What type of records are data the system maintains such as system log files and proxy server logs?

  • School Ashford University
  • Course Title CYB 402
  • Pages 1

This preview shows page 1 out of 1 page.

Pre-Course Assessment QuizWeek 1 QuizQuestion 1Computer-generatedrecords are data the system maintains, such as system log files and proxy serverlogs.Question 2Lossycompression compresses data by permanently discarding bits of information in the file.Question 3You useGraphics editorsto create, modify, and save bitmap, vector, and metafile graphics.Question 4Software forensics tools are commonly used to copy data from a suspect's disk drive to a(n)Image file.Question 5Themancommand displays pages from the online help manual for information on Linux commands andtheir options.

End of preview. Want to read the entire page?

Upload your study docs or become a

Course Hero member to access this document

Tags

Macintosh, Hard disk drive

What reports are generated at the local, state, and federallevels to show the types and frequency of crimes committed?

Get answer to your question and much more

Uniform crime reportsThe most common computer-related crime is check fraud.

Get answer to your question and much more

Get answer to your question and much more

What will allow the investigator to arrive at a scene, acquirethe needed data, and return to the lab as quickly as possible?

Get answer to your question and much more

What type of records are considered data that the systemmaintains, such as system log files and proxy server logs?

Get answer to your question and much more

A judge can exclude evidence obtained from a poorly wordedwarrant.TrueFalse

What term refers to the individual who has the power to conductdigital forensic investigations?

Get answer to your question and much more

Security chiefWhat does Autopsy use to validate an image?

Get answer to your question and much more

What is the third stage of a criminal case, after the complaintand the investigation?

Get answer to your question and much more

ResolutionWhat standard is used to determine whether a police officer hasthe right to make an arrest, conduct a personal or propertysearch, or obtain a warrant for arrest?Reasonable causeReasonable suspicionProbable causeBurden of Proof

What type of plan specifies how to rebuild a forensic workstationafter it has been severely contaminated by a virus from a driveyou're analyzing?

Get answer to your question and much more

Configuration managementDisaster recoveryWhat command works similarly to the dd command but has manyfeatures designed for computer forensics acquisitions?

Get answer to your question and much more

dcflddWhen federal courts are evaluating digital evidence fromcomputer-generated records, what exception is applied to hearsay?

Get answer to your question and much more

Chapter 5, Section 3, of the NISPOM describes the characteristicsof a safe storage container.TrueFalse

In addition to md5sum, which hashing algorithm utility isincluded with current distributions of Linux?

Get answer to your question and much more

sha1sumsha386summd1deepWhat must be done, under oath, to verify that the information inthe affidavit is true?

Get answer to your question and much more

Where should your computer backups be kept?

Get answer to your question and much more

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 14 pages?

Upload your study docs or become a

Course Hero member to access this document

What structure is used for the file system for a SIM card?

The SIM card file system is organized in a hierarchal tree structure and resides in the EEPROM for storing data such as names and phone number entries, text messages, and network service settings.

Which command displays pages from the online help manual for information on Linux commands and their options?

man command in Linux is used to display the user manual of any command that we can run on the terminal.

What registry file contains Installed Programs settings?

HKLM (HKEY_LOCAL_MACHINE) Contains computer-specific information about the hardware installed, software settings, and other information.

When seizing computer evidence in criminal investigations follow the standards for seizing digital data?

Computer Forensics.