Lecture 2 (Part 3) Quiz

pdf

School

Cypress College *

*We aren’t endorsed by this school

Course

CIS-272

Subject

Computer Science

Date

Jan 9, 2024

Type

pdf

Pages

4

Uploaded by DukeWorld11631

Report
Lecture 2 (Part 3) Quiz Due Sep 13, 2023 at 11:59pm Points 100 Questions 5 Available Sep 12, 2023 at 2:15pm - Sep 13, 2023 at 11:59pm Time Limit None This quiz was locked Sep 13, 2023 at 11:59pm. Attempt History Attempt Time Score LATEST Attempt 1 41 minutes 100 out of 100 Score for this quiz: 100 out of 100 Submitted Sep 12, 2023 at 3:18pm This attempt took 41 minutes. Question 1 20 / 20 pts Which of the following statements is incorrect? An unallocated cluster is the space between the beginning of a cluster and the end of a logical file. File slack is the space between the end of a logical file and the of the cluster allocated to the file. RAM slack is the space between the end of a logical file and the end of the sector in which the endo of the logical file occurs.
Drive slack is the space between the end of RAM slack and the end of the cluster allocated to the file. Question 2 20 / 20 pts Residual data can be found in all of the following, except RAM slack Unallocated clusters Drive slack Unused space Question 3 20 / 20 pts Why is a physical copy considered to be a bad method? Bad sectors on the two physical devices are unlikely to occurr on the same sectors; therefore, MD5 or SHA1 values will not match. It uses a sector by sector copying process to ensure accuracy; however, it IS very slow. It only copy the data the operating system recognizes: therefore, it misses unallocated clusters.
Only logical volumes are copied; therefore, unused space is lost. Question 4 20 / 20 pts Why is a logical copy considered to be a bad method? It only copies data that the operating system recognizes; therefore, it misses unallocated clusters, file slack, and unused space. It is not considered a bad method. It is the preferred method. It combines file RAM slack with drive slack to make file slack. The unused space is allocated to only one logical volume. Question 5 20 / 20 pts Describe MD 5 hash analysis. Message Digest 5 is an algorithm that generates a 128-bit digital signature, kKnown as a hash value, that is used to compare two data items. MD5 is a 128-bit algorithm that creates a hash value that is used to compare the data on a suspect's physical storage device against a bit- atream image. It is the court-validated hash analysis used to compare a suspect's original evidence to a forensics image.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
It is an algorithm that generates a 160-bit digital fingerprint that is used to compare data. Quiz Score: 100 out of 100