Answers
_______ would not be found in an initial-response field kit.
Answers:
a.
Leather gloves and disposable latex gloves
b.
Computer evidence bags (antistatic bags)
c.
External USB devices or a portable hard drive
d.
A digital camera with extra batteries or 35mm camera with film and flash - ANS Answers: a.
Leather gloves and disposable latex gloves
In what mode do most write-blockers run?
Pg. 1 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.
,Answers:
a.
RW mode
b.
GUI mode
c.
Shell mode
d.
BIOS mode - ANS c.
Shell mode
What third party encryption tool creates a virtual encrypted volume, which is a file mounted as
though it were a disk drive?
a.
TrueCrypt
b.
PGP Full Disk Encryption
c.
Voltage SecureFile
Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.
, d.
BestCrypt - ANS Answers: a.
TrueCrypt
What is the goal of the NSRL project, created by NIST?
Answers:
a.
Create hash values for illegal files and distribute the information to law enforcement.
b.
Collect known hash values for commercial software and OS files using MD5 hashes.
c.
Collect known hash values for commercial software and OS files using SHA hashes.
d.
Search for collisions in hash values, and contribute to fixing hashing programs. -
ANS Selected Answer: c.
Collect known hash values for commercial software and OS files using SHA hashes.
A report using the _________________ system divides material into sections and restarts
numbering with each main section.
Answers:
a.
numerically ordered
b.
Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.