Question List for "Digital Archaeology: The Art and Science of Digital Forensics"

  Topics Views Last post
Law and Politics » Why is it necessary to calculate hash values on the primary image made from a suspect's hard drive? ... New
Started by fahad
48 May 5, 2019
Law and Politics » In Eoghan Casey's model of an investigation there are multiple steps. Which of these is not one of ... New
Started by Capo
14 May 5, 2019
Law and Politics » Which of the following would not likely be a stakeholder in a civil lawsuit against a major ... New
Started by javeds
22 May 5, 2019
Law and Politics » Bob Smith is suspected of using his company's Internet facilities as a conduit for sending large ... New
Started by Deast7027
17 May 5, 2019
Law and Politics » You suspect that there are a number of deleted files that can still be salvaged in the unallocated ... New
Started by gbarreiro
305 May 5, 2019
Law and Politics » During which phase of an investigation do you make your first entries into a chain of custody log? New
Started by CharlieWard
27 May 5, 2019
Law and Politics » Criminal cases have more stringent evidence-gathering requirements because ________. New
Started by torybrooks
148 May 5, 2019
Law and Politics » When qualifying an incident as a computer crime, which of the following characteristics would not be ... New
Started by audragclark
19 May 5, 2019
Law and Politics » Collecting the legal authorizations to begin an investigation are part of the ________ stage of the model. New
Started by faduma
16 May 5, 2019
Law and Politics » You work for a private organization that contracts out forensic investigations. In the process of ... New
Started by beccaep
34 May 5, 2019