Reference no: EM133268132
Assignment:
1-Match the following types of investigations with the kinds of data needed.
-Copies of messages, mail server log records.
-E-mail, message board contents, server logs, and telephone records.
-Startup memorandum, list of keywords of interest.
-Internet logs, disk drives, and IP network addresses
-Associated policies, access to the suspect computer.
-Technology specialists, network specialists, threat assessment specialists.
2- Provide the names of at least two computer forensics tools.
3- Of the options below which algorithm generates a file's hash value?
-MDS
-RC4
-AES256
-ECC
4-The process of trying to get a suspect to confess to a specific incident or crime is known as an
An
-Interrogation
-Interview
-Questioning
-Subpoena
5-An affidavit is a sworn under oath, notarized statement that outlines the facts and circumstances of a crime that will be presented to a judge in the hopes they will issue a warrant
-True
- False
6- Hexidecimal is used to represent numbers in base
-16
-10
-2
-8
7-Match the following types of investigations with the kinds of data needed.
-Copies of messages, mail server log records.
-E-mail, message board contents, server logs, and telephone recoras
-Startup memorandum, list of keywords of interest.
-Internet logs. disk drives, and If network addresses
-Associated policies. access to the suspect computer.
-technology specialists, network specialists, threat assessment specialists.