click below
click below
Normal Size Small Size show me how
Forensics - F in B
| Question | Answer |
|---|---|
| Private-sector organizations include businesses and ____________ that aren't involved in law enforcement. | government |
| If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have an _____________. | expectation of privacy |
| ____________ refers to a disk's structure of platters, tracks, and sectors. | Geometry |
| In Microsoft file structures, sectors are grouped to form ___________, which are storage allocation units of one or more sectors. | clusters |
| The Windows application cf EnCase requires a _____________ device, such as FastBloc, to prevent Windows from accessing and corrupting a suspect disk drive. | write-blocker |
| The ____________ function is the recovery task in a computing investigation and is the most challenging of all tasks to master. | extraction |
| FTK provides two options for searching for keywords: indexed search and _____________ search. | live |
| ___________ search catalogs all words on the evidence disk so that FTK can find them quickly. | Indexed |
| To generate reports with the FTK ReportWizard, first you need to ___________ files during an examination. | bookmark |
| The data-hiding technique ___________ changes data from readable code to data that looks like binary executable code. | bitshifting |