1.
It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?
2.
With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.
3.
When examining the log files from a Windows IIS Web Server, how often is a new log file created?
4.
Which part of the Windows Registry contains the user's password file?
5.
An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data because CDs and DVDs are ______________ media used to store large amounts of data and are not affected by the magnet.
6.
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
7.
What does the acronym POST mean as it relates to a PC?
8.
Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?
9.
You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case?
10.
The MD5 program is used to: