Windows identifies which application to open a file with by examining which of the following?
Windows identifies which application to open a file with by examining which of the following? A. The File extension B. The file attributes C. The file Signature at the end of the file D. The file signature at the beginning of the file
With Regard to using an Antivirus scanner during a computer forensics investigation, You should:
With Regard to using an Antivirus scanner during a computer forensics investigation, You should: A. Scan the suspect hard drive before beginning an investigation B. Never run a scan on your forensics workstation because it could change your systems configuration C. Scan your forensics workstation at intervals of no more than once every five minutes […]
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, y
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software? A. Computer Forensics Tools and Validation Committee (CFTVC) B. Association of Computer Forensics Software […]
Bob has been trying to penetrate a remote production system for the past two weeks.
Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence. […]
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which sy
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time? A. on the individual computer’s ARP cache B. in the Web Server log files C. in the DHCP Server log files D. there is no […]
You are called by an author who is writing a book and he wants to know how long the copyright for his book wil
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published? A. 70 years B. the life of the author C. the life of the author plus 70 years D. copyrights last forever
How many sectors will a 125 KB file use in a FAT32 file system?
How many sectors will a 125 KB file use in a FAT32 file system? A. 32 B. 16 C. 256 D. 25
When performing a forensics analysis, what device is used to prevent the system from recording data on an evid
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk? A. a write-blocker B. a protocol analyzer C. a firewall D. a disk editor
You have been asked to investigate the possibility of computer fraud in the finance department of a company.
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have […]
In a FAT32 system, a 123 KB file will use how many sectors?
In a FAT32 system, a 123 KB file will use how many sectors? A. 34 B. 25 C. 11 D. 56