Question: 1._______ is the most commonly used hashing algorithm. 2. What Linux command can be used to create a hash? A. SHA B. MD5 C. MD5sum

1._______ is the most commonly used hashing algorithm.

2. What Linux command can be used to create a hash?

A. SHA

B. MD5

C. MD5sum

D. Sha3sum

3. What Linux command can be used to wipe a target drive?

A. Del

B. Delete

C. nc

D. dd

4. RAID 4 should be acquired as individual disks.

A. True

B. False

5. Which of the following drives would be least susceptible to damage when dropped?

A. SCSI

B. SSD

C. IDE

D. SATA

6. It is acceptable, when you have evidence in a vehicle, to stop for a meal, if the vehicle is locked.

A. True

B. False

7. Which file might contain data that was live in memory and not stored on the hard drive?

8. You need to image a server that is set up with RAID 5. How would you approach this?

A. Image each disk separately.

B. It cannot be done; you have to do live forensics.

C. It can be done only with special RAID imaging software.

D. Image the entire array as a single disk.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!