Definition 1 of 56
What does North bridge on a PC motherboard include?
Hd, Usb, Nic
Ram, Hd
RAM, CPU, Video
Full, Quick, Sector Level, And Custom
Definition 2 of 56
Encrypted mobile backup. List of 10 passwords. How to configure options for processing:
Check X and then enter each password in the Y box.
Computer, Memory
Token, Username And Password
Search Mobile Backups, Mobile Backup Password
Command Line On The Suspect's Computer
Definition 3 of 56
Allows Windows to backup entire volumes. Previous versions are created a minimum of once
per day. A windows service. It is possible to scan ONLY this from a drive.
Recovered Deleted File
Volume Shadow Copy
File System Explorer
Windows Memory Diagnostic
,Definition 4 of 56
keyword search for all content and there are hits located in unallocated space, where will
these results be displayed?
These Hits Will Not Be Displayed.
Uncategorized Keyword Hits
Threads
Keyword Snippets
Definition 5 of 56
Magnet's free utility to capture RAM
Ram
Ram, Cpu, video
Magnet RAM capture
Token
Term 6 of 56
The image acquisition capabilities of Magnet Axiom can be run through a virtual machine (T/F)
True
False
Definition 7 of 56
Two bridges on a PC motherboard
East, West
Center, West, East
South Bridge
North, South
,Definition 8 of 56
The explorer view you must be in to access a SQLite database
Artifact Explorer
Connections Explorer
File System Explorer
Ascii
Definition 9 of 56
SIze of a FAT image file
4 GB
2 Gb
1 Ghz
8 Gb
Definition 10 of 56
Module that scans for security identifiers such as things that have maliciously escalated
privileges and which processes belong to whom. PROCESS SECURITY IDENTIFIERS.
PSXVIEW
FILESCAN
PSLIST
GETSIDS
Term 11 of 56
Axiom will automatically select and search for all computer and mobile artifacts across the
cloud evidence when processing cloud evidence (T/F)
True
False
, Definition 12 of 56
Two methods that can be used to access a user's account for cloud extraction
Full, quick, sector level, and custom
File system explorer
Token, Username and password
Ram, cpu, video
Term 13 of 56
Can you edit the scan information once processing has completed?
Yes
No
Definition 14 of 56
A module that scans for possible malware on a system by searching for injected code
MALWARE FINDER.
GETSIDS
PSLIST
SHIMCACHE
MALFIND
Definition 15 of 56
A module that scans for current processes that are running in memory. Stores process name,
ID, start & end date/time, # of threads for the process
PSINFO
PSLIST
PSXVIEW
PSTREE
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller selftest. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.00. You're not tied to anything after your purchase.