Which operating system (OS) uses the NTFS (New Technology File System) file operating system?
Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.
What is the carrier in this example?
Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?
The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.
Which digital evidence should a forensic investigator collect to investigate this incident?
A forensic investigator needs to know which file type to look for in order to find emails from a specific client.
Which file extension is used by Eudora?
A forensic scientist arrives at a crime scene to begin collecting evidence.
What is the first thing the forensic scientist should do?
Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?
A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.
How should the detective legally gain access to the computer?
A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.
Which evidence should be obtained from the storage media to identify which files were modified?
Which file stores local Windows passwords in the Windows\System32\ directory and is subject to being cracked by using a live CD?
Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?
Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?
A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.
What is vacationdetails.doc called, in steganographic terms?
Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.
Which type of cybercrime has been perpetrated against Susan?
Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?