• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

Which option below is not a hashing function used for validation checks?Select one:a. RC4 b. MD5c. SHA-1d. CRC32

RC4

The _______ copies evidence of intrusions to an investigation workstation automatically for further analysis over the network.Select one:a. intrusion detection system b. active defense mechanismc. total awareness systemd. intrusion monitoring system

intrusion detection system

Which open-source acquisition format is capable of producing compressed or uncompressed image files, and uses the .afd extension for segmented image files?Select one:a. Advanced Forensics Diskb. Advanced Forensic Format c. Advanced Capture Imaged. Advanced Open Capture

Advanced Forensic Forma

What is the name of the Microsoft solution for whole disk encryption?Select one:a. DriveCryptb. TrueCryptc. BitLocker d. SecureDrive

BitLocker

In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?Select one:a. NTFSb. FATc. HFSX d. Ext3fs

FAT

The goal of recovering as much information as possible can result in ________________, in which an investigation expands beyond the original description because of unexpected evidence found.​Select one:a. litigationb. scope creep c. criminal chargesd. violations

scope creep

In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.Select one:a. formatb. fdisk c. grubd. Diskpart

Diskpart

A user with programming experience may use an assembler program (also called a __________) on a file to scramble bits, in order to secure the information contained inside.​Select one:a. compiler b. shifterc. macrod. script

macro

In order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely.Select one:a. keygrabberb. keylogger c. packet captured. protocol analyser

keylogger

The term for detecting and analyzing steganography files is _________________.​Select one:a. carvingb. steganology c. steganalysisd. steganomics

steganalysis