Chapter 5 end of chapter questions Get personalized study reminders at intervals optimized for better retention. Track your progress on this set by creating a folder Or add to an existing folder a. Most companies keep inventory databases of all hardware and software used. True True a. You begin to take orders from a
police detective without a warrant or subpoena. False a. Coordinate with the HAZMAT team. It can't be predicted, no two files can have the same hash value, and if the file changes, the hash value changes. two files have the same hash value Small computer toolkit, large-capacity drive, IDE ribbon cables, forensic boot media, laptop IDE 40-to-44 pin adapter, laptop or portable computer, FireWire or USB dual write-protect external bay, flashlight, digital camera or 35mm ca to minimize how much you have to keep track of at the scene True a. Browsing open
applications refer to review sheets Computers, cable connections, overview of scene—anything that might be of interest to the investigation a. Keylogging sensitive corporate information being mixed with data collected as evidence MD5 and SHA-1 False True initial-response field
kit False Please allow access to your computer’s microphone to use Voice Recording. We can’t access your microphone!Click the icon above to update your browser permissions above and try againExample: Reload the page to try again!Reload Press Cmd-0 to reset your zoomPress Ctrl-0 to reset your zoomIt looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.Please upgrade Flash or install Chrometo use Voice Recording.For more help, see our troubleshooting page. Your microphone is mutedFor help fixing this issue, see this FAQ.What do you do to a computer that is turned off in crime scene?The traditional method for law enforcement when dealing with the search and seizure of computers at a crime scene is to simply unplug the computer and book it into the evidence facility. From there, the investigator requests that the computer be examined by a trained digital evidence examiner.
Which of the following must you do if a suspect's computer is discovered in an area that may contain toxic materials?If a suspect's computer is found in an area that might have toxic chemicals, you must do which of the following? Coordinate with the HAZMAT team. Determine a way to obtain the suspect's computer.
Which of the following techniques are used during computer forensic investigations?Some common techniques include the following: Reverse steganography. Steganography is a common tactic used to hide data inside any type of digital file, message or data stream. Computer forensic experts reverse a steganography attempt by analyzing the data hashing that the file in question contains.
Which of the following techniques may be used in covert surveillance?Covert surveillance can be conducted using a number of techniques which include static surveillance, mobile surveillance, foot surveillance and technical surveillance.
|