Which of the following is the second stage of the collection phase of a digital forensics investigation?
A) Creating a forensic image copy B) Analyzing findings C) Getting access to information D) Using software tools to recover data
Which of the following is the second stage of the collection
phase of a digital forensics investigation?
Answer: Option C) Getting access to
information
Explanation: The first step in the forensic
process is to identify potential sources of data and acquire
forensic data from them. Major sources of data are desktops,
storage media, Routers, Cell Phones, Digital Camera etc. A plan is
developed to acquire data according to their importance, volatility
and amount of effort to collect.
Examination: Once data has been collected, the next phase
is to examine it, which involves assessing and extracting the
relevant pieces of information from the collected data
Which of the following is the second stage of the collection phase of a digital forensics...
1.Which of the following is used to store information about disk partitions? a.ReFS b.EFS c. MFT d.MBR 2.What feature of NTFS systems can be used to obscure information that might be used as evidence in an investigation? a.ADS b.MBR c.MFT d.EFS 3. NTFS data encryption is achieved with which of the following technologies? a.WDE b.ReFS c.EFS d.ADS 4. Which of the following keeps a record of attached hardware, user preferences, network connections, and installed software? a.System.dat file b.Master Boot Record...
: 6. Which of the following needs to be performed during a forensics investigation to ensure the data contained in a drive image has not been compromised? Follow the proper chain of custody procedures. Compare the image hash to the original hash. Ensure a legal hold has been placed on the image. Verify the time of the image file.
Which of the following is part of stage 1 of the drawing-in phase? Demonstrating sincerity Data collection Feeling the water Goal setting
6 points: Forensics Install the Autopsy tool from sleuthkit: https://www.sleuthkit.org/autopsy/ Making use of this tool load the 'Lone Wolf' image from: PLEASE NOTE: this image in >12GB. https://drive.google.com/open?id=1JSvCeZgo2mfnPy8Y41qZqU5bms1PSq0G (Links to an external site.)Links to an external site. and analyse this image to begin a forensic examination. PLEASE NOTE: this image in >12GB. A quick 'getting started' guide was presented in this weeks lecture. Analysis of this image can take ~30 minutes on mid range hardware. This should not affect your...
1. Which of the following is not a unique characteristic of cloud computing relative to forensics? A. Evidence may be in a different location than the suspect computer. B. Evidence may be under different privacy rules. C. Evidence may be stored in binary code. D. Evidence may be easier for multiple persons to tamper with or modify. E. All of the above 2. According to Moore’s law, computer power _______ at _______ the cost approximately every 18 to 24 months....
39. Which of the following is not a phase of the research process: a. Stating the study problem b. Reviewing the literature to develop a theoretical framework c. Disseminating data d. Analyzing data
Which of the following is not a step of AES? a. Byte Substitution b. Add Round key c. Mix Column d. Choice Permutation Which of the following is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or data on the system? a. Risk b. Exploit c. Mitigation d. Vulnerability Which of the following is not a phase in a worm attack? a. Paralyze b. Propagate c. Eradicate d. Persist The...
5. Which one of the following business processes is not part of the finance and accounting functional area? A) Enrolling employees in benefits plans. B) Creating financial statements. C) Paying creditors. D) Managing cash accounts. 6. A very clear understanding of how a business works can be achieved by: A) Analyzing the computer hardware. B) Analyzing the software. C) Analyzing the business processes. D) Using metrics to measure efficiency.
Which of the following is a drawback of cloud computing? O A. It requires users to access information systems locally from servers in the organization's data centers. B. It restricts employees from accessing virtual servers using the Internet. c. It requires users to access software applications locally on an individual PC. D. It requires an extremely reliable Internet connection.
QUESTION 5 Which of the following is NOT suited for storage as rasters? a. Digital camera photos b. Satellite imagery c. Digital scans of topographic maps d. Digital census data e. Digital elevation data