Darren is a forensics expert working at the state crime lab. Today he’s examining a cell phone that was seized in a hacking case. Based on his understanding of digital forensics, what is likely his biggest concern at this stage of the investigation?

A.
making a duplicate copy of the phone’s hard drive
B.
obtaining a search warrant to examine the device
C.
preventing evidence from being remotely destroyed
D.
analyzing a combination of visible and latent data sources

C. preventing evidence from being remotely destroyed

Garrison is a digital investigator at the state crime lab. When he learned that a homicide suspect had destroyed his cell phone in an apparent attempt to conceal his online activity, what source of evidence was Garrison able to look at to get the information he needed?

A.
digital images
B.
website logs
C.
hex files
D.
ambient data

A. digital images

Anders is on the security team of a national company. He was recently asked to investigate whether a particular employee was improperly accessing the corporate network from home. Which type of file would Anders likely analyze to learn more about the employee’s use of the network?

A.
a dump file
B.
a log file
C.
a temporary internet file
D.
a latent file

B. a log file

Bao is a digital analyst at a large security firm. She recently took a case involving attacks made on a client’s corporate network. Without too much effort, Bao was able to determine the IP address of the computer that was launching the attacks, but this did nothing to increase her confidence in her ability to solve the case. Why?

A.
Internet service providers don’t store user data.
B.
IP addresses are not unique.
C.
The source of the hack was likely internal.
D.
Hackers often disguise their IP addresses.

D. Hackers often disguise their IP addresses.

Vadim has a piece of evidence that contains visible data. Which type of evidence does Vadim likely have?

A.
print spool file
B.
swap file
C.
slack space
D.
network card

A. print spool file

Which part of a computer uses RAM?

A.
software programs
B.
hardware
C.
the cloud
D.
the operating system