To be a successful computer forensics investigator, you must be familiar with more than one computing platform.
Question 2 options:
True | |
False |
When we delete a file in EXT2, the file system returns the iNode to the free iNode list in the superblock without cleaning its content.
Question 3 options:
True | |
False |
Question 4 (10 points)
The Master File Table (MFT) is the heart of NTFS because it contains the information about all files and directories.
Question 4 options:
True | |
False |
Question 5 (10 points)
A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?
Question 5 options:
Disk restoration | |
Disaster recovery | |
Digital forensics | |
Data recovery |
Question 6 (10 points)
What are records in the MFT called?
Question 6 options:
Hyperdata | |
Metadata | |
Inodedata | |
Infodata |
Question 7 (10 points)
The command ls -a in Linux displays
Question 7 options:
the network interfaces | |
the local time | |
the modification time of the files inside a directory | |
the list of the files in a directory including the hidden files |
Question 8 (10 points)
Internet Abuse is a type of private investigation that happens when an employee sends threat emails using the company’s platform.
Question 8 options:
True | |
False |
Question 9 (10 points)
What contains instructions for the OS for hardware devices, such as the keyboard, mouse, and video card?
Question 9 options:
Device drivers | |
Hal.dll | |
Ntoskrnl.exe | |
Pagefile.sys |
Which acronym refers to the file system that was introduced when Microsoft created Windows NT and that remains the main file system in Windows 10?
Question 10 options:
FAT32 | |
VFAT | |
NTFS | |
HPFS |