digital forensics (2022)

This class was created by Brainscape user The Pug Party. Visit their profile to learn more about the creator.

Decks in this class (18)

Pre-Course Assessment Quiz
In general a criminal case follow...,
Software forensics tools are comm...,
With ____ macintosh moved to the ...
10  cards
Module 1 Quiz
What do you call a list of people...,
Why should you do a standard risk...,
The triad of computing security i...
21  cards
Module 2 Quiz
What term refers to labs construc...,
Digital forensics facilities alwa...,
Focustypically a n ________ lab h...
18  cards
Module 3 Quiz
Which forensics tools can connect...,
What does a sparse acquisition co...,
Why is it a good practice to make...
21  cards
Module 4 Quiz
You should always answer question...,
If a suspect s computer is found ...,
What are the three rules for a fo...
19  cards
Module 5 Quiz
Zone bit recording is how disk ma...,
File and directory names are some...,
What happens when you copy an enc...
22  cards
Module 6 Quiz
Hash values are used for which of...,
The primary hashing algorithm the...,
Building a forensic workstation i...
19  cards
Module 7 Quiz
Which of the following is the mai...,
Which of the following certifies ...,
In linux which of the following i...
17  cards
Module 8 Quiz
When you carve a graphics file re...,
Bitmap bmp files use which of the...,
What type of compression uses an ...
19  cards
Module 9 Quiz
If an application uses salting wh...,
Rainbow tables serve what purpose...,
Suppose you re investigating an e...
17  cards
Module 10 Quiz
Which of the following is a clue ...,
A forensic image of a vm includes...,
A layered network defense strateg...
14  cards
Module 11 Quiz
Which of the following types of f...,
After examining e mail headers to...,
What information is not in an e m...
20  cards
Module 12 quiz
Which of the following relies on ...,
Typically you need a search warra...,
When acquiring a mobile device at...
19  cards
Module 13 Quiz
The multitenancy nature of cloud ...,
A n csa or cloud service agreemen...,
What capabilities should a forens...
18  cards
Module 14 Quiz
Being able to incorporate the log...,
Figures not used in the body of t...,
Which of the following is an exam...
12  cards
Module 15 Quiz
Testimony preservation and discov...,
What should you do if you realize...,
Which of the following describes ...
17  cards
Module 16 Quiz
The type of information conveyed ...,
Contingency fees can be used to c...,
What purpose does making your own...
16  cards
Post-Course Assessment Quiz
Intel ____ has responded to the n...,
The ____ tool can be used to bypa...,
Confidential business data includ...
20  cards

More about
digital forensics (2022)

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study The Pug Party's Digital Forensics (2022) flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

IMT4114 Digital Forensics
  • 14 decks
  • 82 flashcards
  • 12 learners
Decks: Digital Forensics Phases 2, Legal Context 3, Computer Forensics 4 By Jeff, And more!
Digital Management
  • 21 decks
  • 296 flashcards
  • 2 learners
Decks: Einfuhrung In Die Digitale Wirtschaft Di, Einfuhrung In Die Digitale Wirtschaft Ma, Einfuhrung In Die Digitale Wirtschaft Di, And more!
Forense☠️
  • 10 decks
  • 606 flashcards
  • 8 learners
Decks: Segundo Parcial Rangel, Preguntas De Violacion, Primer Parcial, And more!
Make Flashcards