Show
This preview shows page 1 out of 1 page. Pre-Course Assessment QuizWeek 1 QuizQuestion 1Computer-generatedrecords are data the system maintains, such as system log files and proxy serverlogs.Question 2Lossycompression compresses data by permanently discarding bits of information in the file.Question 3You useGraphics editorsto create, modify, and save bitmap, vector, and metafile graphics.Question 4Software forensics tools are commonly used to copy data from a suspect's disk drive to a(n)Image file.Question 5Themancommand displays pages from the online help manual for information on Linux commands andtheir options. End of preview. Want to read the entire page? Upload your study docs or become a Course Hero member to access this document Tags Macintosh, Hard disk drive What reports are generated at the local, state, and federallevels to show the types and frequency of crimes committed? Get answer to your question and much more Uniform crime reportsThe most common computer-related crime is check fraud. Get answer to your question and much more Get answer to your question and much more What will allow the investigator to arrive at a scene, acquirethe needed data, and return to the lab as quickly as possible? Get answer to your question and much more What type of records are considered data that the systemmaintains, such as system log files and proxy server logs? Get answer to your question and much more A judge can exclude evidence obtained from a poorly wordedwarrant.TrueFalse What term refers to the individual who has the power to conductdigital forensic investigations? Get answer to your question and much more Security chiefWhat does Autopsy use to validate an image? Get answer to your question and much more What is the third stage of a criminal case, after the complaintand the investigation? Get answer to your question and much more ResolutionWhat standard is used to determine whether a police officer hasthe right to make an arrest, conduct a personal or propertysearch, or obtain a warrant for arrest?Reasonable causeReasonable suspicionProbable causeBurden of Proof What type of plan specifies how to rebuild a forensic workstationafter it has been severely contaminated by a virus from a driveyou're analyzing? Get answer to your question and much more Configuration managementDisaster recoveryWhat command works similarly to the dd command but has manyfeatures designed for computer forensics acquisitions? Get answer to your question and much more dcflddWhen federal courts are evaluating digital evidence fromcomputer-generated records, what exception is applied to hearsay? Get answer to your question and much more Chapter 5, Section 3, of the NISPOM describes the characteristicsof a safe storage container.TrueFalse In addition to md5sum, which hashing algorithm utility isincluded with current distributions of Linux? Get answer to your question and much more sha1sumsha386summd1deepWhat must be done, under oath, to verify that the information inthe affidavit is true? Get answer to your question and much more Where should your computer backups be kept? Get answer to your question and much more Upload your study docs or become a Course Hero member to access this document End of preview. Want to read all 14 pages? Upload your study docs or become a Course Hero member to access this document What structure is used for the file system for a SIM card?The SIM card file system is organized in a hierarchal tree structure and resides in the EEPROM for storing data such as names and phone number entries, text messages, and network service settings.
Which command displays pages from the online help manual for information on Linux commands and their options?man command in Linux is used to display the user manual of any command that we can run on the terminal.
What registry file contains Installed Programs settings?HKLM (HKEY_LOCAL_MACHINE)
Contains computer-specific information about the hardware installed, software settings, and other information.
When seizing computer evidence in criminal investigations follow the standards for seizing digital data?Computer Forensics. |