Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Only need Solutions! 1 6 Many vendors have developed write - blocking devices that connect to a computer through FireWire, ( ? ) 2 .
Only need Solutions!
Many vendors have developed writeblocking devices that connect to a computer through FireWire, and SATA, PATA, and SCSI controllers.
A IDE
B PCMCIA
C LCD
D USB
The standards document, demands accuracy for all aspects of the testing process, meaning that the results must be repeatable and reproducible.
A ISO
B ISO
C ISO
D ISO
An MD hash taken when a computer drive is acquired is used to check for changes, alterations, or errors.
A True
B False
One technique for extracting evidence from large systems is called
A RAID imaging
B large evidence file recovery
C RAID copy
D sparse acquisition
What kind of data changes rapidly and may be lost when the machine that holds it is powered down?
A Nonvolatile data
B A hash
C Persistent data
D Volatile data
Before imaging a drive, you must forensically wipe the target drive to ensure no residual data remains.
A True
B False
Computers used several OSs before Windows and MSDOS dominated the market.
A True
B False
Hardware manufacturers have designed most computer components to last about months between failures.
A True
B False
When an investigator finds a mix of information, judges often issue a limiting phrase to the warrant, which allows the police present all evidence together.
A True
B False
A judge can exclude evidence obtained from a poorly worded warrant.
A True
B False
Digital forensics tools are divided into major categories.
A
B
C
D
One way to compare results and verify your a new tool is by using a such as HexWorkshop, or WinHex.
A writeblocker
B disk editor
C bitstream copier
D disk imager
When recovering evidence from a contaminated crime scene, if the temperature in the contaminated room is higher than degrees, you should take measures to avoid damage to the drive from overheating.
A
B
C
D
The first tools that analyzed and extracted data from floppy disks and hard disks were MSDOS tools for PC file systems.
A Commodore
B IBM
C Apple
D Atari
Which of the following is NOT true of chain of custody forms?
A A chain of custody form typically requires a signature.
B A chain of custody form is a federal form and is therefore universal.
C You typically need to use a separate chain of custody form for each drive you have removed from a suspect computer.
D Some forensic examiners use both an evidence form and a separate chain of custody form.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started