Post-Course Assessment Quiz Flashcards
Intel ____ has responded to the need for security and performance by producing different CPU designs.
Hyper-V
Parallels Virtualization
Virtualization Technology (VT)
KVM
Virtualization Technology (VT)
The ____ tool can be used to bypass a virtual machine’s hypervisor, and can be used with OpenStack.
ARC
FROST
WinHex
OpenForensics
FROST
Confidential business data included with the criminal evidence are referred to as ____ data.
Commingled
Exposed
Revealed
Public
Commingled
____ from both the plaintiff’s and defense’s attorneys is an optional phase of the trial. Generally, it’s allowed to cover an issue raised during cross-examination of a witness.
Closing arguments
Opening statements
Rebuttal
Plaintiff
Rebuttal
The ____ digital network, a faster version of GSM, is designed to deliver data.
TDMA
iDEN
EDGE
D-AMPS
EDGE
During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.
NISPOM
TEMPEST
RAID
EMR
TEMPEST
Under copyright laws, computer programs may be registered as ____.
Motion pictures
Literary works
Audiovisual works
Architectural works
Literary works
On Mac OSs, the ____ stores any file information not in the MDB or Volume Control Block (VCB).
Extents overflow file
Catalog
Volume information block
Master directory block
Extents overflow file
____ provide additional resource material not included in the body of the report.
Appendixes
Discussion
References
Conclusions
Appendixes
The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.
Computer Analysis and Response Team (CART)
Department of Defense Computer Forensics Laboratory (DCFL)
DIBS
Federal Rules of Evidence (FRE)
Computer Analysis and Response Team (CART)
The SIM file structure begins with the root of the system (____).
MF
DF
DCS
EF
MF
The ____ command creates a raw format file that most computer forensics analysis tools can read, which makes it useful for data acquisitions.
man
fdisk
dd
raw
dd
Recovering fragments of a file is called ____.
Slacking
Rebuilding
Carving
Saving
Carving
____, located in the root folder of the system partition, specifies the Windows XP path installation and contains options for selecting the Windows version.
Boot.ini
NTDetect.com
BootSec.dos
NTBootdd.sys
Boot.ini
Marking bad clusters data-hiding technique is more common with ____ file systems.
HFS
NTFS
FAT
Ext2fs
FAT