Filters
Question type

Study Flashcards

An IP address may lead to the identity of the person who was using a particular computer to access the Internet.

A) True
B) False

Correct Answer

verifed

verified

The two main types of evidentiary computer data are visible data and latent data.

A) True
B) False

Correct Answer

verifed

verified

The two types of slack space are ________ slack and ________ slack.


A) File; RAM
B) RAM; ROM
C) Cluster; file
D) IP; TTI

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A(n) ________ is placed on a hard disk drive by a website to track certain information about its visitors.


A) Phish
B) IP address
C) E-mail
D) Cookie

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

A domain manages traffic between computers on a network.

A) True
B) False

Correct Answer

verifed

verified

URL stands for:


A) Uniform Replacement Listing.
B) Unlimited Real-time Link.
C) Uniform Resource Locator.
D) User-Resource Link.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

When is it necessary to make a "fingerprint" of a HDD?


A) In most cases
B) Only sometimes
C) Before and after imaging its contents
D) Rarely

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A Network Interface Card (NIC) enables a personal computer to communicate with other computers via:


A) A wired connection.
B) A wireless connection.
C) A satellite connection.
D) Both A and B

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Clusters are groups of ________.

Correct Answer

verifed

verified

________ consists of programs that are used to start the computer's boot process.

Correct Answer

verifed

verified

One should not search for "visible" data in:


A) Swap files.
B) Temporary files.
C) Unallocated space.
D) Windows.

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Match the word in Column 1 to its definition in Column 2.Each answer can only be used once. A)A set of instructions compiled into a program that performs a particular task B)A group of sectors in multiples of two; typically the minimum space allocated to a file C)A standard method by which Internet sites are addressed D)All data that the operating system is presently aware of, and thus is readily accessible to the user E)Files placed on a computer from a visited website; they are used to track visits and usage of that site F)Hardware or software designed to protect against intrusions into a computer network G)Typically the main storage location within the computer, consisting of magnetic platters contained in a case H)The smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes I)The main chip within the computer; also referred to as the brain of the computer.This microprocessor chip handles most of the operations (code and instructions)of the computer. J)Portions of visited Web pages placed on the local hard disk drive to facilitate quicker retrieval once revisited K)The main system board of a computer (and many other electronic devices)that delivers power, data, and instructions to the computer's components L)Areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless 1)Central processing unit (CPU) 2)Cluster 3)Hard disk drive (HDD) 4)Latent data 5)Motherboard 6)Sector 7)Software 8)Visible data 9)Cookies 10)Firewall 11)Internet cache 12)Uniform resource locater (URL)

Correct Answer

verifed

verified

Answers: 1)I 2)B 3)G...

View Answer

One should not look for "latent" data in:


A) RAM slack.
B) File slack.
C) Unallocated space.
D) Temporary files.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

One gigabyte can be expressed as:


A) 1,000 bytes.
B) 1,000 megabytes (MB) .
C) 1,000 kilobytes (KB) .
D) 8,000 bits.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An investigator would like to take a forensic "image" of a suspect's HDD.What is the primary goal in obtaining data from a HDD? What tools can the investigator use to achieve this goal?

Correct Answer

verifed

verified

Answer (should include points such as):
...

View Answer

A(n)________ is a device that permits only requested traffic to enter a computer system.

Correct Answer

verifed

verified

Which of the following actions taken at the crime scene involving a computer are incorrect?


A) Upon arrival, sketching the overall layout as well as photographing it
B) Photographing any running monitors
C) Removing the plug from the back of the computer, not from the wall
D) None of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Extraction of data from a mobile device can be done on a physical level and a(n)________ level.

Correct Answer

verifed

verified

Which source will NOT be useful to investigators seeking to determine a user's Internet history?


A) Cookies
B) Cache
C) Favorite sites
D) Slack files

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Hard drive partitions are typically divided into:


A) Sectors.
B) Clusters.
C) Tracks.
D) All of the above

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 61 - 80 of 98

Related Exams

Show Answer