what does the nnn denote?
When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?
what type of compression would you use?
If you are concerned about a high level of compression but not concerned about any possible data loss, what type of compression would you use?
what device is used to prevent the system from recording data on an evidence disk?
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
What type of equipment would a forensics investigator store in a StrongHold bag?
What type of equipment would a forensics investigator store in a StrongHold bag?
which system (MAC address) had a specific IP address at a specific time?
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?
how many investigators are you recommended having?
When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?
What layer of the OSI model do TCP and UDP utilize?
What layer of the OSI model do TCP and UDP utilize?
With regard to using an antivirus scanner during a computer forensics investigation, you should:
With regard to using an antivirus scanner during a computer forensics investigation, you should:
What should you examine next in this case?
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved.
What should you examine next in this case?
What hashing method is used to password protect Blackberry devices?
What hashing method is used to password protect Blackberry devices?