You are on page 1of 1

   Nguyen Bao An (K13_HCM)

  Home  My courses  FRS301_DinhMH  Midterm Test 1  Midterm Test 1

Question 39 Who is responsible for the following tasks? Secure the scene and ensure that it is maintained In a
Complete secure state until the Forensic Team advises. Make notes about the scene that will eventually be
Mark 1.00 out handed over to the Forensic Team
of 1.00

Flag Select one:


question
a. Non-Laboratory Sta
b. System administrators
c. Local managers or other non-forensic sta
d. Lawyers

Question 40 A disk-forensic DOS tool that is designed to emulate and extend the capabilities of DOS to meet
Complete forensic needs; it creates a direct disk-to-disk forensic duplicates, can copy a range of sectors within or
Mark 1.00 out between drives, and can process duplicate drives.
of 1.00
Select one:
Flag
question
a. DriveSpy 
b. Bit-stream copy
c. Steganography
d. Bookrack

Question 41 A small shelf that is used in a forensic lab to hold reference materials.
Complete
Mark 1.00 out Select one:
of 1.00
a. Bookrack
Flag
question b. Bit-stream copy
c. DriveSpy
d. Steganography

Question 42 What is a SCSI (Small Computer System Interface)?


Complete
Mark 1.00 out Select one:
of 1.00
a. A set of ANSI standard electronic interfaces that allow personal computers to communicate
Flag with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and
question
scanners
b. A "plug-and-play" interface, which allows a device to be added without an adapter card and
without rebooting the computer
c. A standard electronic interface used between a computer motherboard's data paths or bus
and the computer's disk storage devices
d. A point-to-point serial bi-directional interface for transmitting data between computer devices
at data rates of up to 4 Gbps

Question 43
Which is a Linux journaling le system?
Complete
Mark 1.00 out Select one:
of 1.00
a. BFS
Flag
question
b. Ext4
c. HFS
d. FAT

Question 44 Which of the following steganography types hides the secret message in a speci cally designed pattern
Complete on the document that is unclear to the average reader?
Mark 1.00 out
of 1.00 Select one:
Flag a. Open code steganography
question
b. Text semagrams steganography
c. Technical steganography
d. Visual semagrams steganography

Question 45 Building a business case can involve which of the following?


Complete
Mark 1.00 out Select one:
of 1.00
a. Protecting trade secrets
Flag
question b. All of the others
c. Procedures for gathering evidence
d. Testing software

Question 46
First response to an incident may involve three di erent groups of people, and each will have di ering
Complete skills and need to carry out di ering tasks based on the incident. Who is responsible for collecting,
Mark 1.00 out preserving, and packaging electronic evidence?
of 1.00

Flag Select one:


question
a. Forensic laboratory sta
b. Local managers or other non-forensic sta
c. System administrators
d. Lawyers

Question 47 Which one of the following rst number of bytes of a le to determine the type and function of the le
Complete that involves collecting information from le signature analysis?
Mark 1.00 out
of 1.00 Select one:
Flag a. First 10 bytes
question
b. First 30 bytes
c. First 20 bytes
d. First 40 bytes

Question 48 Which of the following is FALSE ?  


Complete
Mark 1.00 out Select one:
of 1.00
a. It is the investigator’s job to determine someone’s guilt or innocence.
Flag
question b. The digital forensic investigator must maintain absolute objectivity.

c. The investigator must maintain strict con dentiality, discussing the results of an investigation
on only a “need to know”. 

d. It is the investigator’s responsibility to accurately report the relevant facts of a case. 

◄ Previous page Next page ►

PREVIOUS ACTIVITY
 Announcements

Jump to...

You might also like