Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Which option below is not a hashing function used for validation checks?Select one:a. RC4 b. MD5c. SHA-1d. CRC32 |
RC4 |
|
The _______ copies evidence of intrusions to an investigation workstation automatically for further analysis over the network.Select one:a. intrusion detection system b. active defense mechanismc. total awareness systemd. intrusion monitoring system |
intrusion detection system |
|
Which open-source acquisition format is capable of producing compressed or uncompressed image files, and uses the .afd extension for segmented image files?Select one:a. Advanced Forensics Diskb. Advanced Forensic Format c. Advanced Capture Imaged. Advanced Open Capture |
Advanced Forensic Forma |
|
What is the name of the Microsoft solution for whole disk encryption?Select one:a. DriveCryptb. TrueCryptc. BitLocker d. SecureDrive |
BitLocker |
|
In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?Select one:a. NTFSb. FATc. HFSX d. Ext3fs |
FAT |
|
The goal of recovering as much information as possible can result in ________________, in which an investigation expands beyond the original description because of unexpected evidence found.Select one:a. litigationb. scope creep c. criminal chargesd. violations |
scope creep |
|
In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.Select one:a. formatb. fdisk c. grubd. Diskpart |
Diskpart |
|
A user with programming experience may use an assembler program (also called a __________) on a file to scramble bits, in order to secure the information contained inside.Select one:a. compiler b. shifterc. macrod. script |
macro |
|
In order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely.Select one:a. keygrabberb. keylogger c. packet captured. protocol analyser |
keylogger |
|
The term for detecting and analyzing steganography files is _________________.Select one:a. carvingb. steganology c. steganalysisd. steganomics |
steganalysis |