100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Digital Archaeology: The Art and Science of Digital Forensics (1st Edition, Michael W. Graves) Complete Solutions and Guide

Rating
-
Sold
-
Pages
66
Grade
A+
Uploaded on
29-08-2025
Written in
2025/2026

This document provides the complete study resource for Digital Archaeology: The Art and Science of Digital Forensics (1st Edition) by Michael W. Graves. It includes detailed solutions, explanations, and guidance for all chapters, covering core topics such as forensic investigation processes, data recovery, evidence collection, file systems, operating system artifacts, and digital crime analysis. A must-have resource for computer forensics, cybersecurity, and IT students preparing for exams, labs, and professional practice.

Show more Read less
Institution
Digital Archaeology
Course
Digital Archaeology











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Digital Archaeology
Course
Digital Archaeology

Document information

Uploaded on
August 29, 2025
Number of pages
66
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • digital archaeology

Content preview

C
on
From Digital Chapter 1
Archaeology, by Review




fid
Michael Graves Questions




en
1. In Eoghan Casey’s model of an investigation there are multiple steps. Which of these is not one of those steps?

a. Examination




tia
*b. Interrogation
c. Identification/Assessment
d. Preservation




l
e. Reporting


2. The process of documentation begins in the Identification/Assessment phase.

*a. True
b. False


3. Which of the following would not likely be a stakeholder in a civil lawsuit against a major automobile manufacturer?

a. Government regulatory agencies
b. The United Autoworkers Union
c. The judge assigned to the case
d. Owners of that company’s products
*e. All of these would be interested parties.


4. Collecting exculpatory evidence is exclusively the responsibility of the defense counsel.

a. True
*b. False


5. How many steps are there in Eoghan Casey’s Investigation Model?

Correct Answer(s):
a. 6
b. six
c. six.
d. 6.


6. Bob Smith is suspected of using his company’s Internet facilities as a conduit for sending large quantities of SPAM to
millions of users. You are called in to examine his computer to see if there is evidence to support this claim. This is initially
a form of what type of investigation?

a. Civil
*b. Internal
c. Criminal
d. This is not something you would do.


7. You suspect that there are a number of deleted files that can still be salvaged in the unallocated space of a drive
image. During which phase of the investigation would you use a data carving utility?

*a. Examination
b. Acquisition
c. Identification/Assessment
d. Analysis
e. Reporting


8. During which phase of an investigation do you make your first entries into a chain of custody log?

a. Examination
*b. Acquisition
c. Identification/Assessment




VERIFIEDBRAINBOOSTER

, C
on
d. Analysis
e. Reporting




fid
9. Criminal cases have more stringent evidence-gathering requirements because ________________.




en
a. Only civil cases fall under constitutional guidelines.
b. Criminal cases are generally handled by Federal judges.
*c. The Constitution protects the rights of citizens being tried in criminal proceedings.




tia
d. Civil cases do not involve jail time or possible capital punishment.
e. They don’t. Civil cases have the most stringent requirements.




l
10. A person has been sued by her neighbor for building a fence on the wrong side of the property line. She tries to act as
her own defense attorney and is battered in court. She can appeal the case on Constitutional grounds, since she was
never advised of her right to be represented by counsel.
???What does this one have to do with the book? Could this be reworded as a computer related case? -Michael

a. True
*b. False


11. When qualifying an incident as a computer crime, which of the following characteristics would not be considered a
valid description?

a. The data in the computer are the objects of the act.
b. The computer is the instrument or the tool of the act.
*c. The computer is one of the objects stolen during a burglary.
d. The computer is the target of an act.


12. What is the purpose of having a model for investigations? How does it help the investigator or the student learning to
be an investigator?

Correct Answer:
A model acts as a blueprint for how an investigation should be structured. It allows students to break an investigation
down into basic steps, making it easier to learn the process. It allows the seasoned professional to make sure that nothing
is missed in the course of the project.


13. Why is it necessary to calculate hash values on the primary image made from a suspect’s hard drive? How many
hash calculations do you make?

