Chapter 6


  1. What set of rules and conventions governs how computers exchange information over the network medium?

    Answer: Protocol

  2. Name some factors that motivate criminal activity.

    Answer: Anger or revenge , financial gain, sexual impulses, and psychiatric illness

  3. As a Word document is written and changed, these changes are tracked and produce a type of evidence that is called what?

    Answer: Metadata

  4. What types of file should arouse your suspicion when you are examining data?

    Answer: Files with strange locations, strange names , or dots; files that start with a period ( . ) and contain spaces; and files that have changed recently

  5. Why should you look at the header of an e-mail?

    Answer: The e-mail header shows the path the message took from the very first communication point until it reached the recipient.

  6. What is steganography?

    Answer: A method of hiding data that encrypts the original plaintext information into a digital image

  7. What method can you use to determine if the extension of a file has been changed to avoid suspicion?

    Answer: Signature analysis

  8. If you are investigating a case that involves the Internet and pictures, what three areas could reveal the Inter- net habits of the suspect?

    Answer: Temporary Internet Files folder, History folder, and the Cookies folder

  9. What is a dual-boot system?

    Answer: It is a system that can boot to more than one operating system. In essence, one operating system is hidden from the other.

  10. Name three types of trace evidence.

    Answer: Slack space, swap file, metadata




Computer Forensics JumpStart
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net