-
DF6 W03: Q01. Which of the following is the acronym for the police guidelines with regards to Digital Forensics Investigations?
-
DF6 W03: Q02. Which of the following is NOT considered a type of digital evidence?
-
DF6 W03: Q03. Which of the following is used by a Digital Forensics Investigator to make a hard disk drive read-only?
-
DF6 W03: Q04. In digital forensics, which of the following would be the best choice for imaging a hard drive to prevent data loss?
-
DF6 W03: Q05. Which protocol is most commonly used to preserve chain of custody in digital evidence handling?
-
DF6 W03: Q06. During forensic analysis, what is the significance of volatile memory?
-
DF6 W03: Q07. Which technique is used to prevent digital devices from connecting to wireless networks during forensic examination?
-
DF6 W03: Q08. What is the main purpose of a forensic image of a hard drive?
-
DF6 W03: Q09. Which of the following is a Desktop operating system based upon UNIX?
-
DF6 W03: Q10. Which of the following is HARDWARE that has the potential to store evidence in a Digital Forensics Investigation?
-
DF6 W03: Q11. In forensic analysis, what is 'steganography' commonly used for?
-
DF6 W03: Q12. Which of the following laws applies to the crime of computer software piracy?
-
DF6 W03: Q13. Which number system is shown by the base 2 value "01101110"?
-
DF6 W03: Q14. The term "partitions" refers to which of the following?
-
DF6 W03: Q15. In relation to Digital Forensics, what does the T of FTK stand for?
-
DF6 W03: Q16. What is a potential risk of using the ORIGINAL device for examination in a digital forensic case?
-
DF6 W03: Q17. In digital forensics, what does the following system information "2.5 GHz" apply to?
-
DF6 W03: Q18. What does the G of GUI stand for