Buy Solved Liberty University CJUS 363 Quiz 2 

Buy Solved Liberty University CJUS 363 Quiz 2

 

Set 1

  1. ​What third-party encryption tool creates a virtual encrypted volume, which is a file mounted as though it were a disk drive?
  2. ___________ are made up of one or more platters coated with magnetic material, and data ​is stored in a particular way.
  3. ​The ImageUSB utility can be used to create a bootable flash drive.
  4. The purpose of a ______________ is to provide a mechanism for recovering files encrypted with EFS if there’s a problem with the user’s original private key.​
  5. FTK Imager software can acquire a drive’s host-protected area.​
  6. FAT32 is used on older Microsoft OSs, such as MS-DOS 3.0 through 6.22, Windows 95 (first release), and Windows NT 3.3 and 4.0.​
  7. The ______________ is the device that reads and writes data to a drive.​
  8. A forensics investigator should verify that acquisition tools can copy data in the HPA of a disk drive.​
  9. A Master Boot Record (MBR) partition table marks the first partition starting at what offset?​
  10. When two files with different contents generate the same digital fingerprint using a hashing function, a(n) ____________ has occurred.​
  11. ​An investigator wants to capture all data on a SATA drive connected to a Linux system. What should the investigator use for the “if= ” portion of the dcfldd command?
  12. ​Which option below is not a hashing function used for validation checks?
  13. ​What term below describes a column of tracks on two or more disk platters?
  14. When using the File Allocation Table (FAT), where is the FAT database typically written?​
  15. _____________ is composed of the unused space in a cluster between the end of an active file’s content and the end of the cluster.​
  16. What command below can be used to decrypt EFS files?​
  17. What term is used to describe a disk’s logical structure of platters, tracks, and sectors?
  18. ​What is the command?
  19. When data is deleted on a hard drive, only references to it are removed, which leaves the original data on unallocated disk space.​
  20. What metadata record in the MFT keeps track of previous transactions to assist in recovery after a system failure in an NTFS volume?​
  21. Someone who wants to hide data can create hidden partitions or voids- large unused gaps between partitions on a disk drive. Data that is hidden in partition gaps cannot be retrieved by forensics utilities.
  22. ​________________ software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
  23. ​What registry file contains user account management and security settings?
  24. ​Which RAID type provides increased speed and data storage capability, but lacks redundancy?
  25. ​A typical disk drive stores how many bytes in a single sector?

Set 2

  1. is composed of the unused space in a cluster between the end of an active file’s content and the end of the cluster.
  2. Someone who wants to hide data can create hidden partitions or voids­ large unused gaps between partitions on a disk drive. Data that is hidden in partition gaps cannot be retrieved by forensics utilities.
  3. What term below describes a column of tracks on two or more disk platters?
  4. When data is deleted on a hard drive, only references to it are removed, which leaves the original data on unallocated disk space.
  5. A Master Boot Record (MBR) partition table marks the first partition starting at what offset?
  6. The _______ copies evidence of intrusions to an investigation workstation automatically for further analysis over the network.
  7. What registry file contains installed programs’ settings and associated usernames and passwords?
  8. What metadata record in the MFT keeps track of previous transactions to assist in recovery after a system failure in an NTFS volume?
  9. An investigator wants to capture all data on a SATA drive connected to a Linux system. What should the investigator use for the “if=” portion of thedcfldd command?
  10. are made up of one or more platters coated with magnetic material, and data is stored in a particular way.
  11. The ImageUSB utility can be used to create a bootable flash drive.
  12. A typical disk drive stores how many bytes in a single sector?
  13. What term is used to describe a disk’s logical structure of platters, tracks, and sectors?
  14. When two files with different contents generate the same digital fingerprint using a hashing function, a(n) ____________ has occurred.
  15. A forensics investigator should verify that acquisition tools can copy data in the HPA of a disk drive.
  16. FAT32 is used on older Microsoft OSs, such as MS­DOS 3.0 through 6.22, Windows 95 (first release), and Windows NT 3.3 and 4.0.
  17. The ______________ is the device that reads and writes data to a drive.
  18. What is the dd command?
  19. What command below can be used to decrypt EFS files?
  20. What registry file contains user account management and security settings?
  21. the software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
  22. What third-party encryption tool creates a virtual encrypted volume, which is a file mounted as though it were a disk drive?
  23. FTK Imager software can acquire a drive’s host-protected area.
  24. Which option below is not a hashing function used for validation checks?
  25. The purpose of a ______________ is to provide a mechanism for recovering files encrypted with EFS if there’s a problem with the user’s original private key.

Need Help with Quiz?

 

Are your exams coming up soon? I need someone to take my online exam, right? Do you need someone to lend a hand during these trying times? Welcome to Get Your Exam Done! We are a service that connects struggling students with qualified academics for academic support. Through hands-on assistance throughout the exam, we assist students with their online exams.No matter what your topic is, we have experts who are experts in it all. So, get on board! Let’s address your concerns about take my online exam. We are available round the clock. You can call us at any time to discuss issues with your online exam and receive solutions.


Live in United States (US)
Live in Pakistan
The exam online at home is taken by professionals with extreme low pricing plans.

150+

Qualified Tutors

Get Started
Buy Solved Liberty University CJUS 363 Quiz 2  $2.99
  • 266 Downloads
  • 2.4k Views


Pay Someone To Do Your Online Test, Online Quiz, Courses, Online Exam, and Online Classes! Enroll Now