of original media and that can be accomplished with many of the popular imaging programs, disk management software, or simple DOS commands.

A) Jumping
B) AUTOEXEC.BAT
C) CONFIG.SYS
D) Write-blocking
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is the most time-consuming method of circumventing CMOS passwords?

A) key disks
B) default passwords
C) social engineering
D) jumping
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following refers to a category of software that allows users to effectively hide the content of selected files?

A) steganography
B) key discs
C) VFS
D) artifacts
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
14
What does "establish forensically sterile conditions" mean in the context of computer-crime investigation?

A) Maintain secrecy about the developments at the forensic lab.
B) Ensure that the members of the staff have no criminal history.
C) Keep the room for forensic tests clean and hygienic.
D) Use new media that have been forensically wiped.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
15
What would enable investigators to establish a step-by-step preliminary investigative process which runs programs in a specified order?

A) CONFIG.SYS files
B) batch files
C) AUTOEXEC.BAT files
D) compressed files
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT an advantage of the creation of images on forensic machines?

A) revealing any passwords used in operating systems
B) preserving the integrity of the original image
C) preventing data contamination
D) establishing the veracity of subsequent analysis
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
17
According to the Association of Chief Police Officers, which of the following is NOT a part of computer forensics?

A) collection of computer-related evidence
B) publication of computer-related evidence
C) preservation of computer-related evidence
D) analysis of computer-related evidence
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
18
In which of the following techniques do the investigators try to develop a profile of the suspect or the suspect computer and manually attempt password cracking?

A) program specific cracking
B) social engineering
C) short-circuiting the chip
D) verification of image
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following programs can be employed by an investigating officer to counter alteration of file extensions?

A) Simple 6.0
B) BIOSTAR
C) DiskEdit
D) Mareswares HexDump
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
20
________, located either by the BIOS or elsewhere on the motherboard, are utilized to bypass protections found in the CMOS.

A) Artifacts
B) Key disks
C) Steganographic containers
D) Jumpers
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
21
Disk editors list all files on the suspect drive after the recovery of erased, deleted, hidden, and compressed files.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
22
Licenses for forensic software that is expected to be employed in the analysis of suspect media are not required.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
23
The Net Section of an IP address may be used to identify the individual computer.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
24
Short-circuiting the chip often involves short-circuiting two pins of the BIOS chip for a few seconds.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
25
Investigators validate forensic software to be used by testing the software at the extremes and being familiarized with its capabilities.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
26
Unlike other types of passwords which may be defeated using traditional password cracking software, CMOS passwords often require hardware manipulation on the part of the investigator.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
27
According to popular science Web sites, the process of digital forensics normally starts with a hypothesis that forms into a question.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
28
In a suspect Linux/Unix machine, the /etc/passwd file contains all the following EXCEPT ________.

A) account ID
B) home directory
C) local domain name system entries
D) login shell
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
29
Batch files provide a platform of consistency that validates their procedures to the court.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
30
The MAC address is a binary number made up of four octets or 32 bits.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
31
Traceroute is a tool designed to trace the path a packet takes upon traveling from one device to another.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
32
Program files are software applications that are installed in the computer.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
33
Jumping the CMOS involves the manipulation of software in which the password is cleared after the jumper has been reset.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
34
In the context of computer forensics, which of the following is NOT required as minimum documentation?

A) physical description of media
B) time, date, and place of analysis
C) methodology employed
D) a list of standardized defaults for password location
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
35
Whois is a tool which can query a database that includes domain names, IP addresses, and points of contact.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is the unique identifier assigned to network interfaces for communications on the physical network segment?

A) DNS
B) MAC Address
C) Traceroute
D) IP address
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is a tool that can query a database that includes domain names, IP addresses, and points of contact, including names, postal addresses, and telephone numbers?

A) whois
B) ARIN
C) Back Orifice
D) RIPE
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
38
UFED is a stand-alone self-contained system that provides data extraction of content stored in mobile phones.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is NOT a cell phone forensics software?

