CHAPTER 4 ASSESSMENT

  1. 1._______ is the most commonly used hashing algorithm.

  2. 2. What Linux command can be used to create a hash?

    1. SHA

    2. MD5

    3. MD5sum

    4. Sha3sum

  3. 3. What Linux command can be used to wipe a target drive?

    1. Del

    2. Delete

    3. nc

    4. dd

  4. 4. RAID 4 should be acquired as individual disks.

    1. True

    2. False

  5. 5. Which of the following drives would be least susceptible to damage when dropped?

    1. SCSI

    2. SSD

    3. IDE

    4. SATA

  6. 6. It is acceptable, when you have evidence in a vehicle, to stop for a meal, if the vehicle is locked.

    1. True

    2. False

  7. 7. Which file might contain data that was live in memory and not stored on the hard drive?

  8. 8. You need to image a server that is set up with RAID 5. How would you approach this?

    1. Image each disk separately.

    2. It cannot be done; you have to do live forensics.

    3. It can be done only with special RAID imaging software.

    4. Image the entire array as a single disk.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.174.195