computer forensics - Question 1 1 out of 1 points Getting a...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Question 1 1 out of 1 points Getting a hash value with a ____ is much faster and easier than with a(n) ____. Answer Selected Answer: hexadecimal editor, computer forensics tool Correct Answer: hexadecimal editor, computer forensics tool Question 2 0 out of 1 points FTK cannot analyze data from image files from other vendors. Answer Selected Answer: True Correct Answer: False Question 3 1 out of 1 points
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
In civil and criminal cases, the scope is often defined by search warrants or ____, which specify what data you can recover. Answer Selected Answer: subpoenas Correct Answer: subpoenas Question 4 1 out of 1 points In FTK ____ search mode, you can also look for files that were accessed or changed during a certain time period. Answer Selected Answer: indexed Correct Answer: indexed Question 5 1 out of 1 points
Background image of page 2
____ are handy when you need to image the drive of a computer far away from your location or when you don’t want a suspect to be aware of an ongoing investigation. Answer
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/28/2011 for the course CIS 145 taught by Professor Buroker during the Spring '11 term at Mt. Hood Community College.

Page1 / 10

computer forensics - Question 1 1 out of 1 points Getting a...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online