Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?
How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?
Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?
Which method of copying digital evidence ensures proper evidence collection?
The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.
Which digital evidence should a forensic investigator collect to investigate this incident?
After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.
Which digital evidence should be collected?
A forensic investigator is acquiring evidence from an iPhone.
What should the investigator ensure before the iPhone is connected to the computer?
What is one purpose of steganography?
Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?
Which tool identifies the presence of steganography?