Question List for "Digital Archaeology: The Art and Science of Digital Forensics"

  Topics Views Last post
Law and Politics » You suspect that there are a number of deleted files that can still be salvaged in the unallocated ... New
Started by gbarreiro
345 May 5, 2019
Law and Politics » During which phase of an investigation do you make your first entries into a chain of custody log? New
Started by CharlieWard
39 May 5, 2019
Law and Politics » Bob Smith is suspected of using his company's Internet facilities as a conduit for sending large ... New
Started by Deast7027
23 May 5, 2019
Law and Politics » In Eoghan Casey's model of an investigation there are multiple steps. Which of these is not one of ... New
Started by Capo
23 May 5, 2019
Law and Politics » Which of the following would not likely be a stakeholder in a civil lawsuit against a major ... New
Started by javeds
31 May 5, 2019
Law and Politics » Why is it necessary to calculate hash values on the primary image made from a suspect's hard drive? ... New
Started by fahad
58 May 5, 2019
Law and Politics » What is the purpose of having a model for investigations? How does it help the investigator or the ... New
Started by OSWALD
28 May 5, 2019
Law and Politics » One thing that a spammer is not able to spoof is the originating IP address of the host that sent the message. New
Started by ss2343
24 May 5, 2019
Law and Politics » Which of the following mail clients is designed exclusively for the Macintosh platform? New
Started by Collmarie
22 May 5, 2019
Law and Politics » While doing a text search of an archive of email messages, you decide to narrow your search by using ... New
Started by BrownTown3
23 May 5, 2019