Appendix A. Answer Key

CHAPTER 1 System Forensics Fundamentals

  1. F

  2. A

  3. Clues

  4. B

  5. A, B, and D

  6. C

  7. B

  8. A

  9. Disk forensics

  10. Live system forensics

  11. Software forensics

CHAPTER 2 Overview of Computer Crime

  1. DoS/DDoS attacks

  2. A and C

  3. B

  4. Hacking

  5. C and D

  6. A

  7. A

  8. B

  9. C

  10. B

  11. D

  12. Federal crimes

CHAPTER 3 Challenges of System Forensics

  1. C

  2. A, C, and D

  3. A

  4. Data analysis plan

  5. D

  6. C

  7. Locard's exchange principle

  8. A

  9. B

  10. B, C, and D

CHAPTER 4 Forensics Methods and Labs

  1. Forensically sound

  2. C

  3. B

  4. Business case

  5. B

  6. B

  7. A, B, and C

  8. C

  9. B, C, and E

  10. B

  11. A

  12. B and C

  13. 150

  14. C

  15. B

CHAPTER 5 System Forensics Technologies

  1. Department of Defense (DoD)

  2. D

  3. B

  4. B

  5. A

  6. Fuzzy logic tool

  7. B

  8. B

  9. B

  10. EnCase

  11. C

  12. C

  13. D

  14. A

  15. C

CHAPTER 6 Controlling a Forensic Investigation

  1. D

  2. Live analysis school of thought

  3. B

  4. B

  5. B

  6. A

  7. A, C, and D

  8. B

  9. C

  10. Unallocated space

  11. Fourth

  12. A

CHAPTER 7 Collecting, Seizing, and Protecting Evidence

  1. A

  2. C

  3. B

  4. Five rules of evidence ...

Get System Forensics, Investigation, and Response now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.