When obtaining a warrant, it is important to:
When obtaining a warrant, it is important to:A . particularlydescribe the place to be searched and particularly describe the items to be seizedB . generallydescribe the place to be searched and particularly describe the items to be seizedC . generallydescribe the place to be searched and generally describe the items...
Which of the following is NOT a graphics file?
Which of the following is NOT a graphics file?A . Picture1.tgaB . Picture2.bmpC . Picture3.nfoD . Picture4.psdView AnswerAnswer: C
Which of the following should a computer forensics lab used for investigations have?
Which of the following should a computer forensics lab used for investigations have?A . isolationB . restricted accessC . open accessD . an entry logView AnswerAnswer: B
With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.
With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.A . 0B . 10C . 100D . 1View AnswerAnswer: A
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
What happens when a file is deleted by a Microsoft operating system using the FAT file system?A . only the reference to the file is removed from the FATB . the file is erased and cannot be recoveredC . a copy of the file is stored and the original file...
Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?
Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?A . network-based IDS systems (NIDS)B . host-based IDS systems (HIDS)C . anomaly detectionD . signature recognitionView AnswerAnswer: B
What should you examine next in this case?
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of...
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?A . 70 yearsB . the life of the authorC . the life of the author plus 70 yearsD ....
If a suspect computer is located in an area that may have toxic chemicals, you must:
If a suspect computer is located in an area that may have toxic chemicals, you must:A . coordinate with the HAZMAT teamB . determine a way to obtain the suspect computerC . assume the suspect machine is contaminatedD . do not enter aloneView AnswerAnswer: A
The offset in a hexadecimal code is:
The offset in a hexadecimal code is:A . The last byte after the colonB . The 0x at the beginning of the codeC . The 0x at the end of the codeD . The first byte after the colonView AnswerAnswer: B