1. Destroying data, on a hard drive, is relatively easy and can be done one of two ways:
a. Destroying the platters
b. Wiping the entire hard drive
c. Placing magnets on a hard drive
d. Simply formatting a hard drive
2. __________________________ is a list of people who have had physical possession of the evidence.
Chain of custody
3. What is a hashing algorithm?
A utility designed to create a binary or hexadecimal number that represents the uniqueness of a data set, such as a file or entire disk.
4. In a criminal investigation, probable cause is needed for a criminal investigation.
a. True
b. Fals
5. An computer forensics labs should have more than two exits.
a. True
b. False
6. …show more content…
Testimonial evidence outweigh physical evidence during an investigation.
a. True
b. False
11. The act of ensuring the integrity of data being copied derived from original?
Validation
12. _____________________________________is gives OS a road map to data on a disk , type of file system an OS uses determines how data is stored on the …show more content…
_________________________________in computer forensics, makes it possible to restore a suspect drive on your virtual machine crucial for specialist to identify potential VM files, artifacts and fragments can be deleted files.
Virtual Machines
14. ________________________________the activity of defrauding an online account holder of financial information by posing as a legitimate company.
Phishing
15. A form of malware that shows ads in the form of pop-ups and banners.
a. malware
b. adware
c. gameware
d. antispyware
16. A policy that computer and network users in a business or school must abide by that forces users to practice safe computing is named Acceptable Use Policy.
a. True
b. False
17. ____________________________is a form of cybercrime that redirects you to a phony website even if you type the right address into your browser
Pharming
18. When wireless encryption is added it helps secure a wireless network by encrypting transmitted data.
a. True
b. False
19. This is a form of computer harassment that happens between two individuals is _____.
Cyberstalking
20. _________________ is a program that appears to be a legitimate program but is actually something malicious instead.
Trojan