-
DF6 W03: Q01. What is the main purpose of hashing a hard drive during a digital forensic investigation?
-
DF6 W03: Q02. Which of the following is NOT considered a type of digital evidence?
-
DF6 W02: Q03. What is the primary role of metadata in digital forensics?
-
DF6 W03: Q04. In digital forensics, which of the following would be the best choice for imaging a hard drive to prevent data loss?
-
DF6 W03: Q05. Which protocol is most commonly used to preserve chain of custody in digital evidence handling?
-
DF6 W02: Q24. During forensic analysis, what is the significance of volatile memory?
-
DF6 W03: Q07. Which technique is used to prevent digital devices from connecting to wireless networks during forensic examination?
-
DF6 W03: Q08. What is the main purpose of a forensic image of a hard drive?
-
DF6 W03: Q09. Which file system type would most likely require specialized software to examine on a Windows operating system?
-
DF6 W03: Q10. Which organization is responsible for setting standards for computer forensics in the United States?
-
DF6 W03: Q11. In forensic analysis, what is 'steganography' commonly used for?
-
DF6 W03: Q12. What kind of data is typically NOT recovered through file carving?
-
DF6 W03: Q13. Which file attribute would indicate a file has been accessed but NOT modified?
-
DF6 W03: Q14. Which of the following can be used to identify the geographic origin of an IP address?
-
DF6 W03: Q15. Which one of the following is considered a primary tool in digital forensics investigations?
-
DF6 W03: Q16. What is a potential risk of using the original device for examination in a digital forensic case?
-
DF6 W03: Q17. In digital forensics, what is the main function of 'data carving'?
-
DF6 W03: Q18. In mobile device forensics, what type of memory is commonly extracted to retrieve deleted data?