cuestion Completion Status: QUESTION 1 What legal authority can law enforcement use? (Choose all that apply) a. Subpoena b. Plain View c. Search Warrant d. Consent QUESTION 2 What information can you obtain from an ISP if using a subpoena? Screen names, real names, home addresses, billing addresses, session times and durations, Media Access Control (MAC) addresses and content of one email related to subscriber. b. Screen names, real names, home addresses, billing addresses, session times and durations and Media Access Control (MAC) addresses Screen names, real names, home addresses, billing addresses, session times and durations, Media Access Control (MAC) addresses and content of all emails. Screen names, real names, home addresses, billing addresses, session times and durations. Media Access Control (MAC) addresses and d.content of some emails. O QUESTION 3 Plain view is the legal authority to search an item that wasn't written in the warrant. True False QUESTION 4 Which guideline (rule) for evidence handling is correct? a. Chain of custody forms doesn't have to be applied to all evidence. b. All actions in processing the evidence should never be documented. C. The process of collecting digital evidence should not alter or raise questions about its integrity. d. Analysis should be done on the original evidence. QUESTION 5 Which is a procedure (action) for evidence handling? a. Document and secure only the specific location of the evidence found b. Package and transport only important evidence securely Make sure Legal authority exists to seize evidence. d. Recognize, identify, seize, and secure some of the evidence at the scene, I JULUS. What is a hash? a. Is used to ensure programs load correctly. b. A variable key-size stream cipher with byte-oriented operations. The algorithm is based on the use of a random permutation. C. A one-way function that compiles streams of data into a message digest of 128, 160 or 256 bits depending on hash function. d. Checks the correctness of a program. QUESTION 7 What are hashes are used for? a. File verification b. To reverse engineer changes from one file to another. c. Cryptographic Hashes (Fingerprinting) d. Patches and updates QUESTIONS Regardless of the size of the source, an MD5 hash value will always be 128 bits True False QUESTION 9 Which of the following can be used as hash sets? O a. Operating System Files. O b. Hacking utilities c. Viruses/Malware O d. Filter specific data sets to include or exclude. QUESTION 10 If you wanted to check for the owner of a website.which utility would you use? a. Whois b.DHCP c. WhoThis d. Finger