a
To make sure unwanted data isn't retained on the drive
b
Because it sounds like a good idea?
c
Because of a process called bit-shifting
QUESTION 12
Steganography is used for what following purpose?
Validating data
Hiding data
Accessing remote computers
d
Creating strong passwords
QUESTION 3
What are the two read/write blocker methods used in forensic data acquisitions?
a Remote and logical
Logical and local
Logical and physical
Hardware and software
QUESTION 4
If you forensically image a powered down computer then you will probably not get to see the RAM data as it is lost (although there is always the artifacts to examine e.g. hiberfil and pagefile artifacts)
True
False
QUESTION 5
A live acquisition of a running computer is preferred over imagining a powered down computer.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here