Correct Answer:
You calculate the hash value for the original volume and compare it to the value you get from the copy. They must match.
If not, you need to figure out why it doesn’t and document the reason. How many do you make? That’s kind of a trick
question. Ideally, you will make two calculations for each copy. If you have both MDA5 and a SHA-256 calculations for
each copy, and each version matches, it will be very difficult for the opposition to challenge the validity of your copies.


14. Collecting the legal authorizations to begin an investigation are part of the ___________ stage of the model.

*a. Identification/Assessment
b. Analysis
c. Collection/Acquisition
d. Reporting


15. You work for a private organization that contracts out forensic investigations. In the process of examining a suspect’s
hard drive in the course of an internal investigation, you come across numerous files that are quite obviously child
pornography. You turn them over to the local law enforcement, which obtains a warrant and seizes the computer. Which
document applies to this situation?

*a. FRCP
b. FRE
c. PMBOX
d. None. You were acting privately.


16. What is the first thing that you should do upon acquiring a new tool for your forensic department?




VERIFIEDBRAINBOOSTER

, C
on
Correct Answer:




fid
Test it.




en
17. How many steps are there in Kruse-Heiser Investigation Model?

Correct Answer(s):
a. 4




tia
b. four
c. 4.
d. four.




l
18. You are among the first onto a scene in which multiple computers are being seized. As a part of the festivities, you
make take a number of digital photographs and a video recording tape of the scene. What primary collection of
documentation hosts these images and videos?

a. The Case Timeline
b. Procedural Documentation
c. Chain of Custody
*d. General Case Documentation
e. Process Documentation


19. The FRCP is a set of rules that is relevant to which type of investigation?

a. Internal
*b. Criminal
c. Civil
d. It affects all of them equally.


20. You are about to seize an external hard disk drive that you found in the vicinity of a crime scene. You record the
make, model, and serial number of the drive before you pack it up for shipping. Of which set of documents does the
record become a part?
???The first two answers below were identical. I deleted one of them. -Michael
a. The Case Timeline
b. The Case Timeline
*cb. Chain of Custody
*dc. General Case Documentation
ed. Process Documentation




VERIFIEDBRAINBOOSTER

, C
on
From Digital Chapter 2
Archaeology, by Review




fid
Michael Graves Questions




en
1. Which Constitutional amendment directly addresses the government’s right to search a person’s property?




tia
a. The First Amendment




l
*b. The Fourth Amendment

c. The Fifth Amendment

d. Searches were not specifically defined in the Constitution.


2. Which Constitutional amendment directly addresses a citizen’s right to privacy?


a. The First Amendment

b. The Fourth Amendment

c. The Fifth Amendment

*d. Searches were not specifically defined in the Constitution.


3. If a person is forced, against their will, by a government official to reveal a password, that person may be able to claim that

their Constitutional rights, as defined by ________________________, have been violated.


a. The First Amendment

b. The Fourth Amendment

*c. The Fifth Amendment

d. Searches were not specifically defined in the Constitution.


4. The practice used by the British government to orders searches that was so widely despised by our forefathers was called

__________________.


*a. Writ of Assistance

b. General Warrant

c. Forfeiture of Domain

d. Access Demand


5. Two phrases in the Fourth Amendment that place limitations on the government’s ability to acquire a search warrant are

(select 2)…:


a. The Right of the People

b. Redress of Grievance

*c. Probable Cause




VERIFIEDBRAINBOOSTER

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StuviaSavvy West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
20
Member since
6 months
Number of followers
0
Documents
358
Last sold
2 weeks ago
STUVIASAVVY TESTBANKS AND EXAM PRACTICES.

Looking for relevant and up-to-date study materials to help you ace your exams? StuviaSavvy has got you covered! We offer a wide range of study resources, including test banks, exams, study notes, and more, to help prepare for your exams and achieve your academic goals. What's more, we can also help with your academic assignments, research, dissertations, online exams, online tutoring and much more! Please send us a message and will respond in the shortest time possible. Always Remember: Don't stress. Do your best. Forget the rest! Gracias!

Read more Read less
4.0

7 reviews

5
4
4
0
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions