Professional Documents
Culture Documents
Midterm Test 1 - Attempt Review (Page 3 of 4)
Midterm Test 1 - Attempt Review (Page 3 of 4)
Question 39 Who is responsible for the following tasks? Secure the scene and ensure that it is maintained In a
Complete secure state until the Forensic Team advises. Make notes about the scene that will eventually be
Mark 1.00 out handed over to the Forensic Team
of 1.00
Question 40 A disk-forensic DOS tool that is designed to emulate and extend the capabilities of DOS to meet
Complete forensic needs; it creates a direct disk-to-disk forensic duplicates, can copy a range of sectors within or
Mark 1.00 out between drives, and can process duplicate drives.
of 1.00
Select one:
Flag
question
a. DriveSpy
b. Bit-stream copy
c. Steganography
d. Bookrack
Question 41 A small shelf that is used in a forensic lab to hold reference materials.
Complete
Mark 1.00 out Select one:
of 1.00
a. Bookrack
Flag
question b. Bit-stream copy
c. DriveSpy
d. Steganography
Question 43
Which is a Linux journaling le system?
Complete
Mark 1.00 out Select one:
of 1.00
a. BFS
Flag
question
b. Ext4
c. HFS
d. FAT
Question 44 Which of the following steganography types hides the secret message in a speci cally designed pattern
Complete on the document that is unclear to the average reader?
Mark 1.00 out
of 1.00 Select one:
Flag a. Open code steganography
question
b. Text semagrams steganography
c. Technical steganography
d. Visual semagrams steganography
Question 46
First response to an incident may involve three di erent groups of people, and each will have di ering
Complete skills and need to carry out di ering tasks based on the incident. Who is responsible for collecting,
Mark 1.00 out preserving, and packaging electronic evidence?
of 1.00
Question 47 Which one of the following rst number of bytes of a le to determine the type and function of the le
Complete that involves collecting information from le signature analysis?
Mark 1.00 out
of 1.00 Select one:
Flag a. First 10 bytes
question
b. First 30 bytes
c. First 20 bytes
d. First 40 bytes
c. The investigator must maintain strict con dentiality, discussing the results of an investigation
on only a “need to know”.
PREVIOUS ACTIVITY
Announcements
Jump to...