Question List for "Digital Archaeology: The Art and Science of Digital Forensics"

  Topics Views Last post
Law and Politics » Whenever a user physically types a web address into the browser's address bar, that URL is saved in ... New
Started by Themember4
92 May 5, 2019
Law and Politics » What is the maximum size that any single key in the Windows registry can occupy? New
Started by cmoore54
172 May 5, 2019
Law and Politics » Which of the following are valid metafiles used by the Windows NFTS file system? New
Started by waynest
96 May 5, 2019
Law and Politics » Many modern computer systems have a function called the Device Configuration Overlay (DCO). Which of ... New
Started by LCritchfi
31 May 5, 2019
Law and Politics » You are investigating a case in which the suspect is thought to have been transmitting classified ... New
Started by dejastew
41 May 5, 2019
Law and Politics » Alternate data streams were introduced as a feature of the ________ file system. New
Started by azncindy619
36 May 5, 2019
Law and Politics » Emptying the Recycle Bin in Windows does what to the file? New
Started by jrubin
46 May 5, 2019
Law and Politics » Individual user profiles are store in the ________ hive of the Windows registry. New
Started by anshika
59 May 5, 2019
Law and Politics » Which of the following features of Windows allows a user to dynamically encrypt selected files and folders? New
Started by kamilo84
63 May 5, 2019
Law and Politics » Which of the following terms is used to describe data hidden inside of another seemingly innocent file? New
Started by brutforce
52 May 5, 2019