The following line of code is an example of how to make a forensic copy of a suspect drive:
dd if=/dev/mem of=/evidence/image.memory1
Which operating system should be used to run this command?
A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.
Which evidence should be obtained from the storage media to identify which files were modified?
Which tool identifies the presence of steganography?
A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts.
Which log file or folder should be reviewed?
Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?
Which technique allows a cybercriminal to hide information?
Which rule is used for conducting electronic surveillance?
A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.
How should the examiner proceed when obtaining the requested digital evidence?
Which information is included in an email header?
Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?