Match the terms with the correct definitions?.

A. ?Data the system maintains, such as system log files and proxy server logs
B. A value created by an encryption utility's secret key?
C. A mathematic algorithm that translates a file into a unique hexadecimal value
D. ?An algorithm that produces a hexadecimal value of a file or storage media; used to determine whether data has changed
E. Electronic data that a person creates and saves on a computer or digital device, such as a spreadsheet or word-processing document
F. The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest
G. ?A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers
H. Detecting data transmissions to and from a suspect's computer? and a network server to determine the type of data being transmitted over a network
I. ?A unique hash number generated by a software tool and used to identify files
J. A portable kit containing only the minimum ?tools needed to perform disk acquisitions and preliminary forensics analysis in the field


A. ?Computer-generated records
B. Keyed hash set?
C. ?Cyclic Redundancy Check
D. ?Message Digest 5
E. ?Computer-stored records
F. ?Probable cause
G. ?Extensive-response field kit
H. Sniffing
I. ?Nonkeyed hash set
J. Initial-response field kit

Computer Science & Information Technology

You might also like to view...

Ideally, the hashcodes of two objects

A) should be equal when the objects are equal, and different when the objects have different values B) should be equal then the objects belong to the same class, and be different when the objects belong to different classes C) should be equal when the objects are instantiated with the same type from the same generic class D) should divide each other only when the class of one of the objects extends the class of the other

Computer Science & Information Technology

When creating a lookup field, it is important to only allow options from the lookup table

Indicate whether the statement is true or false

Computer Science & Information Technology

Critical Thinking QuestionsCase 2-1Camashaly needs to gather some additional statistics on its clients. An employee at Camashaly has created an initial query as shown in the accompanying figure that calculates the average amount paid. The employee is unsure what aggregate functions to use for additional calculations. Which aggregate function will count the number of records?

What will be an ideal response?

Computer Science & Information Technology

____ is software (or sometimes hardware) that allows to view the contents of wireless packets.

A. Spyware B. Malware C. Wireless packet sniffer D. Adware

Computer Science & Information Technology