Homework Clinic

Social Science Clinic => Law and Politics => Topic started by: JGIBBSON on May 5, 2019

Title: Deciding how to destroy evidentiary materials that is no longer needed falls under the ________ ...
Post by: JGIBBSON on May 5, 2019

Deciding how to destroy evidentiary materials that is no longer needed falls under the ________ stage of an investigation.


◦ Preparation
◦ Investigation
◦ Presentation
◦ None of these
Title: Deciding how to destroy evidentiary materials that is no longer needed falls under the ________ ...
Post by: shaikhs on May 5, 2019
Preparation
Title: Deciding how to destroy evidentiary materials that is no longer needed falls under the ________ ...
Post by: JGIBBSON on May 5, 2019
Excellent
Title: Deciding how to destroy evidentiary materials that is no longer needed falls under the ________ ...
Post by: shaikhs on May 5, 2019
Great! Please up vote :D
Title: Crime scene management is as critical a responsibility for the digital investigator as it is the ...
Post by: mpobi80 on May 5, 2019

Crime scene management is as critical a responsibility for the digital investigator as it is the lead investigator. What is the first thing you, as an investigator, want to do upon arriving on the scene?


◦ Crime Scene Documentation
◦ Crime Scene Survey
◦ Crime Scene Search
◦ Crime Scene Preservation
Title: Crime scene management is as critical a responsibility for the digital investigator as it is the ...
Post by: Jossy on May 5, 2019
Crime Scene Preservation
Title: Select each of the items from the following list that belongs in every documentation package.
Post by: silviawilliams41 on May 5, 2019

Select each of the items from the following list that belongs in every documentation package.


◦ A CV of each investigator involved in the case
◦ Photographs of the original scene
◦ Case notes prepared by the investigation team during the processing of evidence
◦ Biographical information about the accused
◦ Copies of all legal authorizations that were issued
Title: Select each of the items from the following list that belongs in every documentation package.
Post by: tuwy on May 5, 2019
Crime Scene Preservation
Title: Select each of the items from the following list that belongs in every documentation package.
Post by: silviawilliams41 on May 5, 2019
TY
Title: Select each of the items from the following list that belongs in every documentation package.
Post by: tuwy on May 5, 2019
You're welcome
Title: When transporting a hard disk that was extracted from a computer, what is the appropriate method of ...
Post by: lb_gilbert on May 5, 2019

When transporting a hard disk that was extracted from a computer, what is the appropriate method of protecting the device during transport?


◦ Faraday bag
◦ Anti-static bag
◦ Sealed and properly labeled box
◦ Unless there is a vital reason for doing so, the hard disk should not be removed from the computer on site.
Title: When transporting a hard disk that was extracted from a computer, what is the appropriate method of ...
Post by: ririgirl15 on May 5, 2019
Anti-static bag
Title: While investigating a person suspected of having child pornography on his machine, you discover that ...
Post by: Capo on May 5, 2019

While investigating a person suspected of having child pornography on his machine, you discover that at the time the files first appeared on the system, another user was logged onto the system. This is a powerful piece of ________ evidence.

Title: While investigating a person suspected of having child pornography on his machine, you discover that ...
Post by: ecox1012 on May 5, 2019
exculpatory
Title: Case notes that you take during initial response are protected from discovery because they are ...
Post by: shofmannx20 on May 5, 2019

Case notes that you take during initial response are protected from discovery because they are covered under the "work product" doctrine.


◦ true
◦ false
Title: Case notes that you take during initial response are protected from discovery because they are ...
Post by: ms_sulzle on May 5, 2019
false
Title: By transporting a cellular telephone in a Faraday bag, the device is protected from hackers getting ...
Post by: Evvie72 on May 5, 2019

By transporting a cellular telephone in a Faraday bag, the device is protected from hackers getting onto the device and wiping it.


