Which type of evidence is stored in a computers memory

Assignment Help Management Information Sys
Reference no: EM133337851

Assignment:

Question 1. Which type of evidence is any physical object that you can touch or otherwise directly observe, such as a hard drive?

  • Real
  • Documentary
  • Testimonial
  • Demonstrative

Question 2. Which type of evidence is stored in a computer's memory, as well as on storage devices as in files, and must be accompanied by documentation that validates the evidence's authenticity?

  • Real
  • Documentary
  • Testimonial
  • Demonstrative

Question 3. Which type of evidence is information collected from individuals that supports and helps to interpret other types of evidence?

  • Real
  • Documentary
  • Testimonial
  • Demonstrative

Question 4. Which type of evidence helps explain other evidence and includes visual aids such as charts and graphs?

  • Real
  • Documentary
  • Testimonial
  • Demonstrative

Question 5. Which of the following is a digital forensics specialist least likely to need in-depth knowledge of?

  • Computer memory, such as cache and random access memory (RAM)
  • Storage devices
  • Mainframes
  • Operating systems, such as Windows, Linux, and macOS

Question 6. A computing device does not play which role in a crime?

  • Perpetrator
  • Target
  • Instrument
  • Repository

Question 7. In which type of computer crime do cybercriminals engage in activities to either impersonate victims or to convince victims to carry out transactions that benefit the criminals, with a focus on extracting revenue from victims?

  • Cyberstalking
  • Exfiltrating data
  • Online fraud
  • Nonaccess computer crime

Question 8. Which type of computer crime often involves nation-state attacks by well-funded cybercriminals?

  • Cyberstalking
  • Cyberterrorism
  • Online fraud
  • Identity theft

Question 9. Which principle of effective digital forensic investigations helps to ensure data in memory is not lost?

  • Minimize original data handling
  • Enforce the rules of evidence
  • Do not exceed your knowledge
  • Consider data volatility

Question 10. Which of the following was developed by researchers at the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University?

  • U.S. Department of Defense Forensic Standards
  • Digital Forensic Research Workshop (DFRWS) Framework
  • Scientific Working Group on Digital Evidence (SWGDE) Framework
  • Event-Based Digital Forensic Investigation Framework

Question 11. Lin is a digital forensic specialist who works in a forensic lab. She is evaluating diagnostic forensic software to add to the lab's toolkit. She wants a tool that is open source that can also be used for penetration testing. Which tool should she choose?

  • Kali Linux
  • OSForensics
  • EnCase
  • The Forensic Toolkit (FTK)

Question 12. Which term describes a process that requires an organization to preserve and not alter evidence that may be used in court? This process can help ensure that normal data-handling procedures do not contaminate or even delete data that may be needed for a case.

  • Legal hold
  • E-discovery
  • Admissibility
  • Hash function

Question 13. What is the determination that evidence is either acceptable or unacceptable to a court of law?

  • Legal hold
  • Preservation
  • Admissibility
  • Order of volatility

Question 14. The ________ establishes that evidence was collected and handled using proper techniques and procedures, which is also a trusted method to determine the ________, or point of origin, of a piece of evidence.

  • legal hold, chain of custody
  • chain of custody, provenance
  • time stamp, preservation
  • provenance, admissibility

Question 15. Oscar is a digital forensic specialist. He has been given a suspect hard disk that has been physically damaged. He wants to try to recover data. What is the first step he should take?

  • Boot the test system from its own internal drive
  • Send the device to an organization that specializes in data recovery from damaged devices
  • Install it in a test system
  • Explore logical damage recovery

Question 16. Isabella is a digital forensic specialist. She wants to recover deleted data from a computer disk. The computer is currently running. Which process should she take to do so without accidentally overwriting any deleted data?

  • Copy the contents of the disk drive to an external drive without shutting down the computer
  • Shut down the computer, reboot, and then copy the contents of the disk drive to an external drive
  • Make an image of memory, shut down the computer, attach the disk drive to a forensic lab device, and read the data from the disk
  • Because processes constantly run on computers and request new sectors to store data, it is not possible to recover deleted data without some data being overwritten

Question 17. The FAT32 and NTFS file systems are associated with which of the following?

