An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.
Which protocol is used to send the email message?
A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.
Which hidden folder will contain the digital evidence?
After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.
Which digital evidence should be collected?
Which type of storage format should be transported in a special bag to reduce electrostatic interference?
Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?
Which law includes a provision permitting the wiretapping of VoIP calls?
Which universal principle must be observed when handling digital evidence?
What is a reason to use steganography?
Which method is used to implement steganography through pictures?
What is one purpose of steganography?
A forensic investigator is acquiring evidence from an iPhone.
What should the investigator ensure before the iPhone is connected to the computer?
Which file system is supported by Mac?
A forensic scientist is examining a computer for possible evidence of a cybercrime.
Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?
How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?
Which Windows 7 operating system log stores events collected from remote computers?
Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?
What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?
Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.
What is the carrier in this example?
Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?
Which storage format is a magnetic drive?
A forensic investigator needs to know which file type to look for in order to find emails from a specific client.
Which file extension is used by Eudora?
On which file does the Windows operating system store hashed passwords?
A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.
What is vacationdetails.doc called, in steganographic terms?