◦ true
◦ false
Title: By transporting a cellular telephone in a Faraday bag, the device is protected from hackers getting ...
Post by: Pswine on May 5, 2019
true
Title: Computer scientists break the movement of information from raw electrical voltage changes to humanly ...
Post by: laurencescou on May 5, 2019

Computer scientists break the movement of information from raw electrical voltage changes to humanly readable information as a series of 
 abstraction layers. Which of the following is one of these abstraction layers?


◦ Voltage fluctuations
◦ Changes in magnetic energy on the surface of a hard disk
◦ Character sets
◦ Binary streams
◦ All of these
Title: Computer scientists break the movement of information from raw electrical voltage changes to humanly ...
Post by: ambernicolefink on May 5, 2019
All of these
Title: Which of the following is one of the tools on the court-approved lists issued by the Federal Judiciary?
Post by: tfester on May 5, 2019

Which of the following is one of the tools on the court-approved lists issued by the Federal Judiciary?


◦ Encase
◦ Sleuthkit
◦ FTK
◦ Paraben
◦ There is no list of court-approved tools.
Title: Which of the following is one of the tools on the court-approved lists issued by the Federal Judiciary?
Post by: T4T on May 5, 2019
There is no list of court-approved tools.
Title: Which of the following is one of the tools on the court-approved lists issued by the Federal Judiciary?
Post by: tfester on May 5, 2019
Thanks
Title: Which of the following is one of the tools on the court-approved lists issued by the Federal Judiciary?
Post by: T4T on May 5, 2019
Welcome :)
Title: Which of the following suites is an open-source set of utilities that is made available to the ...
Post by: HCHenry on May 5, 2019

Which of the following suites is an open-source set of utilities that is made available to the community at no charge?


◦ FTK
◦ Encase
◦ Sleuthkit
◦ X-Ways
Title: Which of the following suites is an open-source set of utilities that is made available to the ...
Post by: livaneabi on May 5, 2019
Sleuthkit
Title: Virtually all operating systems come with tools to manage the hard disk. The vast majority of these ...
Post by: Mr3Hunna on May 5, 2019

Virtually all operating systems come with tools to manage the hard disk. The vast majority of these tools are unable to read metafiles such as the $MFT file in Windows 7. Why is this?


◦ The $MFT file is actually not part of the file system.
◦ Metafiles are database internal to the file system and are therefore locked out whenever the file system is mounted.
◦ While the metafiles are an integral part of the file system, the files themselves reside outside of the directory structure.
◦ Metafiles are protected system files and require access that user-level utilities are not granted by the OS.
Title: Virtually all operating systems come with tools to manage the hard disk. The vast majority of these ...
Post by: kmb352 on May 5, 2019
Metafiles are protected system files and require access that user-level utilities are not granted by the OS.
Title: Software tools can be categorized as either "lossy" or "lossless". Which of the following tools are ...
Post by: mcmcdaniel on May 5, 2019

Software tools can be categorized as either "lossy" or "lossless". Which of the following tools are considered lossy?


◦ Windows Explorer
◦ A raw disk editor
◦ A disk imaging utility
◦ A network capture utility
Title: Software tools can be categorized as either "lossy" or "lossless". Which of the following tools are ...
Post by: bigcheese9 on May 5, 2019
A network capture utility
Title: Which of the following institutions maintains a program for testing digital forensic tools?
Post by: Brittanyd9008 on May 5, 2019

Which of the following institutions maintains a program for testing digital forensic tools?


◦ National Science Foundation
◦ American Academy of Forensic Sciences
◦ National Institute of Standards and Testing
◦ System Administration, Network, and Security Institute
Title: Which of the following institutions maintains a program for testing digital forensic tools?
Post by: dudman123 on May 5, 2019
National Institute of Standards and Testing
Title: The Linux Disk Editor is a tool used in Linux that allows a user to ________.
Post by: darbym82 on May 5, 2019

The Linux Disk Editor is a tool used in Linux that allows a user to ________.


