A file extension and signature can be manually added by:
A hash library would most accurately be described as:
A signature analysis has been run on a case. The result "Bad Signature " means:
A case file can contain ____ hard drive images?
4 bits allows what number of possibilities?
EnCase uses the _________________ to conduct a signature analysis.
To undelete a file in the FAT file system, EnCase computes the number of _______ the file will use based on the file ______.
Which of the following would most likely be an add-in card?
What information in a FAT file system directory entry refers to the location of a file on the hard drive?
The results of a hash analysis on an evidence file that has been added to a case will be stored in which of the following files?
Select the appropriate name for the highlighted area of the binary numbers.
The EnCase methodology dictates that the lab drive for evidence have a __________ prior to making an image.
GREP terms are automatically recognized as GREP by EnCase.
When a non-compressed evidence file is reacquired with compression, the acquisition and verification hash values for the evidence will remain the same for both files.
By default, what color does EnCase use for slack?
RAM is used by the computer to:
A suspect typed a file on his computer and saved it to a floppy diskette. The filename was MyNote.txt. You receive the floppy and the suspect computer. The suspect denies that the floppy disk belongs to him. You search the suspect computer and locate only the suspect? computer. The suspect denies that the floppy disk belongs to him. You search the suspect? computer and locate only the filename within a .LNK file. The .LNK file is located in the folder C:\Windows\Recent. How you would use the .LNK file to establish a connection between the file on the floppy diskette and the suspect computer? connection between the file on the floppy diskette and the suspect? computer?
A sector on a hard drive contains how many bytes?
A hard drive has 8 sectors per cluster. File Mystuff.doc has a logical file size of 13,000 bytes. How many clusters will be used by Mystuff.doc?
Using good forensic practices, when seizing a computer at a business running Windows 2000 Server you should:
For an EnCase evidence file acquired with a hash value to pass verification, which of the following must be true?
Hash libraries are commonly used to:
A SCSI host adapter would most likely perform which of the following tasks?
The following keyword was typed in exactly as shown. Choose the answer(s) that would result. All search criteria have default settings. Speed and Meth
Which of the following selections would be used to keep track of a fragmented file in the FAT file system?