Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Forensics Study Set 1
Quiz 9: Computer Forensics Analysis and Validation
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Select the tool below that does not use dictionary attacks or brute force attacks to crack passwords:
Question 2
True/False
The advantage of recording hash values is that you can determine whether data has changed.
Question 3
True/False
One of the most critical aspects of digital forensics is validating digital evidence because ensuring the integrity of data you collect is essential for presenting evidence in court.
Question 4
Multiple Choice
Which password recovery method uses every possible letter, number, and character found on a keyboard?
Question 5
Multiple Choice
In order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely.
Question 6
True/False
Advanced hexadecimal editors offer many features not available in digital forensics tools, such as hashing specific files or sectors.
Question 7
True/False
In private sector cases, like criminal and civil cases, the scope is always defined by a search warrant.
Question 8
Multiple Choice
Which option below is not a disk management tool?
Question 9
Multiple Choice
Typically, anti-virus tools run hashes on potential malware files, but some advanced malware uses ________________ as a way to hide its malicious code from antivirus tools.
Question 10
Multiple Choice
In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.
Question 11
Multiple Choice
The _______________________ maintains a national database of updated file hash values for a variety of OSs, applications, and images, but does not list hash values of known illegal files.
Question 12
Multiple Choice
Within Windows Vista and later, partition gaps are _____________ bytes in length.
Question 13
Multiple Choice
A ____________ image file containing software is intended to be bit-stream copied to floppy disks or other external media.
Question 14
Multiple Choice
What letter should be typed into DiskEdit in order to mark a good sector as bad?
Question 15
Multiple Choice
A user with programming experience may use an assembler program (also called a __________ ) on a file to scramble bits, in order to secure the information contained inside.
Question 16
Multiple Choice
When performing a static acquisition, what should be done after the hardware on a suspect's computer has been inventoried and documented?
Question 17
Multiple Choice
Many commercial encryption programs use a technology called _____________, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.