Computing components are designed to last 18 to ____ months in normal business operations.

Show

Start Long-Term Learning

Get personalized study reminders at intervals optimized for better retention.

Track your progress on this set by creating a folder

Or add to an existing folder

Add this set to a folder

Linus live CDs and WinFe disks do not automatically mount hard drives, but can b used to view file systems. t/f

true

The shielding of sensitive computing systems and prevention of electronic eavesdropping of any computer emissions is known as FAUST by the U.S. department of defense. t/f

false

The recording of all updates made to a workstation or machine is referred to as configuration management. t/f

true

A disaster recovery plan ensures that workstations and file servers can be restored to their original condition in the event of a catastrophe. t/f

true

Because they are outdated, ribbon cables should not be considered for use within a forensics lab. t/f

false

Candidates who complete the ISCIS test successfully are designated as a ??? a. certified forensic computer examiner (CFCE) b. certified forensics investigator (CFI) c. Certified investigative forensics examiner (CIFE) d. certified investigative examiner (CIE)

a

c

How long are computing components designed to last in a normal business environment? a. 12 to 16 months b. 14 to 26 months c. 18 to 36 months d. 6 to 90 months

c

Which of the following scenarios should be covered in a disaster recovery plan? a. damage caused by lightning strikes b. damage caused by flood c. damage caused by a virus contamination d. all of the above

d

Which operating system listed below is not a distribution of the Linux OS? a. minix b. debian c. slackwar d. fedora

a

??? describes the characteristics of a safe storage container. a. ISO2960 b. NISPOM c. SSO 990 d. STORSEC

b

In order to qualify for the certified computer forensic technician, basic level certification, how many hours of computer forensics training are required? a. 10 b. 20 c. 30 d. 40

d

Which file system below is utilized by the xbox gaming system? a. NTFS b. ReFS c. EXT d. FATX

d

Which IDO standard below is followed by the ASCLD? a. 17025:2005 b. 17026:2007 c. 12075:2007 d. 12076:2005

a

??? is responsible for creating an monitoring lab policies for staff, and provides a safe, and provides a safe and secure workplace for staff and evidence. a. the lab manager b. the lab investigator c. the lab secretary d. the lab steward

a

What percentage of consumers utilize intel and AMD PCs? a. 60 b. 70 c. 80 d. 90

d

??? can be used to restore backup files directly to a workstation. a. belarc advisor b. Norton ghost c. prodiscover d. photorec

b

How often should hardware be replace within a forensics lab? a. every 6 to 12 months b. every 12 to 18 months c. every 18 to 24 months d. every 24 to 30 months

b

A TEMPEST facility is designed to accomplish which of the following goals? a. prevent data loss by maintaining consistent backups b. shield sensitive computing systems and prevent electronic eavesdropping of computer emission c. ensure network security from the internet using comprehensive security software d. protect the integrity of data

b

In order to qualify for the advanced certified computer forensic technician certification, a candidate must have ??? years of hands-on experience in computer forensics investigations. a. two b. three c. five d. six

c

In order to qualify for the certified computer crime investigator, basic level certification, candidates must provide documentation of at least ??? cases in which they participated. a. 5 b. 10 c. 15 d. 20

b

d

Which option below is not a recommendation for securing storage containers? a. the container should be located in a restricted area b. only authorized access should be allowed, and it should be kept to a minimum c, evidence containers should remain locked when they aren't under direct supervision d. rooms with evidence containers should have a secured wireless network

d

c

??? is a specialized viewer software program a. fastview b. irfanview c. thumbsloader d. absee

b

Please allow access to your computer’s microphone to use Voice Recording.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrometo use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

At what distance can the EMR from a computer monitor?

First of all, computer monitors do emit a relatively small amount of EMF radiation at reasonable distances. So the absolute best thing you can do is keep at least a reasonable distance (3 feet or more) between you and the monitor whenever possible.

Which agency introduced training on software for forensics investigations by the early 1990s?

By the early 1990s, specialized tools for computer forensics were available. The International Association of Computer Investigative Specialists (IACIS) introduced training on software for forensics investigations, and the IRS created search-warrant programs.

Where should your computer backups be kept?

You should store backup copies of your files somewhere separate from your computer — on an external hard disk, for example. That way, if the computer breaks, or is lost or is stolen, the backup will still be intact. For maximum security, you shouldn't keep the backup in the same building as your computer.

What percentage of consumers utilize Intel and AMD PCS?

Intel's market share dropped to 69%, while AMD's rose to 31% of consumer systems.