◦ view the actual binary contents stored on the surface of the disk
◦ recreate partition maps on a hard disk on the fly
◦ make a bit-for-bit copy of any volume to another volume, even if I/O errors occur
◦ locate alternate data forks between files on a hard disk
Title: The Linux Disk Editor is a tool used in Linux that allows a user to ________.
Post by: ky860224 on May 5, 2019
view the actual binary contents stored on the surface of the disk
Title: There are four attributes of a good tool that can be used to calculate its usability as a tool. ...
Post by: biggirl4568 on May 5, 2019

There are four attributes of a good tool that can be used to calculate its usability as a tool. Which of the following is 
 not one of those attributes?


◦ Cost
◦ Consistency
◦ Accuracy
◦ Usability
Title: There are four attributes of a good tool that can be used to calculate its usability as a tool. ...
Post by: Cheesycrackers on May 5, 2019
Cost
Title: There are four attributes of a good tool that can be used to calculate its usability as a tool. ...
Post by: biggirl4568 on May 5, 2019
Thanks
Title: There are four attributes of a good tool that can be used to calculate its usability as a tool. ...
Post by: Cheesycrackers on May 5, 2019
Welcome :)
Title: As an experienced digital investigator, you have been called in to testify about the reliability of ...
Post by: karen on May 5, 2019

As an experienced digital investigator, you have been called in to testify about the reliability of the tool that was used to extract a forensic image. In your testimony you explain that you tested the utility against several ________.


◦ captured suspect drives
◦ virtual drives
◦ known data sets
◦ archived image files
Title: As an experienced digital investigator, you have been called in to testify about the reliability of ...
Post by: batool on May 5, 2019
known data sets
Title: In order to pass the scrutiny of a judge a tool must pass four separate tests that provide a measure ...
Post by: Metfan725 on May 5, 2019

In order to pass the scrutiny of a judge a tool must pass four separate tests that provide a measure of the scientific validity of the results. These tests are part of the ________ process.


◦ Dow
◦ Moore
◦ NIST
◦ Daubert
Title: In order to pass the scrutiny of a judge a tool must pass four separate tests that provide a measure ...
Post by: shewald78 on May 5, 2019
Daubert
Title: In order to pass the scrutiny of a judge a tool must pass four separate tests that provide a measure ...
Post by: Metfan725 on May 5, 2019
Thanks
Title: In order to pass the scrutiny of a judge a tool must pass four separate tests that provide a measure ...
Post by: shewald78 on May 5, 2019
Welcome :)
Title: Which of the following is an example of a write blocker that can be used to assure a forensically ...
Post by: B on May 5, 2019

Which of the following is an example of a write blocker that can be used to assure a forensically sound copy of a suspect drive?


◦ Weibetech Ultradock
◦ SANS DriveProtect
◦ Guidance UltraSAN
◦ Cellubrite
Title: Which of the following is an example of a write blocker that can be used to assure a forensically ...
Post by: dreamfighter72 on May 5, 2019
Weibetech Ultradock
Title: Which of the following utilities can detect a file that has been configured as an alternate data ...
Post by: saliriagwu on May 5, 2019

Which of the following utilities can detect a file that has been configured as an alternate data fork to another file?


◦ Strings
◦ PSFIle
◦ Autoruns
◦ Streams
Title: Which of the following utilities can detect a file that has been configured as an alternate data ...
Post by: cloud on May 5, 2019
Streams
Title: Microsoft provides a collection of free utilities for analyzing and troubleshooting problems ...
Post by: luminitza on May 5, 2019

Microsoft provides a collection of free utilities for analyzing and troubleshooting problems specific to the Windows operating system. These utilities are part of the ________ suite.


◦ MSCONFIG
◦ Sysinternals
◦ Technet
◦ Winhex
Title: Microsoft provides a collection of free utilities for analyzing and troubleshooting problems ...
Post by: amandanbreshears on May 5, 2019
Sysinternals
Title: Based on the published specifications that define a usable tool, if any I/O error occurs while ...
Post by: Jramos095 on May 5, 2019

Based on the published specifications that define a usable tool, if any I/O error occurs while reading data, the tool must immediately abort the data capture event.


◦ true
◦ false
Title: Based on the published specifications that define a usable tool, if any I/O error occurs while ...
Post by: T4T on May 5, 2019
false
Title: Brute force cracking of a password using conventional methods takes a very long time. This is ...
Post by: moongchi on May 5, 2019

Brute force cracking of a password using conventional methods takes a very long time. This is primarily a ________ intensive task.


◦ Memory
◦ Storage
◦ I/O
◦ Processor
Title: Brute force cracking of a password using conventional methods takes a very long time. This is ...
Post by: livaneabi on May 5, 2019
Processor
Title: There are three major factors to address when configuring a forensic workstation. Which of the ...
Post by: kellyjaisingh on May 5, 2019

There are three major factors to address when configuring a forensic workstation. Which of the following is actually 
 not one of those factors?


◦ Power
◦ Capacity
◦ Security
◦ Authenticity of data
Title: There are three major factors to address when configuring a forensic workstation. Which of the ...
Post by: jaymee143 on May 5, 2019
Capacity
Title: There are several decisions to be made regarding the construction of a new forensic workstation that ...
Post by: piesebel on May 5, 2019

There are several decisions to be made regarding the construction of a new forensic workstation that will be dictated by the choice of system board. Which of the following are affected by the choice of system board?


◦ CPU brand and speed
◦ What OS can be installed
◦ Whether or not RAID arrays can be used
◦ The amount and type of memory that can be installed
Title: There are several decisions to be made regarding the construction of a new forensic workstation that ...
Post by: softEldritch on May 5, 2019
Capacity
Title: The I/O subsystem of a forensic workstation is basically the same as with any other computer. The ...
Post by: mia on May 5, 2019

The I/O subsystem of a forensic workstation is basically the same as with any other computer. The one difference is that there must be some sort of ________ capability designed into the system.


◦ fault tolerance
◦ load sharing
◦ remote access
◦ write blocking
Title: The I/O subsystem of a forensic workstation is basically the same as with any other computer. The ...
Post by: Loise Hard on May 5, 2019
write blocking
Title: The I/O subsystem of a forensic workstation is basically the same as with any other computer. The ...
Post by: mia on May 5, 2019
Thanks
Title: The I/O subsystem of a forensic workstation is basically the same as with any other computer. The ...
Post by: Loise Hard on May 5, 2019
Welcome :)
Title: Which of the following is a way to write protect an I/O path when there is no hardware device ...
Post by: kfurse on May 5, 2019

Which of the following is a way to write protect an I/O path when there is no hardware device available for the task?


◦ Use the copy command with the 
 no write-back trigger.
◦ Use the system BIOS to disable writing to that particular port.
◦ In Device Manager, click the 
 read only option in device settings.
◦ Under Services, disable the Removable Media service.
Title: Which of the following is a way to write protect an I/O path when there is no hardware device ...
Post by: chreslie on May 5, 2019
Use the system BIOS to disable writing to that particular port.
Title: Which of the following forensic workstations is designed as a somewhat portable device?
Post by: karlynnae on May 5, 2019

Which of the following forensic workstations is designed as a somewhat portable device?


◦ FRED
◦ Forensic Analyst
◦ FREDDIE
◦ The Ultimate Forensic Machine
Title: Which of the following forensic workstations is designed as a somewhat portable device?
Post by: hugthug12 on May 5, 2019
FREDDIE
Title: Which of the following forensic workstations is designed as a somewhat portable device?
Post by: karlynnae on May 5, 2019
Thank you!
Title: Which of the following forensic workstations is designed as a somewhat portable device?
Post by: hugthug12 on May 5, 2019
Always glad to help...
Title: You recently upgraded the memory on your new forensic workstation. It was working fine before the ...
Post by: penza on May 5, 2019

You recently upgraded the memory on your new forensic workstation. It was working fine before the upgrade. Now, durning the boot process, the system encounters a "blue screen of death" and shuts down. You put the memory into another machine and it worked fine. Which of the following is likely to be the problem?


