Which of the following directories contain the information that is found on a Windows 98 Desktop?
How many partitions can be found in the boot partition table found at the beginning of the drive?
You are at an incident scene and determine that a computer contains evidence as described in the search warrant. When you seize the computer, you should:
The following keyword was typed in exactly as shown. Choose the answer(s) that would be found. All search criteria have default settings. Tom
Before utilizing an analysis technique on computer evidence, the investigator should:
The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. 800[) \-]+555-1212
The EnCase methodology dictates that the lab drive for evidence have a __________ prior to making an image.
Which is the proper formula for determining the size in bytes of a hard drive that uses cylinders (C), heads (H), and sectors (S) geometry?
In Windows 98 and ME, Internet based e-mail, such as Hotmail, will most likely be recovered in the _____________________ folder.
A standard Windows 98 boot disk is acceptable for booting a suspect drive.
You are investigating a case involving fraud. You seized a computer from a suspect who stated that the computer is not used by anyone other than himself. The computer has Windows 98 installed on the hard drive. You find the filename C:\downloads\check01.jpg?that EnCase shows as being moved. The starting extent is 0C4057. You find another filename C:\downloads\chk1.dll with the starting extent 0C4057, which EnCase also shows as being moved. In the C:\windows\System folder you find an allocated file named chk1.dll with the starting extent 0C4057. The chk1.dll file is a JPEG image of a counterfeit check. Could this information be used to refute the suspect claim that he never knew it was on the computer?