Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In regards to Digital Forensics, what is hashing? ( CLO 1 , MLO 1 C ) Question 1 options: a ) An algorithm that creates

In regards to Digital Forensics, what is hashing?
(CLO 1, MLO 1C)
Question 1 options:
a)
An algorithm that creates all possible outcomes of a password.
b)
The process of copying every bit (0 or 1) of the media
c)
The process of breaking obfuscation techniques.
d)
An algorithm that produces the 'digital fingerprint' of some media.
Question 2(Mandatory)(1 point)
Saved
Listen
In civil litigation, the legal process of both parties examining evidence is shown as
(CLO 1, MLO 1D)
Question 2 options:
a)
Analysis
b)
Inquiry
c)
Discovery
d)
Inspection
Question 3(Mandatory)(1 point)
Saved
Listen
What is one challenge a forensic examiner faces when creating tool-written reports with findings to a judge or jury:
(CLO1; MLO 1C, MLO 1D)
Question 3 options:
a)
They contain little detail.
b)
They have spelling and grammar errors.
c)
They are very technical.
d)
They are of improper format.
Question 4(Mandatory)(1 point)
Saved
Listen
Virtual Labs have which of the following concerns?
(CLO 4, MLO 3B)
Question 4 options:
a)
They have fewer access to resources.
b)
They are funded by federal agencies.
c)
They have communication and reliability issues.
d)
They are uneconomical.
Question 5(Mandatory)(1 point)
Saved
Listen
What is a significant advantage electronic controls have over their physical counterparts?
(CLO 4, MLO 3A)
Question 5 options:
a)
They provide resistance to physical destruction.
b)
They provide stronger access control mechanisms.
c)
They provide quicker access to evidence.
d)
They provide superior logging methods.
Question 6(Mandatory)(1 point)
Saved
Listen
_______ is NOT a way to protect digital devices from intentional damage.
(CLO 5, MLO 4A)
Question 6 options:
a)
Wrapping the device in an anti-static bag
b)
Disconnecting the device from networks
c)
Searching through the content of the device as soon as possible.
d)
Cloning the device's content.
Question 7(Mandatory)(1 point)
Saved
Listen
The purpose of a Faraday cage in forensics is to
(CLO 5, MLO 4A, C)
Question 7 options:
a)
Protect the device from external signals
b)
Protect the device from accidental writes
c)
Protect the device from power surges
d)
Protect the device from physical damage
Question 8(Mandatory)(1 point)
Saved
Listen
The change in location and possession a piece of evidence goes through is called
(CLO 5, MLO 5A)
Question 8 options:
a)
Evidence Attainment
b)
Chain of Custody
c)
Data Aquisition
d)
Detailed Accounting
Question 9(Mandatory)(1 point)
Saved
Listen
Simply put, what is the Windows registry?
(CLO6, MLO5A)
Question 9 options:
a)
A process which tracks the user's Internet history
b)
An area of memory which the CPU interacts with directly
c)
A database for Windows configuration files
d)
A hierarchal structure of Windows artifact files
Question 10(Mandatory)(1 point)
Saved
Listen
Why is recycling bin one of the first places forensic examiner checks for evidence?
(CLO6, MLO5C)
Question 10 options:
a)
It contains metadata about files in slack space
b)
It is the final resting place for all deleted files
c)
Some users believe files are deleted when placed there
d)
Deleted and overwritten files are always sent through it
Question 11(Mandatory)(1 point)
Saved
Listen
A file that shows if an application was run or installed on a system is called
(CLO6, MLO5F)
Question 11 options:
a)
The prefetch file
b)
The shadow copy file
c)
The installer file
d)
The thumbnail file
Question 12(Mandatory)(1 point)
Saved
Listen
What is the process of obfuscating information in order to be recovered and used again?
(CLO7, MLO6A)
Question 12 options:
a)
Cipherization
b)
Encryption
c)
Data Fortification
d)
Anonymization

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

IBM Db2 11 1 Certification Guide Explore Techniques To Master Database Programming And Administration Tasks In IBM Db2

Authors: Mohankumar Saraswatipura ,Robert Collins

1st Edition

1788626915, 978-1788626910

More Books

Students also viewed these Databases questions

Question

Why are notes to statements necessary?

Answered: 1 week ago

Question

Tell the merits and demerits of Mendeleev's periodic table.

Answered: 1 week ago