Question: QUESTION 1 Lin installed a time - management utility that she downloaded from the Internet. Now several applications are not responding to normal commands. What

QUESTION 1
Lin installed a time-management utility that she downloaded from the Internet. Now several applications are not responding to normal commands. What type of malware did she likely encounter?
A. Virus
B. Trojan horse
C. Worm
D. Ransomware
1 points
QUESTION 2
True or False? Testimonial evidence is often the most important evidence in court because it provides relevance for other types of evidence.
True
False
1 points
QUESTION 3
True or False? Spyware does not use cookies.
True
False
1 points
QUESTION 4
Isabella is a digital forensic specialist. She wants to recover deleted data from a computer disk. The computer is currently running. Which process should she take to do so without accidentally overwriting any deleted data?
A. Because processes constantly run on computers and request new sectors to store data, it is not possible to recover deleted data without some data being overwritten
B. Copy the contents of the disk drive to an external drive without shutting down the computer
C. Shut down the computer, reboot, and then copy the contents of the disk drive to an external drive
D. Make an image of memory, shut down the computer, attach the disk drive to a forensic lab device, and read the data from the disk
1 points
QUESTION 5
True or False? The term "computer crime" typically refers to crimes that target computer resources, either data that computers store or the services they provide (or both).
True
False
1 points
QUESTION 6
True or False? Forensic labs may use both open source and commercial software for digital analysis.
True
False
1 points
QUESTION 7
True or False? Because people inside an organization generally have more detailed knowledge of the IT infrastructure than outsiders do, they can place logic bombs more easily.
True
False
1 points
QUESTION 8
True or False? Unlike viruses, worms do not require a host program to survive and replicate.
True
False
1 points
QUESTION 9
The chief executive officer (CEO) of a company recently fell victim to an attack. The attackers sent the CEO an email that appeared to come from the company's attorney. The email informed the CEO that his company was being sued and he needed to view a subpoena at a court website. When visiting the website, malicious code was downloaded onto the CEO's computer. What type of attack took place?
A. Ransomware
B. Pharming
C. Spear phishing
D. Command injection
1 points
QUESTION 10
True or False? Even if a mobile device is deemed not to be a direct part of a crime or incident, its ability to record the environment of an attacker during the incident could be material.
True
False

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!