Q: 11
Consistency in the investigative report is more important than the exact format in the report to
eliminate uncertainty and confusion.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
When collecting evidence from the RAM, where do you look for data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
SIM is a removable component that contains essential information about the subscriber. It has both
volatile and non-volatile memory. The file system of a SIM resides in _____________ memory.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the
millisecond of computer clock times in a network of computers. Which of the following statement is
true for NTP Stratum Levels?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
What is static executable file analysis?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Which of the following approaches checks and compares all the fields systematically and
intentionally for positive and negative correlation with each other to determine the correlation
across one or multiple fields?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
What is a bit-stream copy?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
A computer forensic report is a report which provides detailed information on the complete forensics
investigation process.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
System software password cracking is defined as cracking the operating system and all other utilities
that enable a computer to function
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2