Question: An example of volatile data is __________. a) a hash b) a word processing file c) state of network connections d) steganized files What are
An example of volatile data is __________.
|
| a) a hash | |
|
| b) a word processing file | |
|
| c) state of network connections | |
|
| d) steganized files |
What are attributes of a solid-state drive (SSD)?
|
| a) Microchips and magnetic storage | |
|
| b) Tape storage and a read-only mode switch | |
|
| c) Reflective pits and flash memory | |
|
| d) Flash memory and microchips |
Which of the following is NOT true of chain of custody forms?
|
| a) You typically need to use a separate chain of custody form for each drive you have removed from a suspect computer. | |
|
| b) A chain of custody form is a federal form and is therefore universal. | |
|
| c) A chain of custody form typically requires a signature. | |
|
| d) Some forensic examiners use both an evidence form and a separate chain of custody form. |
What kind of data changes rapidly and may be lost when the machine that holds it is powered down?
|
| a) A hash | |
|
| b) Persistent data | |
|
| c) Non-volatile data | |
|
| d) Volatile data |
What term describes analysis performed on an evidence disk or a forensic duplicate using the native operating system?
|
| a) Steganalysis | |
|
| b) Physical analysis | |
|
| c) Network analysis | |
|
| d) Logical analysis |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
