Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Cyber_4ens_part

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
4th amendment   protects everyone's right to be secure in their person, residence, and property  
🗑
Police workstation   one computer every 250,000  
🗑
Live Acquisition   data can be changed, it also capture memory and can easily solve the problem of encrypted disk  
🗑
static acquisition   data cannot be changed  
🗑
main formats for data storage   raw, proprietary, advanced forensics  
🗑
method of data acquisition   disk to image, disk to disk, logical  
🗑
private sector investigation   don't do any further investigation until you receive court order  
🗑
windows startup task   we learn what files to access when windows starts, will help determine when the computer was last accessed  
🗑
evaluating forensics tools   validating yourself experience, NIST tools, validation protocol  
🗑
4 blocks component in Unix   boot block, super block, inode, data block  
🗑
2 linux loaders   LILO, GRUB  
🗑
how to validate data with FTK and Prodiscover   use KFF(Smartfile), Using .eve file  
🗑
main data hiding   file manipulation, encryption, disk manipulation  
🗑
graphics format type   bitmap, vector, metafile  
🗑
network forensics   systematic tracking of incoming and outgoing traffic. Ascertains how an attack was carried out or how an event occurred on a network  
🗑
how to examine e-mail headers   return path, name of the e-mail server, recipients email address, IP address of sending server, unique message #, date and time email was sent  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: ITSec_guy
Popular Computers sets