Question 101
Which is a standard procedure to perform during all computer forensics investigations?
Question 102
Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?
Question 103
Which of the following tool enables data acquisition and duplication?
Question 104
Rusty, a computer forensics apprentice, uses the command nbtstat -c while analyzing the network information in a suspect system. What information is he looking for?
Question 105
Which of the following tools is not a data acquisition hardware tool?
