When obtaining a warrant, it is important to:

When obtaining a warrant, it is important to:A . particularlydescribe the place to be searched and particularly describe the items to be seizedB . generallydescribe the place to be searched and particularly describe the items to be seizedC . generallydescribe the place to be searched and generally describe the items...

December 29, 2020 1 Comment READ MORE +

Which of the following is NOT a graphics file?

Which of the following is NOT a graphics file?A . Picture1.tgaB . Picture2.bmpC . Picture3.nfoD . Picture4.psdView AnswerAnswer: C

December 28, 2020 No Comments READ MORE +

Which of the following should a computer forensics lab used for investigations have?

Which of the following should a computer forensics lab used for investigations have?A . isolationB . restricted accessC . open accessD . an entry logView AnswerAnswer: B

December 28, 2020 No Comments READ MORE +

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.A . 0B . 10C . 100D . 1View AnswerAnswer: A

December 28, 2020 No Comments READ MORE +

What happens when a file is deleted by a Microsoft operating system using the FAT file system?

What happens when a file is deleted by a Microsoft operating system using the FAT file system?A . only the reference to the file is removed from the FATB . the file is erased and cannot be recoveredC . a copy of the file is stored and the original file...

December 28, 2020 No Comments READ MORE +

Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?A . network-based IDS systems (NIDS)B . host-based IDS systems (HIDS)C . anomaly detectionD . signature recognitionView AnswerAnswer: B

December 28, 2020 No Comments READ MORE +

What should you examine next in this case?

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of...

December 28, 2020 No Comments READ MORE +

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?A . 70 yearsB . the life of the authorC . the life of the author plus 70 yearsD ....

December 27, 2020 No Comments READ MORE +

If a suspect computer is located in an area that may have toxic chemicals, you must:

If a suspect computer is located in an area that may have toxic chemicals, you must:A . coordinate with the HAZMAT teamB . determine a way to obtain the suspect computerC . assume the suspect machine is contaminatedD . do not enter aloneView AnswerAnswer: A

December 27, 2020 No Comments READ MORE +

The offset in a hexadecimal code is:

The offset in a hexadecimal code is:A . The last byte after the colonB . The 0x at the beginning of the codeC . The 0x at the end of the codeD . The first byte after the colonView AnswerAnswer: B

December 27, 2020 No Comments READ MORE +