Question List for "Digital Archaeology: The Art and Science of Digital Forensics"

  Topics Views Last post
Law and Politics » When opening a file in Microsoft Word, which of the following artifacts is created that could be ... New
Started by kfurse
70 May 5, 2019
Law and Politics » In the Windows registry, what is a user's profile identified by? New
Started by mp14
75 May 5, 2019
Law and Politics » Which of the following are valid metafiles used by the Windows NFTS file system and can be used by ... New
Started by burton19126
49 May 5, 2019
Law and Politics » In order to store user data in the registry, the rogue key must be configured as a ________ value. ... New
Started by CQXA
82 May 5, 2019
Law and Politics » Which of the following are considered categories of anti-forensic behavior? New
Started by evelyn o bentley
43 May 5, 2019
Law and Politics » Which of the following files is most likely to be a temporary file generated by Microsoft Word as a ... New
Started by Ebrown
56 May 5, 2019
Law and Politics » Every time a new application is installed onto a Windows system, a registry key is generated for ... New
Started by vicky
75 May 5, 2019
Law and Politics » Deleting a file using Windows Explorer and the "Delete" key does which of the following to a file? New
Started by asmith134
152 May 5, 2019
Law and Politics » Which of the following definitions most appropriately describes a partition slack on a hard disk? New
Started by Lisaclaire
83 May 5, 2019
Law and Politics » If a user locks out her telephone by typing in the password incorrectly too many times, the service ... New
Started by notis
64 May 5, 2019