Follow this link to get this tutorial:
Contact us at:
Chain of custody is also known as chain of evidence. (T/F)
Employees surfing the Internet can cost companies millions of dollars. (T/F)
You cannot use both multi-evidence and single-evidence forms in your investigation. (T/F)
Many attorneys like to have printouts of the data you have recovered, but printouts can present problems when you have log files with several thousand pages of data. (T/F)
A bit-stream copy is a bit-by-bit duplicate of the original disk. You should use the original disk whenever possible. (T/F)
The ____ is the route the evidence takes from the time you find it until the case is closed or goes to court.
The basic plan for your investigation includes gathering the evidence, establishing the ____, and performing the forensic analysis.
A(n) ____ helps you document what has and has not been done with both the original evidence and forensic copies of the evidence.
Use ____ to secure and catalog the evidence contained in large computer components.
____ prevents damage to the evidence as you transport it to your secure evidence locker, evidence room, or computer lab.
____ investigations typically include spam, inappropriate and offensive message content, and harassment or threats.
To conduct your investigation and analysis, you must have a specially configured computer known as a ____.
You can use ____ to boot to Windows without writing any data to the evidence disk.
To begin conducting an investigation, you start by ____ the evidence using a variety of methods.
A ____ is a bit-by-bit copy of the original storage medium.
A bit-stream image is also known as a(n) ____.
To create an exact image of an evidence disk, copying the ____ to a target work disk that’s identical to the evidence disk is preferable.
When analyzing digital evidence, your job is to ____.
____ can be the most time-consuming task,...