Question 31
Which of the following statements is not a part of securing and evaluating electronic crime scene checklist?
Question 32
As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?
Question 33
Which of the following statements is incorrect when preserving digital evidence?
Question 34
You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printed out 27 email messages from the suspect and gives the printouts to you.
You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.
You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.
Question 35
A law enforcement officer may only search for and seize criminal evidence with
_______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searched.
_______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searched.
