Package deal
ITN 276 Tests Bundle Set
ITN 276 Tests Bundle Set
[Show more]ITN 276 Tests Bundle Set
[Show more]Preview 3 out of 19 pages
Add to cartITN 276 Final questions with correct answers
What is meant by chain of custody? 
 
Information that helps explain other evidence. An example is a chart that explains a technical concept to the judge and jury. 
 
The use of analytical and investigative techniques to identify, collect, examine, and preserve computer-based material for presentati...
Preview 2 out of 12 pages
Add to cartWhat is meant by chain of custody? 
 
Information that helps explain other evidence. An example is a chart that explains a technical concept to the judge and jury. 
 
The use of analytical and investigative techniques to identify, collect, examine, and preserve computer-based material for presentati...
Disk Forensics Answer What term is used to describe the process of acquiring and analyzing information stored on physical storage media, such as computer hard drives or smartphones? 
 
chain of custody Answer The __________is the continuity of control of evidence that makes it possible to account fo...
Preview 2 out of 5 pages
Add to cartDisk Forensics Answer What term is used to describe the process of acquiring and analyzing information stored on physical storage media, such as computer hard drives or smartphones? 
 
chain of custody Answer The __________is the continuity of control of evidence that makes it possible to account fo...
What term is used to describe information that forensic specialists use to support or interpret real or documentary evidence; for example, to demonstrate that the fingerprints found on a keyboard are those of a specific individual Answer testimonial evidence 
 
Before you can do any forensic analysi...
Preview 2 out of 5 pages
Add to cartWhat term is used to describe information that forensic specialists use to support or interpret real or documentary evidence; for example, to demonstrate that the fingerprints found on a keyboard are those of a specific individual Answer testimonial evidence 
 
Before you can do any forensic analysi...
ITN 276 Final Crunch questions with correct answers
Preview 2 out of 12 pages
Add to cartITN 276 Final Crunch questions with correct answers
What name is given to any use of another person's identity? 
-Fraud 
-Cyberstalking 
-Identity Theft 
-Logic Bomb Answer Identity theft 
 
The use of electronic communications to harass or threaten another person is the definition of __________. 
-logic bomb 
-rainbow table 
-cyberstalking 
-denial...
Preview 3 out of 26 pages
Add to cartWhat name is given to any use of another person's identity? 
-Fraud 
-Cyberstalking 
-Identity Theft 
-Logic Bomb Answer Identity theft 
 
The use of electronic communications to harass or threaten another person is the definition of __________. 
-logic bomb 
-rainbow table 
-cyberstalking 
-denial...
The release of __________, was meant to be more in synch with the style of other Apple systems, such as iOS and WatchOS. Answer Mac OS X 10.7 in 2011, called Lion 
 
The release of _____________, had over 300 new features, support for Intel x86 chips, and support for the new G3 processor. Answer Mac...
Preview 2 out of 9 pages
Add to cartThe release of __________, was meant to be more in synch with the style of other Apple systems, such as iOS and WatchOS. Answer Mac OS X 10.7 in 2011, called Lion 
 
The release of _____________, had over 300 new features, support for Intel x86 chips, and support for the new G3 processor. Answer Mac...
creating and deleting files in various file systems, AnswerFAT: when a file is deleted it isn't actually removed from the drive. The FAT is just updated to reflect that those clusters are no longer in use. if new info is saved it can now overwrite info in these clusters. ---------NTFS: similar to F...
Preview 2 out of 6 pages
Add to cartcreating and deleting files in various file systems, AnswerFAT: when a file is deleted it isn't actually removed from the drive. The FAT is just updated to reflect that those clusters are no longer in use. if new info is saved it can now overwrite info in these clusters. ---------NTFS: similar to F...
__________is the process of analyzing a file or files for hidden content. 
 
Steganalysis 
Asymmetric cryptography 
Symmetric cryptography 
Steganophony Answer steganalysis 
 
Hard drives that run __________ address blocks, or integer multiples of blocks, at a time. 
 
Unix 
Windows 
MacOS 
Linux An...
Preview 2 out of 7 pages
Add to cart__________is the process of analyzing a file or files for hidden content. 
 
Steganalysis 
Asymmetric cryptography 
Symmetric cryptography 
Steganophony Answer steganalysis 
 
Hard drives that run __________ address blocks, or integer multiples of blocks, at a time. 
 
Unix 
Windows 
MacOS 
Linux An...
various file systems and their characteristics Answer NTFS, a Preferred file system for Windows (2000 and newer); Contains MFT and Bitmap. 
FAT, limited space, FAT32 can allow file up to 4GB, usually in USB flash drive 
 
creating and deleting files in various file systems Answer FAT: when a file is...
Preview 2 out of 8 pages
Add to cartvarious file systems and their characteristics Answer NTFS, a Preferred file system for Windows (2000 and newer); Contains MFT and Bitmap. 
FAT, limited space, FAT32 can allow file up to 4GB, usually in USB flash drive 
 
creating and deleting files in various file systems Answer FAT: when a file is...
A Sector is the basic unit of data storage on a hard disk, which is usually 64 kb 
True or false Answer false 
 
a suspect stores data where an investigator is unlikely to find it. what is this technique called 
Data transformation Answer Data Hiding 
 
a warrant is not needed when evidence is in pl...
Preview 3 out of 30 pages
Add to cartA Sector is the basic unit of data storage on a hard disk, which is usually 64 kb 
True or false Answer false 
 
a suspect stores data where an investigator is unlikely to find it. what is this technique called 
Data transformation Answer Data Hiding 
 
a warrant is not needed when evidence is in pl...
Bit-level information Answer Basically, __________ is information at the level of actual 1s and 0s stored in memory or on the storage device, as opposed to going through the file system's interpretation 
 
Prepare Answer A system forensics specialist has three basic tasks related to handling eviden...
Preview 1 out of 4 pages
Add to cartBit-level information Answer Basically, __________ is information at the level of actual 1s and 0s stored in memory or on the storage device, as opposed to going through the file system's interpretation 
 
Prepare Answer A system forensics specialist has three basic tasks related to handling eviden...
The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected based on the letters of a keyword. 
 
Vigenère 
ROT13 
Atbash 
Scytale Answer Vigenère 
 
A cybercriminal wants to deliver steganized files to covert customers on a third-...
Preview 2 out of 14 pages
Add to cartThe __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected based on the letters of a keyword. 
 
Vigenère 
ROT13 
Atbash 
Scytale Answer Vigenère 
 
A cybercriminal wants to deliver steganized files to covert customers on a third-...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller cracker. Stuvia facilitates payment to the seller.
No, you only buy this summary for R652,98. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
83750 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy summaries for 14 years now