CSCI 511 Final

CSCI 511 Final Liberty University

  1. The file allocation table is really a list of entries that map to each on the disk partition.
  2. The unused space between the logical end of file and the physical end of file is known as .
  3. What is meant by home location register (HLR)?
  4. is the process whereby the file system keeps a record of what file transactions take place so that in the event of a hard drive crash, the files can be recovered.
  5. The standard of proof in a civil trial is:
  6. The following are characteristics of the certification: Only lawenforcement personnel and government employees working as system forensics examiners may join. Students learn to interpret and trace e-mail, acquire evidence properly, identify operating systems, recover data, and understand encryption theory and other topics. Students must pass a written exam before continuing to the next level. There are multiple levels.
  7. One of the first steps in any forensic examination should be to check the logs. If you need to know what documents have been printed from the Macintosh, the
  8. folder can give you that information.
  9. The , which is imprinted on the SIM card, can be used by the service provider operator to trace the SIM card back to the number that it was assigned to.
  10. What name is given to analysis involving using the native operating system, on the evidence disk or a forensic duplicate, to peruse the data?
  11. Digital cameras contain a wealth of metadata in:
  12. Certain exceptions may justify the search of a computer without a warrant, including .
  13. There are five ways to document the crime scene:
  14. The attack hijacks a TCP connection between a client and a server.
  15. There are four layers to iOS. The layer is how applications interact with the iOS.
  16. Which of the following common e-mail header fields is commonly used with values “bulk,” “junk,” or “list”; or used to indicate that automated “vacation” or “out of office” responses should not be returned for the mail?
  17. is essentially data about the data. In the case of files, it can include creation time/date, size, last modified date, and even file header information.
  18. What is meant by steganalysis?
  19. The required states to implement a sex offender registry.involve written questions that are provided to a witness.
  20. When filing a , the attorney seeks a pretrial ruling on the admissibility of evidence.
  21. To establish the competency of a technical or expert witness to participate in a trial, a thorough examination of that person’s background and credentials is required. This occurs through a process known as .
  22. In which DoS attack does the attacker send fragments of packets with bad values
  23. The states that forensic tools, techniques, procedures and evidence are admissible in court only if they have a “general acceptance” within the scientific community.
  24. Because the requires that scientific evidence presented in court be generally accepted in the relevant scientific field, new techniques need to be verified before being used in court.
  25. Maintaining is a problem with live system forensics in which data is not acquired at a unified moment.
  26. The TCP header has synchronization bits that are used to establish and terminate communications between both communicating parties. The bit acknowledges the attempt to synchronize communications.
  27. occurs when a SIM card’s identifying information is copied to a different SIM card. That card can then be used in a new phone but will operate as if it were the original phone.
  28. The National Institute of Standards and Technology (NIST) guidelines list four different states a mobile device can be in when you extract data. Devices are in the state when received from the manufacturer.
  29. The standard for wireless communication of high-speed data for mobile devices is what is commonly called 4G.
  30. The subscriber identity module (SIM) is a memory chip that stores the .
  31. is the process by which investigators preserve the crime scene and evidence throughout the life cycle of a case.
  32. The is the continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered.
  33. The is a federal wiretap law for traditional wired telephony that was expanded to include wireless, voice over packet, and other forms of electronic communications, including signaling traffic and metadata.
  34. Which Linux shell command lists all currently running processes that the user has started (any program or daemon is a process)?has a source and destination port number, but it lacks a sequence number and synchronization bits.
  35. What term is used to describe statements that govern whether, when, how, and why proof of a legal case can be placed before a judge or jury?
  36. Eyewitness testimony is an example of:
  37. A port is a number that identifies a channel in which communication can occur. There are certain ports a forensic analyst should know on sight. Which port uses DNS to translate uniform resource locators into Web addresses and possibly retrieve other information about the system that matches the URL?
  38. provide a narrative of what happened at the crime scene and how the investigation of the scene was conducted.
  39. is a type of scam in which the offender creates a Web site that looks identical to an authentic Web site. However, the mirror Web site carries a malicious payload.
  40. Electronic evidence must be extracted first from a CD before the investigator dusts it for fingerprints so as not to damage it.
  41. A common portscan is the FIN scan, wherein a packet is sent with the FIN flag turned on. If the port is open, this generates an error message. Because there was no prior communication, an error is generated telling the hacker that this port is open and in use.
  42. When a file is deleted on the iPhone, iPad, or iPod, it is actually moved to the
  43. .Trashes\501 folder so the data is still there until it is overwritten, which means recently deleted files can be retrieved.
  44. Real evidence means physical objects that can be touched, held, or directly observed, such as a laptop with a suspect’s fingerprints on it, or a handwritten note.
  45. The Fourth Amendment applies to searches conducted by private individuals, businesses, and nongovernmental agencies.
  46. A victim of a criminal act can sue the perpetrator for damages in civil court.
  47. An individual cannot be compelled by authorities to reveal passwords to
  48. Spaces can be left in bound notebooks to go back and make any additions to previous entries.
  49. What is the first thing a forensic investigator should do in mobile phone investigations?
  50. What are the advantages to using external computer forensics investigators in corporate cases?
Continue reading CRIS 605 Quiz Final

CRIS 605 Quiz Final

Price: $4.00

CRIS 605 Quiz Final Once a woman decides to leave the battering relationship, comes to an abuse shelter, and regains some psychological equilibrium, the crisis worker’s first job is to provide immediate practical advice on such issues as finding a place to live, child care, financial aid, etc. When women finally decide to end the…

Purchase
Continue reading WRSP 101 Quiz 4

WRSP 101 Quiz 4

Price: $4.00

WRSP 101 Quiz 4 WRSP 101 Quiz Discipleship Principles for Worship All of the following are benets of sustaining a choir ministry as part a church’s worship team, EXCEPT: Every Christian has a vocational calling to serve as a leader of worship. As worship leaders who strive to connect people to God through music we…

Purchase
Continue reading WRSP 101 Quiz 3

WRSP 101 Quiz 3

Price: $4.00

WRSP 101 Quiz 3 WRSP 101 Quiz History of Worship The Pre-Reformation clergyman best known for his belief that the Bible should be available to all people and in a language they could understand, not just Latin, was: “The Lord Is My Banner” is: The Roman Catholic clergy (prior to the Reformation) saw all congregants…

Purchase
Continue reading WRSP 101 Quiz 2

WRSP 101 Quiz 2

Price: $4.00

WRSP 101 Quiz 2 WRSP 101 Quiz Old and New Testament Worship The five books of psalms were written to correspond with: Which is not one of the lessons learned from Jehoshaphat’s war strategy? __________ led in the worship of the Israelites after God delivered them from captivity in Egypt. Out of the 38,000 members…

Purchase
Continue reading WRSP 101 Quiz 1

WRSP 101 Quiz 1

Price: $4.00

WRSP 101 Quiz 1 WRSP 101 Quiz Foundational Studies of Worship To experience honest worship that is dynamic and delightful, I must . . . The text notes a key passage of Scripture instructing us to worship God in the beauty of ______________. The short definition of the word, “worship” is . . . God…

Purchase
Continue reading EDUC 787 Powerpoint Assignment

EDUC 787 Powerpoint Assignment

Price: $3.99

EDUC 787 Reflective PowerPoint Presentation Assignment The candidate will create a PowerPoint presentation exploring one of the course topics more in depth. Additionally, the candidate must type a script to align with the PowerPoint for a 30-minute presentation incorporating relevant sources. $3.99 – Purchase Checkout Added to cart You May Also Like EDUC 787 Media Analysis Assignment…

Purchase