Post-Course Assessment Quiz Flashcards
Intel ____ has responded to the need for security and performance by producing different CPU designs.
Hyper-V
Parallels Virtualization
Virtualization Technology (VT)
KVM
Virtualization Technology (VT)
The ____ tool can be used to bypass a virtual machine’s hypervisor, and can be used with OpenStack.
ARC
FROST
WinHex
OpenForensics
FROST
Confidential business data included with the criminal evidence are referred to as ____ data.
Commingled
Exposed
Revealed
Public
Commingled
____ from both the plaintiff’s and defense’s attorneys is an optional phase of the trial. Generally, it’s allowed to cover an issue raised during cross-examination of a witness.
Closing arguments
Opening statements
Rebuttal
Plaintiff
Rebuttal
The ____ digital network, a faster version of GSM, is designed to deliver data.
TDMA
iDEN
EDGE
D-AMPS
EDGE
During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. The U.S. Department of Defense calls this special computer-emission shielding ____.
NISPOM
TEMPEST
RAID
EMR
TEMPEST
Under copyright laws, computer programs may be registered as ____.
Motion pictures
Literary works
Audiovisual works
Architectural works
Literary works
On Mac OSs, the ____ stores any file information not in the MDB or Volume Control Block (VCB).
Extents overflow file
Catalog
Volume information block
Master directory block
Extents overflow file
____ provide additional resource material not included in the body of the report.
Appendixes
Discussion
References
Conclusions
Appendixes
The FBI ____ was formed in 1984 to handle the increasing number of cases involving digital evidence.
Computer Analysis and Response Team (CART)
Department of Defense Computer Forensics Laboratory (DCFL)
DIBS
Federal Rules of Evidence (FRE)
Computer Analysis and Response Team (CART)
The SIM file structure begins with the root of the system (____).
MF
DF
DCS
EF
MF
The ____ command creates a raw format file that most computer forensics analysis tools can read, which makes it useful for data acquisitions.
man
fdisk
dd
raw
dd
Recovering fragments of a file is called ____.
Slacking
Rebuilding
Carving
Saving
Carving
____, located in the root folder of the system partition, specifies the Windows XP path installation and contains options for selecting the Windows version.
Boot.ini
NTDetect.com
BootSec.dos
NTBootdd.sys
Boot.ini
Marking bad clusters data-hiding technique is more common with ____ file systems.
HFS
NTFS
FAT
Ext2fs
FAT
____ disks are commonly used with Sun Solaris systems.
FIRE IDE
SPARC
F.R.E.D.
DiskSpy
SPARC
The ____ has stated that, unlike attorneys, expert witnesses do not owe a duty of loyalty to their clients.
HTCIA
ABA
IACIS
ISFCE
ABA
____ is a layered network defense strategy developed by the National Security Agency (NSA).
Defense in Depth
Anti-Rootkit
PsShutdown
Order of volatility
Defense in Depth
____ contains configuration information for Sendmail, helping the investigator to determine where the log files reside.
/etc/sendmail.cf
/etc/syslog.conf
/etc/var/log/maillog
/etc/var/log/maillog
/etc/sendmail.cf
In a prefetch file, the application’s last access date and time are at offset ____.
0xD4
0x80
0x90
0x88
0x90