What set of rules and conventions governs how computers exchange information over the network medium?
Answer: Protocol
Name some factors that motivate criminal activity.
Answer: Anger or revenge , financial gain, sexual impulses, and psychiatric illness
As a Word document is written and changed, these changes are tracked and produce a type of evidence that is called what?
Answer: Metadata
What types of file should arouse your suspicion when you are examining data?
Answer: Files with strange locations, strange names , or dots; files that start with a period ( . ) and contain spaces; and files that have changed recently
Why should you look at the header of an e-mail?
Answer: The e-mail header shows the path the message took from the very first communication point until it reached the recipient.
What is steganography?
Answer: A method of hiding data that encrypts the original plaintext information into a digital image
What method can you use to determine if the extension of a file has been changed to avoid suspicion?
Answer: Signature analysis
If you are investigating a case that involves the Internet and pictures, what three areas could reveal the Inter- net habits of the suspect?
Answer: Temporary Internet Files folder, History folder, and the Cookies folder
What is a dual-boot system?
Answer: It is a system that can boot to more than one operating system. In essence, one operating system is hidden from the other.
Name three types of trace evidence.
Answer: Slack space, swap file, metadata