To generate an MD5 hash value for a file, EnCase:
Answer : A
The FAT in the File Allocation Table file system keeps track of:
Answer : D
In DOS and Windows, how many bytes are in one FAT directory entry?
Answer : C
You are conducting an investigation and have encountered a computer that is running in the field. The operating system is Windows XP. A software program is currently running and is visible on the screen. You should:
Answer : A
Within EnCase, what is the purpose of the temp folder?
Answer : C
The spool files that are created during a print job are __________ after the print job is completed.
Answer : C
If cases are worked on a lab drive in a secure room, without any cleaning of the contents of the drive, which of the following areas would be of most concern?
Answer : A
The EnCase case file can be best described as:
Answer : C
The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. [^a-z]Tom[^a-z]
Answer : C
You are assigned to assist with the search and seizure of several computers. The magistrate ordered that the computers cannot be seized unless they are found to contain any one of ten previously identified images. You currently have the ten images in JPG format. Using the EnCase methodology, how would you best handle this situation?
Answer : D
A hash library would most accurately be described as:
Answer : A
The MD5 hash algorithm produces a _____ number.
Answer : C
Which of the following items could contain digital evidence?
Answer : A,B,C,D
How does EnCase verify that the case information (Case Number, Evidence Number,
Investigator Name, etc) in an evidence file has not been damaged or changed, after the evidence file has been written?
Answer : C
A signature analysis has been run on a case. The result !Bad Signature means:
Answer : C
Have any questions or issues ? Please dont hesitate to contact us