QUESTION 6 1. Hash analysis can be used to (choose all that apply): O Determine file types. Exclude files. Identify files. Verify the integrity of evidence. I Crack complex passwords.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
QUESTION 6
1. Hash analysis can be used to (choose all that apply):
Determine file types.
Exclude files.
Identify files.
Verify the integrity of evidence.
I Crack complex passwords.
QUESTION 7
1. A bottleneck that a forensic investigator may experience with their workstation is:
O RAM.
O SSD speed.
O Monitor resolution.
CPU speed.
Data transfer.
Transcribed Image Text:QUESTION 6 1. Hash analysis can be used to (choose all that apply): Determine file types. Exclude files. Identify files. Verify the integrity of evidence. I Crack complex passwords. QUESTION 7 1. A bottleneck that a forensic investigator may experience with their workstation is: O RAM. O SSD speed. O Monitor resolution. CPU speed. Data transfer.
QUESTION 8
1. Notepads in the response kit are useful for (choose all that apply):
Keeping a reminder list.
Documenting the basic facts of the scene.
Documentation of your actions on the scene.
Documenting who secured the scene.
Making sketches as required.
QUESTION 9
1. Antistatic bags are used to:
O Store fragile digital evidence.
C Store batteries from the field kit.
Keep phones from connecting to the network.
Protect USB drives.
Protect from fluid leakage
Transcribed Image Text:QUESTION 8 1. Notepads in the response kit are useful for (choose all that apply): Keeping a reminder list. Documenting the basic facts of the scene. Documentation of your actions on the scene. Documenting who secured the scene. Making sketches as required. QUESTION 9 1. Antistatic bags are used to: O Store fragile digital evidence. C Store batteries from the field kit. Keep phones from connecting to the network. Protect USB drives. Protect from fluid leakage
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and Decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education