21) Which of the following statements is true of electronically stored information?
A) Deleting electronically stored information destroys it, just like burning or shredding a paper document would.
B) The volume of electronically stored information is usually much lesser than paper information but it is difficult to see how communication records quickly accumulate compared to paper information.
C) Unlike paper information, electronically stored information cannot be easily altered or damaged.
D) Few features of electronically stored information like metadata have no counterpart in paper form.
22) Which of the following statements is true of flash memory media?
A) Data are recorded by a laser in this type of media that alters light-sensitive dyes within the disk.
B) The absence of moving parts or sensitive surfaces makes this type of media relatively less vulnerable to damage.
C) Data are stored by altering the magnetic polarity of chips.
D) The recording process introduces the possibility of mechanical failure in this type of media.
23) Which of the following is an example of a flash memory media?
A) external solid-state disk (SSD) drives
B) blu-ray disks
C) DVDs which are not rewritable
D) tape cartridges
24) Which of the following statements is true of magnetic media?
A) Data are recorded by a laser in this type of media that alters light-sensitive dyes within the disk.
B) The absence of moving parts or sensitive surfaces makes it relatively less vulnerable to damage.
C) Magnetic media on devices is usually maintained by others that can be accessed through the internet.
D) The recording process requires rotation of the disk or tape, which introduces the possibility of mechanical failure in magnetic media.
25) Which of the following is an example of a writable optical media?
A) Blu-ray disks
B) USB flash drives
C) external solid-state disk (SSD) drives
D) tape cartridges
26) Which of the following statements is true of the cloud storage media?
A) Data are recorded by a laser in this type of media that alters light-sensitive dyes within the disk.
B) Data are stored by altering the magnetic polarity of disks or tapes in this type of media.
C) Cloud storage media on devices is usually maintained by others that can be accessed through the Internet.
D) The recording process requires rotation of the disk or tape, which introduces the possibility of mechanical failure in cloud storage media.
27) Which of the following is an example of data stored in “the clouds”?
A) Blu-ray disks
B) USB flash drives
C) Google Docs
D) tape cartridges
28) Which of the following statements is true of a computer forensics engagement?
A) The type, make, or model of the subject storage devices must be identified because if the devices are not readily visible or perhaps stored out of sight, an expert can easily access the data.
B) Privacy rights related to confidential personal information must be observed, because improperly accessing data stored on electronic devices may constitute a violation of federal laws.
C) The location of the subject devices is not so important because even if the devices are not readily visible or perhaps stored out of sight, an expert can easily access the data.
D) The number of subject devices is a not primary factor in estimating the time necessary to complete the analysis.
29) Which of the following statements is true of static forensics?
A) It is the analysis of static data in which extraction processes are performed against live data rather than a copy.
B) It is the analysis of live data in which extraction processes are performed against dynamic data rather than a copy.
C) It is the analysis of static data which involves creating a copy of all the data stored on the subject device and analyzing the copy in a secure environment.
D) It is the analysis of static data on devices usually maintained by others that can be accessed through the Internet.
30) Which of the following statements is true of digital data in computer forensics?
A) Latent data can be immediately seen, such as data files, program files, and files used by the operating system.
B) When deception or other wrongdoing is suspected, active data is often the primary focus.
C) Because archival data are not intended to be viewed, their recovery requires expertise and specialized tools.
D) Unlike a backup copy, a forensic copy is a bit-by-bit copy of the original drive, or an exact duplicate.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more