Answered step by step
Verified Expert Solution
Question
1 Approved Answer
In regards to Digital Forensics, what is hashing? ( CLO 1 , MLO 1 C ) Question 1 options: a ) An algorithm that creates
In regards to Digital Forensics, what is hashing?
CLO MLO C
Question options:
a
An algorithm that creates all possible outcomes of a password.
b
The process of copying every bit or of the media
c
The process of breaking obfuscation techniques.
d
An algorithm that produces the 'digital fingerprint' of some media.
Question Mandatory point
Saved
Listen
In civil litigation, the legal process of both parties examining evidence is shown as
CLO MLO D
Question options:
a
Analysis
b
Inquiry
c
Discovery
d
Inspection
Question Mandatory point
Saved
Listen
What is one challenge a forensic examiner faces when creating toolwritten reports with findings to a judge or jury:
CLO; MLO C MLO D
Question options:
a
They contain little detail.
b
They have spelling and grammar errors.
c
They are very technical.
d
They are of improper format.
Question Mandatory point
Saved
Listen
Virtual Labs have which of the following concerns?
CLO MLO B
Question options:
a
They have fewer access to resources.
b
They are funded by federal agencies.
c
They have communication and reliability issues.
d
They are uneconomical.
Question Mandatory point
Saved
Listen
What is a significant advantage electronic controls have over their physical counterparts?
CLO MLO A
Question options:
a
They provide resistance to physical destruction.
b
They provide stronger access control mechanisms.
c
They provide quicker access to evidence.
d
They provide superior logging methods.
Question Mandatory point
Saved
Listen
is NOT a way to protect digital devices from intentional damage.
CLO MLO A
Question options:
a
Wrapping the device in an antistatic bag
b
Disconnecting the device from networks
c
Searching through the content of the device as soon as possible.
d
Cloning the device's content.
Question Mandatory point
Saved
Listen
The purpose of a Faraday cage in forensics is to
CLO MLO A C
Question options:
a
Protect the device from external signals
b
Protect the device from accidental writes
c
Protect the device from power surges
d
Protect the device from physical damage
Question Mandatory point
Saved
Listen
The change in location and possession a piece of evidence goes through is called
CLO MLO A
Question options:
a
Evidence Attainment
b
Chain of Custody
c
Data Aquisition
d
Detailed Accounting
Question Mandatory point
Saved
Listen
Simply put, what is the Windows registry?
CLO MLOA
Question options:
a
A process which tracks the user's Internet history
b
An area of memory which the CPU interacts with directly
c
A database for Windows configuration files
d
A hierarchal structure of Windows artifact files
Question Mandatory point
Saved
Listen
Why is recycling bin one of the first places forensic examiner checks for evidence?
CLO MLOC
Question options:
a
It contains metadata about files in slack space
b
It is the final resting place for all deleted files
c
Some users believe files are deleted when placed there
d
Deleted and overwritten files are always sent through it
Question Mandatory point
Saved
Listen
A file that shows if an application was run or installed on a system is called
CLO MLOF
Question options:
a
The prefetch file
b
The shadow copy file
c
The installer file
d
The thumbnail file
Question Mandatory point
Saved
Listen
What is the process of obfuscating information in order to be recovered and used again?
CLO MLOA
Question options:
a
Cipherization
b
Encryption
c
Data Fortification
d
Anonymization
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started