Question 101

Which is a standard procedure to perform during all computer forensics investigations?
  • Question 102

    Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?
  • Question 103

    Which of the following tool enables data acquisition and duplication?
  • Question 104

    Rusty, a computer forensics apprentice, uses the command nbtstat -c while analyzing the network information in a suspect system. What information is he looking for?
  • Question 105

    Which of the following tools is not a data acquisition hardware tool?