Submitted by: Submitted by poke112
Views: 10
Words: 460
Pages: 2
Category: Other Topics
Date Submitted: 01/20/2016 04:11 PM
What is digital forensics?
What is a computer crime?
Which of the following crimes cause the largest cost financially to businesses?
What is a computer virus?
What is the difference between a computer virus and a worm?
Trojan horse
Spam
Spoofing
Email or Virus hoax
Trojan-horse virus
Key logger software
Email deception
Virus ruse
Macro virus
Denial-of-service attack
Intelligent tools
Bots
Agents
Malware
Zombie or drone
Rookit
Hacker
Thrill-seeker hacker
White-hat hacker
Black-hat hacker
Who are cyber vandals?
Crackers
Political hacker
Cyber hacker
Black-hat cracker
Cyberterrorist
In digital forensics, what is the first phase in the investigation?
Planning
Collection
Authentication and preservation
Analysis
Slack space
Forensic image copy
MD5 hash value
Forensics certificate
Digital authentication
Fraud
Static electricity
Device Seizure
Data recovery
Data Buster
Forensic Information Salvaging Technology (FIST)
What is latent semantic analysis?
In digital forensics, what is the second phase of the investigation?
What is a live analysis?
Why is a live analysis needed in digital forensics?
If you were disposing of your computer along with its hard drive, what should you do beforehand to ensure that someone does not access and use your personal information?
What happens when you delete a computer file?
Can you recover a deleted computer file?
What is virtual memory?
Disk directory
System settings
System preferences and configuration settings
The Registry
disk wiping program
Rename the file
Defrag the computer
Press Shift + Delete instead of just Delete
Clear temporary Internet files and the history file
Redacting
Encrypted
Steganography
Ethics
Ethical dilemma
Consequences
Society's opinion
Likelihood of effect
Time from action
Copyright
Patent law
Fair Use Doctrine
Pirating laws
Intellectual property
copyright infringement
backup copies
Spam
Phishing
What is identity...