◦ It was the wrong brand of memory.
◦ The new memory does not match the old memory in either speed or density.
◦ The memory sockets on the system board are defective.
◦ You didn't configure the BIOS to recognize the new memory.
Title: You recently upgraded the memory on your new forensic workstation. It was working fine before the ...
Post by: whitcassie on May 5, 2019
The new memory does not match the old memory in either speed or density.
Title: FREDDIE is a forensic workstation available from which of the following companies?
Post by: craiczarry on May 5, 2019

FREDDIE is a forensic workstation available from which of the following companies?


◦ Dell
◦ Forensic Computers
◦ AccessData Corporation
◦ Digital Intelligence
Title: FREDDIE is a forensic workstation available from which of the following companies?
Post by: Heffejeff on May 5, 2019
Digital Intelligence
Title: FREDDIE is a forensic workstation available from which of the following companies?
Post by: craiczarry on May 5, 2019
TY
Title: FREDDIE is a forensic workstation available from which of the following companies?
Post by: Heffejeff on May 5, 2019
You're welcome
Title: When selecting a suitable enclosure for a forensic workstation there are several factors to ...
Post by: burchfield96 on May 5, 2019

When selecting a suitable enclosure for a forensic workstation there are several factors to consider. Select some appropriate factors from the following list that are essential.


◦ Sufficient drive bays
◦ Hot swap capability for some drive bays
◦ A locking front panel
◦ Quiet cooling fans
◦ A decent number of slots for expansion cards
Title: When selecting a suitable enclosure for a forensic workstation there are several factors to ...
Post by: momolu on May 5, 2019
Digital Intelligence
Title: In addition to the speed of the core processor, what is also critical to the performance of a CPU? ...
Post by: EY67 on May 5, 2019

In addition to the speed of the core processor, what is also critical to the performance of a CPU? (Select all that apply.)


◦ Cache speed
◦ Front side bus speed
◦ Prefetch capacity
◦ Number of cores
Title: In addition to the speed of the core processor, what is also critical to the performance of a CPU? ...
Post by: medine on May 5, 2019
Digital Intelligence
Title: In addition to the speed of the core processor, what is also critical to the performance of a CPU? ...
Post by: EY67 on May 5, 2019
Excellent
Title: In addition to the speed of the core processor, what is also critical to the performance of a CPU? ...
Post by: medine on May 5, 2019
Great! Please up vote :D
Title: A 32-bit operating system is capable of supporting up to ________ megabytes of RAM.
Post by: deesands on May 5, 2019

A 32-bit operating system is capable of supporting up to ________ megabytes of RAM.


◦ 2
◦ 4
◦ 8
◦ 64
Title: A 32-bit operating system is capable of supporting up to ________ megabytes of RAM.
Post by: kristenb95 on May 5, 2019
4
Title: How many memory channels can a quad core processor support?
Post by: vHAUNG6011 on May 5, 2019

How many memory channels can a quad core processor support?

Title: How many memory channels can a quad core processor support?
Post by: asdfghjkl; on May 5, 2019
4
Title: How many memory channels can a quad core processor support?
Post by: vHAUNG6011 on May 5, 2019
Thank you!
Title: How many memory channels can a quad core processor support?
Post by: asdfghjkl; on May 5, 2019
Always glad to help...
Title: Your new forensic workstation came with two 10K-rpm SAS drives and two 7,400rpm drives. You should ...
Post by: abarnes on May 5, 2019

Your new forensic workstation came with two 10K-rpm SAS drives and two 7,400rpm drives. You should install the OS onto the slower drives and save the faster drives for the data sets.


◦ true
◦ false
Title: Your new forensic workstation came with two 10K-rpm SAS drives and two 7,400rpm drives. You should ...
Post by: juiceman1987 on May 5, 2019
false
Title: The fastest and most durable permanent storage mechanism is the solid state drive.
Post by: WhattoUnderstand on May 5, 2019

The fastest and most durable permanent storage mechanism is the solid state drive.


◦ true
◦ false
Title: The fastest and most durable permanent storage mechanism is the solid state drive.
Post by: wshriver on May 5, 2019
true
Title: The most commonly seen expansion slot in most current system boards is the PCI-X slot.
Post by: iveyjurea on May 5, 2019

The most commonly seen expansion slot in most current system boards is the PCI-X slot.


