What is that code called?
Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique
identifier of the machine that created the document. What is that code called?
When using Windows acquisitions tools to acquire digita…
When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested
hardware write-blocking device to:
An Expert witness give an opinion if:
An Expert witness give an opinion if:
which one of the following files types to be created?
Printing under a Windows Computer normally requires which one of the following files types to be created?
which of the following would be most important in formi…
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their
various activity. After a computer has been compromised by a hacker, which of the following would be most
important in forming a profile of the incident?
To preserve digital evidence, an investigator should __…
To preserve digital evidence, an investigator should ____________________.
What is the name of the Standard Linux Command that is …
What is the name of the Standard Linux Command that is also available as windows application that can be
used to create bit-stream images?
____________________ is simply the application of Compu…
____________________ is simply the application of Computer Investigation and analysis techniques in the
interests of determining potential legal evidence.
Can the Employer file a criminal complaint with Police?
During the course of a corporate investigation, you find that an Employee is committing a crime.
Can the Employer file a criminal complaint with Police?
What do you do?
You are working as Computer Forensics investigator and are called by the owner of an accounting firm to
investigate possible computer abuse by one of the firm’s employees. You meet with the owner of the firm and
discover that the company has never published a policy stating that they reserve the right to inspect their
computing assets at will. What do you do?