Digital Forensics Post Assessment
____ contains configuration information for Sendmail, helping the investigator to determine where the log files reside.
/etc/sendmail.cf
In a prefetch file, the application's last access date and time are at offset ____.
0X90
The ____ has stated that, unlike attorneys, expert witnesses do not owe a duty of loyalty to their clients.
ABA
____ provide additional resource material not included in the body of the report.
Appendixes
____, located in the root folder of the system partition, specifies the Windows XP path installation and contains options for selecting the Windows version.
Boot.ini
Recovering fragments of a file is called ____.
Carving
Confidential business data included with the criminal evidence are referred to as ____ data.
Commingled
The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.
Computer Analysis and Response Team (CART)
____ is a layered network defense strategy developed by the National Security Agency (NSA).
Defense In Depth
The ____ digital network, a faster version of GSM, is designed to deliver data.
EDGE
On Mac OSs, the ____ stores any file information not in the MDB or Volume Control Block (VCB).
Extents overflow file
Marking bad clusters data-hiding technique is more common with ____ file systems.
FAT
The ____ tool can be used to bypass a virtual machine's hypervisor, and can be used with OpenStack.
FROST
Under copyright laws, computer programs may be registered as ____.
Literary works
The SIM file structure begins with the root of the system (____).
MF
____ from both the plaintiff's and defense's attorneys is an optional phase of the trial. Generally, it's allowed to cover an issue raised during cross-examination of a witness.
Rebuttal
____ disks are commonly used with Sun Solaris systems.
SPARC
During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.
TEMPTEST
Intel ____ has responded to the need for security and performance by producing different CPU designs.
Virtualization Technology (VT)
The ____ command creates a raw format file that most computer forensics analysis tools can read, which makes it useful for data acquisitions.
dd