◦ true
◦ false
Title: The most commonly seen expansion slot in most current system boards is the PCI-X slot.
Post by: mtmmmmmk on May 5, 2019
false
Title: Which of the following organizations offers the CCE Boot Camp Training program?
Post by: Sportsfan2111 on May 5, 2019

Which of the following organizations offers the CCE Boot Camp Training program?


◦ International Society of Forensic Computer Examiners
◦ Digital Forensics Certification Board
◦ Information Assurance Certification Review Board
◦ Global Information Assurance Certification
Title: Which of the following organizations offers the CCE Boot Camp Training program?
Post by: yasmina on May 5, 2019
International Society of Forensic Computer Examiners
Title: Which organization monitors the licensing of private digital forensic investigators on a national level?
Post by: D2AR0N on May 5, 2019

Which organization monitors the licensing of private digital forensic investigators on a national level?


◦ Department of Homeland Security
◦ The Justice Department
◦ The Secret Service
◦ There is no national licensing program.
Title: Which organization monitors the licensing of private digital forensic investigators on a national level?
Post by: jaaaaaaa on May 5, 2019
There is no national licensing program.
Title: Global Information Assurance Certification offers two different digital forensic certifications. ...
Post by: jace on May 5, 2019

Global Information Assurance Certification offers two different digital forensic certifications. Which of the following do they offer?


◦ GCFE
◦ CCIA
◦ GCFA
◦ CCFE
Title: Global Information Assurance Certification offers two different digital forensic certifications. ...
Post by: paavo on May 5, 2019
There is no national licensing program.
Title: Global Information Assurance Certification offers two different digital forensic certifications. ...
Post by: jace on May 5, 2019
TY
Title: Global Information Assurance Certification offers two different digital forensic certifications. ...
Post by: paavo on May 5, 2019
You're welcome
Title: In order to pass the written exam for the GCFD certification you must obtain a final score of ...
Post by: littleanan on May 5, 2019

In order to pass the written exam for the GCFD certification you must obtain a final score of ________ or higher.


◦ 65
◦ 69
◦ 71
◦ 85
Title: In order to pass the written exam for the GCFD certification you must obtain a final score of ...
Post by: kxciann on May 5, 2019
69
Title: The Certified Digital Forensic Examiner certification is administered by ________.
Post by: MGLQZ on May 5, 2019

The Certified Digital Forensic Examiner certification is administered by ________.


◦ Global Information Assurance Certification
◦ AccessData Corporation
◦ Information Assurance Certification Review Board
◦ Digital Forensics Certification Board
Title: The Certified Digital Forensic Examiner certification is administered by ________.
Post by: JYan on May 5, 2019
Information Assurance Certification Review Board
Title: The Certified Digital Forensic Examiner certification is administered by ________.
Post by: MGLQZ on May 5, 2019
TY
Title: The Certified Digital Forensic Examiner certification is administered by ________.
Post by: JYan on May 5, 2019
You're welcome
Title: In their 2004 article, Meyers and Rogers listed three levels of excellence a good forensic ...
Post by: K@ on May 5, 2019

In their 2004 article, Meyers and Rogers listed three levels of excellence a good forensic certification program should address. Which two of the following are on that list?


◦ Admissibility of Evidence
◦ Expertise with tools
◦ Capacity for reasoning
◦ Analysis and Preservation
Title: In their 2004 article, Meyers and Rogers listed three levels of excellence a good forensic ...
Post by: katkat_flores on May 5, 2019
Information Assurance Certification Review Board
Title: The PCFE certification is administered by ________.
Post by: penza on May 5, 2019

The PCFE certification is administered by ________.


