1._______ is the most commonly used hashing algorithm.
2. What Linux command can be used to create a hash?
SHA
MD5
MD5sum
Sha3sum
3. What Linux command can be used to wipe a target drive?
Del
Delete
nc
dd
4. RAID 4 should be acquired as individual disks.
True
False
5. Which of the following drives would be least susceptible to damage when dropped?
SCSI
SSD
IDE
SATA
6. It is acceptable, when you have evidence in a vehicle, to stop for a meal, if the vehicle is locked.
True
False
7. Which file might contain data that was live in memory and not stored on the hard drive?
8. You need to image a server that is set up with RAID 5. How would you approach this?
Image each disk separately.
It cannot be done; you have to do live forensics.
It can be done only with special RAID imaging software.
Image the entire array as a single disk.
3.138.174.195