  • Android
  • Windows
  • Linux
  • macOS

Question 18. What are bash and zsh?

  • Shells
  • File systems
  • Graphical user interfaces (GUIs)
  • Operating systems

Question 19. Which of the following is not true of mobile devices and forensics?

  • Mobile devices can be volatile and remotely managed.
  • Mobile devices do not need to follow ordinary chain of custody techniques.
  • Although options are available for breaking mobile device access controls, there is no guarantee that you will be able to access the device's data without the owner's cooperation.
  • The process of accessing evidence on a mobile device is similar to that on a normal computer.

Question 20. Susan is a digital forensic examiner. She is investigating a case in which a driver has been accused of vehicular homicide. She has the driver's mobile device and cellular records. What type of mobile device evidence is most likely to reveal whether the driver was actively using a mobile device when the incident occurred?

  • Global positioning system (GPS) information and history
  • Network connection information and history
  • Text messages
  • Device information

Reference no: EM133337851

Questions Cloud

What policies are covered in physical security policies : What is the purpose of physical security in an organization and Explain how the securing Assets, Locks and Entry Controls helps in Physical Security
Describe Smart Borders : Describe "Smart Borders" in the context of detection capability? Examine Intellectual Property (IP) theft/violations and the economic impact of border security
Does the cybersecurity framework : Does the cybersecurity framework you use matter depending on the industry your organization is in? If it does, how do you know what one to us.
What software and hardware tools would you select : SEC 350 Wilmington University What software and hardware tools would you select for doing digital forensics investigation of a Linux computer?
Which type of evidence is stored in a computers memory : Which type of evidence is stored in a computer's memory, as well as on storage devices as in files.
Security treaty with developed nation : What benefits does a 3rd world country get out of a security treaty with a developed nation?
Why should xyzrg consider the incident may have violated : Why should XYZRG consider the incident may have violated privacy legislation and Carole left her company-issued laptop in a locked car while running an errand
The incursions of europeans throughout africa : The incursions of Europeans throughout Africa during the fifteenth century established the foundations for the Transatlantic Slave Trade
Write report on the security implications : Write report on the Security implications, Economic implications, Ethical implications and Privacy implications of the use of predictive pricing machine

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the key initiatives currently underway at ach

Identify and analyze at least four digital payment concerns Centervale Apparel might want to consider in light of what you have learned from NACHA.

  What conditions is each type appropriate

Explain the differences between the various types of purchasing organizations. Under what conditions is each type appropriate. Please ensure that your original response is at least 200 words and is supported with references.

  What are the positives of being so dependent on technology

We live in a digital age, where individuals have access to information. What are some of the positives as well as negatives of being so dependent on technology?

  How does one organization perhaps work with another

How does one organization perhaps work with another? What role do the organizations play in the overall "future of the national health information superhighway?

  What steps might have been taken to prevent his perpetrating

David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation.

  Characteristics of a general computer system

General computer system security - How do the characteristics of a general computer system

  Why the job of a network managers important

Write a short essay (2-3) pages Outlining why the job of a network manager's Important.

  Brief research on the internet about different data types

In this presentation, you will describe the different data types and give examples of each. Conduct a brief research on the Internet about different data types

  What do you supply chain management

What is Supply Chain Management and What is vertical integration - What kind of relevance does Supply Chain Management and vertical integration have for global businesses?

  Description of the project and its value to the organization

Prepare a project charter as a 9-slide Microsoft PowerPoint presentation, not including the title or reference slide. Your charter must include the following elements: The project stakeholders and A description of the project and its value to the o..

  Demonstrate communication skills in the business environment

Purpose: The goal of this project is to show that you can demonstrate communication skills in the business and professional environment.

  Why do people resist new technologies

What are the top emerging technologies making their way into the mainstream?Why do people resist new technologies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd