Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Another example of anti-forensics is using a tool like MACE which randomly changes all the timestamps of the files and folders on your hard drive

Another example of anti-forensics is using a tool like MACE which randomly changes all the timestamps of the files and folders on your hard drive - thus making it nearly impossible for the investigator to perform an time line analysis.

True

False

QUESTION 2

In electronic discovery, if you have to preserve something then you should:

a Preserve EVERYTHING! BE SAFE!

b Perserve the BARE MININUM!

c Preserve unique, relevant evidence that might be useful to an adversary including what it knows, or reasonably should know, is relevant in the action, is reasonably calculated to lead to the discovery of admissible evidence, is reasonably likely to be requested during discovery and/or is the subject of a pending discovery request.

QUESTION 23

What would you describe a strategy that ensures end users do not send sensitive or critical information outside the corporate network? The term is also used to describe software products that help a network administrator control what data end users can transfer.

a Data loss protection (DLP)

b Incident Response

QUESTION 4

What is this principle?

If you are dealing with computer that are turned off or powered down then probably not so much of a concern.

But with computers that are running (live) then you want to be concerned about what information might be lost in the computers memory if its shutdown. Another example, might be active connections to a suspect machine like network share drives. That could be lost if the computer is powered down.

a Chain of custody

b Fragility

c Chain of evidence

d Authenication

4 points

QUESTION 5

What is this principle?

This refers to the ability to certify that the evidence is what it claimed to be, was gathered in a reliable manner, and how chain of custody was handled.

a Authentication

b Chain of custody

c Fragility

d Covering your rear end

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Pro Database Migration To Azure Data Modernization For The Enterprise

Authors: Kevin Kline, Denis McDowell, Dustin Dorsey, Matt Gordon

1st Edition

1484282299, 978-1484282298

More Books

Students also viewed these Databases questions

Question

3. The group or the instructor appoints a leader for each group.

Answered: 1 week ago

Question

=+What is the most that you should pay to complete development?

Answered: 1 week ago