This preview shows page 1 out of 1 page.
Pre-Course Assessment QuizWeek 1 QuizQuestion 1Computer-generatedrecords are data the system maintains, such as system log files and proxy serverlogs.Question 2Lossycompression compresses data by permanently discarding bits of information in the file.Question 3You useGraphics editorsto create, modify, and save bitmap, vector, and metafile graphics.Question 4Software forensics tools are commonly used to copy data from a suspect's disk drive to a(n)Image file.Question 5Themancommand displays pages from the online help manual for information on Linux commands andtheir options.
End of preview. Want to read the entire page?
Upload your study docs or become a
Course Hero member to access this document
Tags
Macintosh, Hard disk drive
What reports are generated at the local, state, and federallevels to show the types and frequency of crimes committed?
Get answer to your question and much more
Uniform crime reportsThe most common computer-related crime is check fraud.
Get answer to your question and much more
Get answer to your question and much more
What will allow the investigator to arrive at a scene, acquirethe needed data, and return to the lab as quickly as possible?
Get answer to your question and much more
What type of records are considered data that the systemmaintains, such as system log files and proxy server logs?
Get answer to your question and much more
A judge can exclude evidence obtained from a poorly wordedwarrant.TrueFalse
What term refers to the individual who has the power to conductdigital forensic investigations?
Get answer to your question and much more
Security chiefWhat does Autopsy use to validate an image?
Get answer to your question and much more
What is the third stage of a criminal case, after the complaintand the investigation?
Get answer to your question and much more
ResolutionWhat standard is used to determine whether a police officer hasthe right to make an arrest, conduct a personal or propertysearch, or obtain a warrant for arrest?Reasonable causeReasonable suspicionProbable causeBurden of Proof
What type of plan specifies how to rebuild a forensic workstationafter it has been severely contaminated by a virus from a driveyou're analyzing?
Get answer to your question and much more
Configuration managementDisaster recoveryWhat command works similarly to the dd command but has manyfeatures designed for computer forensics acquisitions?
Get answer to your question and much more
dcflddWhen federal courts are evaluating digital evidence fromcomputer-generated records, what exception is applied to hearsay?
Get answer to your question and much more
Chapter 5, Section 3, of the NISPOM describes the characteristicsof a safe storage container.TrueFalse
In addition to md5sum, which hashing algorithm utility isincluded with current distributions of Linux?
Get answer to your question and much more
sha1sumsha386summd1deepWhat must be done, under oath, to verify that the information inthe affidavit is true?
Get answer to your question and much more
Where should your computer backups be kept?
Get answer to your question and much more
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 14 pages?
Upload your study docs or become a
Course Hero member to access this document