Pre-Course Assessment Quiz Flashcards
In general, a criminal case follows three stages: the complaint, the investigation, and the ____.
Blotter
Allegation
Prosecution
Litigation
Prosecution
Software forensics tools are commonly used to copy data from a suspect’s disk drive to a(n) ____.
Backup file
Recovery copy
Image file
Firmware
Image file
With ____, Macintosh moved to the Intel processor and became UNIX based.
Lion
El Capitan
High Sierra
OS X
OS X
You use ____ to create, modify, and save bitmap, vector, and metafile graphics.
Image readers
Graphics viewers
Image viewers
Graphics editors
Graphics editors
The ____ command displays pages from the online help manual for information on Linux commands and their options.
cmd
hlp
man
inst
man
____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example.
Network forensics
Disaster recovery
Computer forensics
Data recovery
Data recovery
Lab costs can be broken down into monthly, ____, and annual expenses.
Weekly
Daily
Quarterly
Bimonthly
Quarterly
____ is the file structure database that Microsoft originally designed for floppy disks.
FAT
FAT32
VFAT
NTFS
FAT
____ records are data the system maintains, such as system log files and proxy server logs.
Computer-stored
Computer-generated
Hearsay
Business
Computer-generated
____ compression compresses data by permanently discarding bits of information in the file.
Lossless
Lossy
Redundant
Huffman
Lossy