Guidance Software GD0-110 - Certification Exam for EnCE Outside North America
You are assigned to assist with the search and seizure of several computers. The magistrate ordered that the computers cannot be seized unless they are found to contain any one of ten previously identified images. You currently have the ten images in JPG format. Using the EnCase methodology, how would you best handle this situation?
In Windows 98 and ME, Internet based e-mail, such as Hotmail, will most likely be recovered in the _____________________ folder.
Two allocated files can occupy one cluster, as long as they can both fit within the allotted number of bytes.
The end of a logical file to the end of the cluster that the file ends in is called:
To later verify the contents of an evidence file?
This question addresses the EnCase for Windows search process. If a target word is within a logical file, and it begins in cluster 10 and ends in cluster 15 (the word is fragmented), the search:
A sector on a floppy disk is the same size as a sector on a NTFS formatted hard drive.
You are conducting an investigation and have encountered a computer that is running in the field. The operating system is Windows XP. A software program is currently running and is visible on the screen. You should:
A hash library would most accurately be described as:
The following keyword was typed in exactly as shown. Choose the answer(s) that would be found. All search criteria have default settings. Tom
