Post-Course Assessment Quiz Flashcards

1
Q

Intel ____ has responded to the need for security and performance by producing different CPU designs.

Hyper-V

Parallels Virtualization

Virtualization Technology (VT)

KVM

A

Virtualization Technology (VT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ____ tool can be used to bypass a virtual machine’s hypervisor, and can be used with OpenStack.

ARC

FROST

WinHex

OpenForensics

A

FROST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidential business data included with the criminal evidence are referred to as ____ data.

Commingled

Exposed

Revealed

Public

A

Commingled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ from both the plaintiff’s and defense’s attorneys is an optional phase of the trial. Generally, it’s allowed to cover an issue raised during cross-examination of a witness.

Closing arguments

Opening statements

Rebuttal

Plaintiff

A

Rebuttal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ____ digital network, a faster version of GSM, is designed to deliver data.

TDMA

iDEN

EDGE

D-AMPS

A

EDGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.

NISPOM

TEMPEST

RAID

EMR

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Under copyright laws, computer programs may be registered as ____.

Motion pictures

Literary works

Audiovisual works

Architectural works

A

Literary works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On Mac OSs, the ____ stores any file information not in the MDB or Volume Control Block (VCB).

Extents overflow file

Catalog

Volume information block

Master directory block

A

Extents overflow file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ provide additional resource material not included in the body of the report.

Appendixes

Discussion

References

Conclusions

A

Appendixes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.

Computer Analysis and Response Team (CART)

Department of Defense Computer Forensics Laboratory (DCFL)

DIBS

Federal Rules of Evidence (FRE)

A

Computer Analysis and Response Team (CART)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The SIM file structure begins with the root of the system (____).

MF

DF

DCS

EF

A

MF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ____ command creates a raw format file that most computer forensics analysis tools can read, which makes it useful for data acquisitions.

man

fdisk

dd

raw

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Recovering fragments of a file is called ____.

Slacking

Rebuilding

Carving

Saving

A

Carving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____, located in the root folder of the system partition, specifies the Windows XP path installation and contains options for selecting the Windows version.

Boot.ini

NTDetect.com

BootSec.dos

NTBootdd.sys

A

Boot.ini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Marking bad clusters data-hiding technique is more common with ____ file systems.

HFS

NTFS

FAT

Ext2fs

A

FAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ disks are commonly used with Sun Solaris systems.

FIRE IDE

SPARC

F.R.E.D.

DiskSpy

A

SPARC

17
Q

The ____ has stated that, unlike attorneys, expert witnesses do not owe a duty of loyalty to their clients.

HTCIA

ABA

IACIS

ISFCE

A

ABA

18
Q

____ is a layered network defense strategy developed by the National Security Agency (NSA).

Defense in Depth

Anti-Rootkit

PsShutdown

Order of volatility

A

Defense in Depth

19
Q

____ contains configuration information for Sendmail, helping the investigator to determine where the log files reside.

/etc/sendmail.cf

/etc/syslog.conf

/etc/var/log/maillog

/etc/var/log/maillog

A

/etc/sendmail.cf

20
Q

In a prefetch file, the application’s last access date and time are at offset ____.

0xD4

0x80

0x90

0x88

A

0x90