Question List for "Digital Archaeology: The Art and Science of Digital Forensics"

  Topics Views Last post
Law and Politics » When opening a file in Microsoft Word, which of the following artifacts is created that could be ... New
Started by kfurse
42 May 5, 2019
Law and Politics » In the Windows registry, what is a user's profile identified by? New
Started by mp14
39 May 5, 2019
Law and Politics » Which of the following are valid metafiles used by the Windows NFTS file system and can be used by ... New
Started by burton19126
28 May 5, 2019
Law and Politics » In order to store user data in the registry, the rogue key must be configured as a ________ value. ... New
Started by CQXA
52 May 5, 2019
Law and Politics » Which of the following are considered categories of anti-forensic behavior? New
Started by evelyn o bentley
22 May 5, 2019
Law and Politics » Which of the following files is most likely to be a temporary file generated by Microsoft Word as a ... New
Started by Ebrown
29 May 5, 2019
Law and Politics » Every time a new application is installed onto a Windows system, a registry key is generated for ... New
Started by vicky
47 May 5, 2019
Law and Politics » Deleting a file using Windows Explorer and the "Delete" key does which of the following to a file? New
Started by asmith134
88 May 5, 2019
Law and Politics » Which of the following definitions most appropriately describes a partition slack on a hard disk? New
Started by Lisaclaire
48 May 5, 2019
Law and Politics » If a user locks out her telephone by typing in the password incorrectly too many times, the service ... New
Started by notis
32 May 5, 2019