Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

How many copies of the FAT are located on a FAT 32, Windows 98-formatted partition?

A.

2

B.

3

C.

1

D.

4

Before utilizing an analysis technique on computer evidence, the investigator should:

A.

Test the technique on simulated evidence in a controlled environment to confirm that the results are consistent.

B.

Be trained in the employment of the technique.

C.

Botha and b.

D.

Neithera or b.

When a file is deleted in the FAT file system, what happens to the filename?

A.

It is zeroed out.

B.

The first character of the directory entry is marked with a hex 00.

C.

It is wiped from the directory.

D.

The first character of the directory entry is marked with a hex E5.

If cluster number 10 in the FAT contains the number 55, this means:

A.

That cluster 10 is used and the file continues in cluster number 55.

B.

That the file starts in cluster number 55 and continues to cluster number 10.

C.

That there is a cross-linked file.

D.

The cluster number 55 is the end of an allocated file.

Within EnCase for Windows, the search process is:

A.

a search of the physical disk in unallocated clusters and other unused disk areas

B.

a search of the logical files

C.

None of the above

D.

both a and b

You are working in a computer forensic lab. A law enforcement investigator brings you a computer and a valid search warrant. You have legal authority to search the computer. The investigator hands you a piece of paper that has three printed checks on it. All three checks have the same check and account number. You image the suspect computer and open the evidence file with EnCase. You checks have the same check and account number. You image the suspect's computer and open the evidence file with EnCase. You perform a text search for the account number and check number. Nothing returns on the search results. You perform a text search for all other information found on the printed checks and there is still nothing returned in the search results. You run a signature analysis and check the gallery. You cannot locate any graphical copies of the printed checks in the gallery. At this point, is it safe to say that the checks are not located on the suspect computer?

A.

No. The images could be located a compressed file.

B.

No. The images could be embedded in a document.

C.

No. The images could be in unallocated clusters.

D.

No. The images could be in an image format not viewable inside EnCase.

E.

All of the above.

The term signature and reader as they relate to a signature analysis are

A.

The signature is the file extension. The header is a standard pattern normally found at the beginning of a file.

B.

Synonymous.

C.

Areas compared with each other to verify the correct file type.

D.

None of the above

A sector on a floppy disk is the same size as a sector on a NTFS formatted hard drive.

A.

False

B.

True

Changing the filename of a file will change the hash value of the file.

A.

True

B.

False

The following keyword was typed in exactly as shown. Choose the answer(s) that would result. All search criteria have default settings. credit card

A.

Card

B.

Credit Card

C.

credit card

D.

Credit