Course Hero Logo

Question 34 correct mark 100 out of 100 flag question

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 13 - 16 out of 32 pages.

Question34CorrectMark 1.00 out of 1.00Flag questionQuestion textTrue or False? RAID 0 is also referred to as disk striping.Select one:
TrueFalseFeedbackAhead:RAID AcquisitionsComplexity:EasySubject:Chapter 4Title:Collecting, Seizing, and Protecting EvidenceThe correct answer is 'True'.Question35CorrectMark 1.00 out of 1.00Flag questionQuestion textTrue or False? The Linux netcat command reads and writes bits over a networkconnection.Select one:FeedbackAhead:Forensic ImagingComplexity:EasySubject:Chapter 4Title:Collecting, Seizing, and Protecting Evidence36
QuestionCorrectMark 1.00 out of 1.00Flag questionQuestion textWindows uses __________ on each system as a "scratch pad" to write data whenadditional random access memory (RAM) is needed.Feedback:A swap file is a virtual memory extension of RAM.
Subject:Chapter 4Taxonomy:UnderstandTitle:Collecting, Seizing, and Protecting Evidenceb.a partitionc.metadatad.an installed operating systemFeedbackThe correct answer is: a swap fileQuestion37CorrectMark 1.00 out of 1.00Flag question
Question textTrue or False? Exif data is associated with temporary internet files.Select one:
FeedbackAhead:Handling EvidenceComplexity:EasyFeedback:Exif stands for exchangeable image file format and is associated withimage files.Subject:Chapter 4Title:Collecting, Seizing, and Protecting EvidenceThe correct answer is 'False'.Question38CorrectMark 1.00 out of 1.00Flag questionQuestion textJustin is investigating a digital forensic case. He is looking for incriminating evidenceon a computer running Microsoft Windows. He first examines the computer'sconfiguration and notices that a system setting identifies a swap file present on theC: drive. What file should Justin analyze to collect data from the swap file?a.pagefile.sysAhead:Handling EvidenceComplexity:ModerateSubject:Chapter 4Taxonomy:ApplyTitle:Collecting, Seizing, and Protecting Evidenceb.mempgr.sysc.swap.confd.memext.infFeedbackThe correct answer is: pagefile.sys

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 32 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
NoProfessor
Tags
Computer Forensics

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture