0% found this document useful (0 votes)
10 views

2.1 Ques

CNET239 review questions

Uploaded by

achyuth2806
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

2.1 Ques

CNET239 review questions

Uploaded by

achyuth2806
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

6/10/24, 10:18 PM Print Preview

Chapter 2: The Investigator’s Office and Laboratory Review Questions


Book Title: Guide to Computer Forensics and Investigations: Processing Digital Evidence
Printed By: Achyuth Chilakamari ([email protected])
© 2019 Cengage Learning, Cengage Learning

Review Questions

1. Which statement about deleted files is true?

a. Deleted files can be rebuilt from remnants that haven’t been overwritten.

b. After a file has been deleted from the Recycle Bin, it can’t be recovered.

c. After a file pointer has been deleted in the MFT, it can’t be recovered.

d. The MFT isn’t updated until all file remnants have been overwritten with
new data.

2. When a file is deleted from a storage device, only the pointer to the file
location is removed. True or False?

3. According to NIST standards, how many wipes should be done to erase data
completely?

a. Three

b. One

c. Two

d. Seven

4. Which of the following statements about the MFT is true?

a. The MFT is overwritten each time a file is deleted.

b. The MFT is updated to indicate free space when files are deleted.

c. The MFT and the Recycle Bin are the same file structure.

d. The MFT isn’t used in the NTFS file system.

5. Secure destruction of digital data requires doing which of the following?

a. Overwriting the MFT

https://ng.cengage.com/static/nb/ui/evo/index.html?deploymentId=60442525455045326071983335&eISBN=9781337568975&id=2078508478&nbId=… 1/2
6/10/24, 10:18 PM Print Preview

b. Writing 0s and 1s to the storage device to overwrite file remnants

c. Writing information in the MFT to file remnant locations

d. Deleting files from the Recycle Bin

Chapter 2: The Investigator’s Office and Laboratory Review Questions


Book Title: Guide to Computer Forensics and Investigations: Processing Digital Evidence
Printed By: Achyuth Chilakamari ([email protected])
© 2019 Cengage Learning, Cengage Learning

© 2024 Cengage Learning Inc. All rights reserved. No part of this work may by reproduced or used in any form or by any means -
graphic, electronic, or mechanical, or in any other manner - without the written permission of the copyright holder.

https://ng.cengage.com/static/nb/ui/evo/index.html?deploymentId=60442525455045326071983335&eISBN=9781337568975&id=2078508478&nbId=… 2/2

You might also like