DOWNLOAD
CCJS421 – Quiz
1. Match each of the following terms with the picture it best matches (use each term and
picture only once):
a. Thumb drive
b. Hard disk drive
c. Workstation
d. Server
e. Mobile device
f.
Small Computer System Interface (SCSI)
g. Serial attached SCSI
h. Serial ATA (SATA) (Type A)
i.
External SATA (eSATA)
j.
Universal Serial Bus (USB)
k. Firewire 400
l.
Firewire 800
m. Zero insertion force (ZIF)
_______J______
__E______
_______F____
_______A_______
_____C________
______G_______
___K_________
_______i______
_______H_____
_____L_______
_______B____
__M__________
2. Match the following terms with its associated definition:
a. Forensic soundness (or forensically sound)
b. Malware
c. Hash value
d. Forensic suite
e. Tool belt approach
f.
Evidence custody (or property custody) document
g. Verification
h. Bit-stream copy (or forensic image)
______D_____
i.
Repeatability
__B___ A general term used to describe a program or piece of code that is general harmful to
the normal use or operation of a computer system.
___D__ The general phrase used to describe collections of digital forensic tools or single tools
that enable multiple analyses of digital evidence; examples include Guidance Software’s
EnCase Forensic and Technology Pathway’s ProDiscover Basic.
____H_ A bit-by-bit duplicate of data on the original or source medium, created via a process
called “acquisition” or “imaging.
CCJS421 – Quiz
1. Match each of the following terms with the picture it best matches (use each term and
picture only once):
a. Thumb drive
b. Hard disk drive
c. Workstation
d. Server
e. Mobile device
f.
Small Computer System Interface (SCSI)
g. Serial attached SCSI
h. Serial ATA (SATA) (Type A)
i.
External SATA (eSATA)
j.
Universal Serial Bus (USB)
k. Firewire 400
l.
Firewire 800
m. Zero insertion force (ZIF)
_______J______
__E______
_______F____
_______A_______
_____C________
______G_______
___K_________
_______i______
_______H_____
_____L_______
_______B____
__M__________
2. Match the following terms with its associated definition:
a. Forensic soundness (or forensically sound)
b. Malware
c. Hash value
d. Forensic suite
e. Tool belt approach
f.
Evidence custody (or property custody) document
g. Verification
h. Bit-stream copy (or forensic image)
______D_____
i.
Repeatability
__B___ A general term used to describe a program or piece of code that is general harmful to
the normal use or operation of a computer system.
___D__ The general phrase used to describe collections of digital forensic tools or single tools
that enable multiple analyses of digital evidence; examples include Guidance Software’s
EnCase Forensic and Technology Pathway’s ProDiscover Basic.
____H_ A bit-by-bit duplicate of data on the original or source medium, created via a process
called “acquisition” or “imaging.
Комментариев нет:
Отправить комментарий