A) Device Seizure
B) UFED
C) XRY Complete
D) Grep
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
40
Linux systems are different in that they are characterized by a unified file system on three partitions: root, boot, and swap.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
41
In its most basic form, ________ refers to the process of converting a message from its original form ("plaintext") into an indecipherable or scrambled form ("ciphertext").
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
42
Which are the most common places in a suspect computer where traces of evidence from Internet activity can be found?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
43
Investigators should validate any forensic software to be used by testing it at the ________ and familiarizing themselves with its capabilities.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
44
The ________ for a computer is the unique identifier assigned to network interfaces for communications on the physical network segment.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
45
Steganographic messages have two parts: the container, which is the file that conceals data, and the ________, which is the actual data.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
46
On Windows systems, ________ are system-generated files created for operational purposes.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
47
Briefly discuss some basic strategies for circumventing CMOS passwords.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
48
Some computers allow a BIOS bypass by inserting a ________ in the floppy disk drive while booting.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
49
________ is a software application designed for Windows-based systems which provides extraction and analysis tools for a multitude of devices, including smartphones and tablets.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
50
When investigators pull the CMOS battery to circumvent a password, the battery should be disconnected for at least ________ hours.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
51
The most time-consuming and exasperating method of circumventing CMOS passwords involves the use of ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
52
________ the CMOS involves the manipulation of hardware in which the password is cleared after the jumper has been reset.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
53
All media used in the analysis of computer evidence must be forensically ________ for courtroom purposes.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
54
________ contains the precise location of the satellite and the locations of all other satellites in the system.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
55
The most important aspect of data analysis is ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
56
________ may be created to incorporate all of the forensic software employed, including write-blocking, imaging and verification, disk management, and virus scan.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
57
In a rare case where investigators cannot remove a suspect drive, they may be confounded by the presence of a ________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
58
Discuss forensic investigation in non-Window operating systems.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
59
What are the areas that should be documented in a forensic investigation? What, in your opinion, makes documentation the most important aspect of forensic science?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
60
Discuss some of the ways to recover passwords.Why do you think they are important to forensic investigation?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Conversions Plus
commercial viewer capable of reading MAC formats
Conversions Plus
provides for thumbnails and batch editing, and may be run on Windows systems
Conversions Plus
allows users to access, view, and print any document irtespective of creative platform
Quick View Plus
commercial viewer capable of reading MAC formats
Quick View Plus
provides for thumbnails and batch editing, and may be run on Windows systems
Quick View Plus
allows users to access, view, and print any document irtespective of creative platform
Thumbs Plus
commercial viewer capable of reading MAC formats
Thumbs Plus
provides for thumbnails and batch editing, and may be run on Windows systems
Thumbs Plus
allows users to access, view, and print any document irtespective of creative platform
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
System registry
computer memory files written to the hard drive
System registry
database employed with the operating system which stores configuration information
System registry
files which record and document any significant occurrence in a system or program
Log files
computer memory files written to the hard drive
Log files
database employed with the operating system which stores configuration information
Log files
files which record and document any significant occurrence in a system or program
Swap tiles
computer memory files written to the hard drive
Swap tiles
database employed with the operating system which stores configuration information
Swap tiles
files which record and document any significant occurrence in a system or program
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
63
Match between columns
MAC Address
protocol within the TCP/IP suite which translates a fully qualified domain name that identifies a computer or server on the network into an IP address
MAC Address
unique identifier assigned to network interfaces for communications on the physical network segment
MAC Address
tool designed to trace the path a packet takes up on traveling from one device to another
MAC Address
unique address assigned to every computer connected to the network
Traceroute
protocol within the TCP/IP suite which translates a fully qualified domain name that identifies a computer or server on the network into an IP address
Traceroute
unique identifier assigned to network interfaces for communications on the physical network segment
Traceroute
tool designed to trace the path a packet takes up on traveling from one device to another
Traceroute
unique address assigned to every computer connected to the network
Domain Name System
protocol within the TCP/IP suite which translates a fully qualified domain name that identifies a computer or server on the network into an IP address
Domain Name System
unique identifier assigned to network interfaces for communications on the physical network segment
Domain Name System
tool designed to trace the path a packet takes up on traveling from one device to another
Domain Name System
unique address assigned to every computer connected to the network
Internet Protocol (IP) Addresses
protocol within the TCP/IP suite which translates a fully qualified domain name that identifies a computer or server on the network into an IP address
Internet Protocol (IP) Addresses
unique identifier assigned to network interfaces for communications on the physical network segment
Internet Protocol (IP) Addresses
tool designed to trace the path a packet takes up on traveling from one device to another
Internet Protocol (IP) Addresses
unique address assigned to every computer connected to the network
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 63 flashcards in this deck.