Digital Forensics Post Assessment

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

____ contains configuration information for Sendmail, helping the investigator to determine where the log files reside.

/etc/sendmail.cf

In a prefetch file, the application's last access date and time are at offset ____.

0X90

The ____ has stated that, unlike attorneys, expert witnesses do not owe a duty of loyalty to their clients.

ABA

____ provide additional resource material not included in the body of the report.

Appendixes

____, located in the root folder of the system partition, specifies the Windows XP path installation and contains options for selecting the Windows version.

Boot.ini

Recovering fragments of a file is called ____.

Carving

Confidential business data included with the criminal evidence are referred to as ____ data.

Commingled

The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.

Computer Analysis and Response Team (CART)

____ is a layered network defense strategy developed by the National Security Agency (NSA).

Defense In Depth

The ____ digital network, a faster version of GSM, is designed to deliver data.

EDGE

On Mac OSs, the ____ stores any file information not in the MDB or Volume Control Block (VCB).

Extents overflow file

Marking bad clusters data-hiding technique is more common with ____ file systems.

FAT

The ____ tool can be used to bypass a virtual machine's hypervisor, and can be used with OpenStack.

FROST

Under copyright laws, computer programs may be registered as ____.

Literary works

The SIM file structure begins with the root of the system (____).

MF

____ from both the plaintiff's and defense's attorneys is an optional phase of the trial. Generally, it's allowed to cover an issue raised during cross-examination of a witness.

Rebuttal

____ disks are commonly used with Sun Solaris systems.

SPARC

During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.

TEMPTEST

Intel ____ has responded to the need for security and performance by producing different CPU designs.

Virtualization Technology (VT)

The ____ command creates a raw format file that most computer forensics analysis tools can read, which makes it useful for data acquisitions.

dd


Ensembles d'études connexes

Chapter 7 Bond Definitions & Risks

View Set

Chapter 39: Introduction to the Reproductive System

View Set

Final Test Organizational Behavior Questions

View Set

Chapter 60-Cardiovascular System

View Set

BUS 211 - Management Information Systems Exam 1

View Set