What information do you need to recover when searching a victims computer for a crime committed with specific
What information do you need to recover when searching a victims computer for a crime committed with specific e-mail message?
What would be the primary reason for you to recommend a disk imaging tool?
Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?
What prevents you from discussing the case withthe CEO?
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with
the CEO?
What can an investigator examine toverify that a file has the correct extension?
One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to
verify that a file has the correct extension?
This organization maintains a database of hash signatures for known software
This organization maintains a database of hash signatures for known software
The ____________________ refers to handing over the results of private investigations to the authorities becau
The ____________________ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.
Can the Employer file a criminal complain with Police?
During the course of a corporate investigation, you find that an Employee is committing a crime. Can the Employer file a criminal complain with Police?
____________________ is simply the application of Computer Investigation and analysis techniques in the intere
____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.
What is the name of the Standard Linux Command that is also available as windows application that can be used
What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images ?
To preserve digital evidence, an investigator should ____________________
To preserve digital evidence, an investigator should ____________________