◦ AccessData Corporation
◦ Paraben Corporation
◦ Cellubrite
◦ Premier Computing
Title: The PCFE certification is administered by ________.
Post by: angrybirds13579 on May 5, 2019
Paraben Corporation
Title: The PCFE certification is administered by ________.
Post by: penza on May 5, 2019
Thanks
Title: The PCFE certification is administered by ________.
Post by: angrybirds13579 on May 5, 2019
Welcome :)
Title: In order to pass the written exam for the GCFA certification you must obtain a final score of ...
Post by: neverstopbelieb on May 5, 2019

In order to pass the written exam for the GCFA certification you must obtain a final score of ________ or higher.


◦ 65
◦ 69
◦ 75
◦ 85
Title: In order to pass the written exam for the GCFA certification you must obtain a final score of ...
Post by: bbburns21 on May 5, 2019
69
Title: The AccessData Certified Examiner is a proprietary certification that measures the candidate's ...
Post by: jhjkgdfhk on May 5, 2019

The AccessData Certified Examiner is a proprietary certification that measures the candidate's proficiency in using the ________ suite.


◦ Encase
◦ Sleuthkit
◦ Forensic Tool Kit
◦ Cellubrite
Title: The AccessData Certified Examiner is a proprietary certification that measures the candidate's ...
Post by: Smiles0805 on May 5, 2019
Forensic Tool Kit
Title: The AccessData Certified Examiner is a proprietary certification that measures the candidate's ...
Post by: jhjkgdfhk on May 5, 2019
Thank you!
Title: The AccessData Certified Examiner is a proprietary certification that measures the candidate's ...
Post by: Smiles0805 on May 5, 2019
Always glad to help...
Title: The Digital Forensics Certified Practitioner certification is administered by ________.
Post by: mckennatimberlake on May 5, 2019

The Digital Forensics Certified Practitioner certification is administered by ________.


◦ Global Information Assurance Certification
◦ AccessData Corporation
◦ Information Assurance Certification Review Board
◦ Digital Forensics Certification Board
Title: The Digital Forensics Certified Practitioner certification is administered by ________.
Post by: anyusername12131 on May 5, 2019
Digital Forensics Certification Board
Title: The Encase Certified Examiner is a certification offered by ________.
Post by: ereecah on May 5, 2019

The Encase Certified Examiner is a certification offered by ________.


◦ CIAAC
◦ DFCE
◦ AccessData Corporation
◦ Guidance Software
Title: The Encase Certified Examiner is a certification offered by ________.
Post by: shaikhs on May 5, 2019
Guidance Software
Title: The Encase Certified Examiner is a certification offered by ________.
Post by: ereecah on May 5, 2019
Thanks
Title: The Encase Certified Examiner is a certification offered by ________.
Post by: shaikhs on May 5, 2019
Welcome :)
Title: To obtain the ENCE certification a candidate must accomplish which two of the following tasks?
Post by: mynx on May 5, 2019

To obtain the ENCE certification a candidate must accomplish which two of the following tasks?


◦ Pass a written exam with a score of 71% or higher.
◦ Pass a written exam with a score of 80% or higher.
◦ Examine a media set within 3 months and provide a report with an accuracy of 80% or higher.
◦ Examine a media set within 2 months and provide a report with an accuracy of 85% or higher.
Title: To obtain the ENCE certification a candidate must accomplish which two of the following tasks?
Post by: cloud on May 5, 2019
Guidance Software
Title: What is the time limit given for completing the GCFA written exam?
Post by: fox on May 5, 2019

What is the time limit given for completing the GCFA written exam?

Title: What is the time limit given for completing the GCFA written exam?
Post by: coreycathey on May 5, 2019
three hours
Title: What is the time limit given for completing the GCFA written exam?
Post by: fox on May 5, 2019
Thanks
Title: What is the time limit given for completing the GCFA written exam?
Post by: coreycathey on May 5, 2019
Welcome :)
Title: There is little or no reciprocity between states in regards to the licensing requirements for ...
Post by: newyorker26 on May 5, 2019

There is little or no reciprocity between states in regards to the licensing requirements for digital investigators.


◦ true
◦ false
Title: There is little or no reciprocity between states in regards to the licensing requirements for ...
Post by: zacnyjessica on May 5, 2019
true