The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 1 Day Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
1.
Which of the following represents known files you can eliminate from an investigation? (Choose all that apply.)
2.
For which of the following reasons should you wipe a target drive?
3.
FTK's Known File Filter (KFF) can be used for which of the following purposes? (Choose all that apply.)
4.
For what legal and illegal purposes can you use steganography?
5.
Password recovery is included in all computer forensics tools. True or False?
6.
After you shift a file's bits, the hash value remains the same. True or False?
7.
Validating an image file once, the first time you open it, is enough. True or False?
8.
_____________ happens when an investigation goes beyond the bounds of its original description.
9.
Suppose you're investigating an e-mail harassment case. Generally, is collecting evidence for this type of case easier for an internal corporate investigation or a criminal investigation?
10.
You're using Disk Manager to view primary and extended partitions on a suspect's drive. The program reports the extended partition's total size as larger than the sum of the sizes of logical partitions in this extended partition. What might you infer from this information?
11.
Commercial encryption programs often rely on a technology known as _____________ to recover files if a password or passphrase is lost.
12.
Steganography is used for which of the following purposes?
13.
Which FTK search option is more likely to find text hidden in unallocated space: live search or indexed search?
14.
Which of the following statements about HDHOST is true? (Choose all that apply.)
15.
Which of the following tools is most helpful in accessing clusters marked as "bad" on a disk?
Â
Â
1.
Graphics files stored on a computer can't be recovered after they are deleted. True or False?
2.
When you carve a graphics file, recovering the image depends on which of the following skills?
3.
Explain how to identify an unknown graphics file format that your computer forensics tool doesn't recognize.
4.
What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data?
5.
When investigating graphics files, you should convert them into one standard format. True or False?
6.
Digital pictures use data compression to accomplish which of the following goals? (Choose all that apply.)
7.
Salvaging a file is also known in North America by which of the following terms?
8.
In JPEG files, what's the starting offset position for the JFIF label?
9.
Each type of graphics file has a unique header containing information that distinguishes it from other types of graphics files. True or False?
10.
Copyright laws don't apply to Web sites. True or False?
11.
When viewing a file header, you need to include hexadecimal information to view the image. True or False?
12.
When recovering a file with ProDiscover, your first objective is to recover cluster values. True or False?
13.
Bitmap (.bmp) files use which of the following types of compression?
14.
A JPEG file uses which type of compression?
15.
Only one file format can compress graphics files. True or False?
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly