Question: Only need Solutions! 0 1 If a SIM card is found in the phone, it should be removed, imaged, and cloned. The cloned SIM card
Only need Solutions!
If a SIM card is found in the phone, it should be removed, imaged, and cloned. The cloned SIM card can be placed in the phone if needed.
A True
B False
Why should you remove the power directly from the back of the computer?
A You shouldnt be sure to remove the power from the wall.
B Removing the power cord at the wall may shock you
C There may be a UPS between the wall and the computer
D It is just easier
Because of the th Amendment, a Law Enforcement Officer cannot ask for the passwordpasscode to a device.
A True
B False
When examining a digital device, one way an investigator can gain credibilty in the courtroom is to
A repeat the results to both the judge and the jury
B use a commercial tool, not a free one
C swear that the results are correct
D use more than one tool to substantiate their findings
When should you collect the system time from BIOS?
A Collect the system time first from the OS then compare it to the BIOS time
B Only after all storage media HDDs floppy disks, flash drives, optical media has been removed
C Boot to BIOS as soon as possible to record the information before you remove the HDD which may change it
D Use a CLI command using the OS to show the BIOS information
What would your computer display as the capacity decimal places of a hard drive with the following information:
cylinders, heads, spt
What capacity would a manufacturer put on the label of a hard drive with the following information:
cylinders, heads, spt
What would your computer display as the capacity decimal places of a hard drive with the following information:
LBA :
What would a manufacturer put on the label of a hard drive with the following information:
LBA :
What is a formal document prepared by a forensics specialist to document an investigation, including a list of all tests conducted?
A Curriculum vitae CV
B Expert witness
C Rules of evidence
D Expert report
In a forensics lab, the machines being examined should not be connected to the Internet.
A True
B False
An should include all the tools you can afford to take to the field.
A extensiveresponse field kit
B forensic lab
C initialresponse field kit
D forensic workstation
The publishes articles, provides tools, and creates procedures for testing and validating computer forensics software.
A FSTST
B NSRL
C CFTT
D NIST
Law enforcement investigators need an to remove computers from a crime scene and transport them to a lab.
A FOIA form
B evidence custody form
C affidavit
D warrant
can be software or hardware and are used to protect evidence disks by preventing data from being written to them.
A Writeblockers
B Workstations
C Driveimaging
D Disk editors
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
