To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

Question 2 options:

True
False

 

 

 

Listen

When we delete a file in EXT2, the file system returns the iNode to the free iNode list in the superblock without cleaning its content.

Question 3 options:

True
False

 

 

 

 

Question 4 (10 points)

 

Listen

The Master File Table (MFT) is the heart of NTFS because it contains the information about all files and directories.

Question 4 options:

True
False

 

Question 5 (10 points)

 

Listen

A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?

Question 5 options:

Disk restoration
Disaster recovery
Digital forensics
Data recovery

 

Question 6 (10 points)

 

Listen

What are records in the MFT called?

Question 6 options:

Hyperdata
Metadata
Inodedata
Infodata

 

Question 7 (10 points)

 

Listen

The command ls -a in Linux displays

Question 7 options:

the network interfaces
the local time
the modification time of the files inside a directory
the list of the files in a directory including the hidden files

 

 

Question 8 (10 points)

 

Listen

Internet Abuse is a type of private investigation that happens when an employee sends threat emails using the company’s platform.

Question 8 options:

True
False

 

 

Question 9 (10 points)

 

Listen

What contains instructions for the OS for hardware devices, such as the keyboard, mouse, and video card?

Question 9 options:

Device drivers
Hal.dll
Ntoskrnl.exe
Pagefile.sys

 

 

Which acronym refers to the file system that was introduced when Microsoft created Windows NT and that remains the main file system in Windows 10?

Question 10 options:

FAT32
VFAT
NTFS
HPFS