Question 31

Which of the following statements is not a part of securing and evaluating electronic crime scene checklist?
  • Question 32

    As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?
  • Question 33

    Which of the following statements is incorrect when preserving digital evidence?
  • Question 34

    You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printed out 27 email messages from the suspect and gives the printouts to you.
    You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.
  • Question 35

    A law enforcement officer may only search for and seize criminal evidence with
    _______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searched.