CHAPTER 3 Forensic Methods and Labs
1. C
2. C
3. C
4. D
5. A
6. C
7. A
8. C
9. B
CHAPTER 4 Collecting, Seizing, and Protecting Evidence
1. SHA1
2. C
3. D
4. B
5. B
6. B
7. Swap file
8. A
CHAPTER 5 Understanding Techniques for Hiding and Scrambling Information
1. A
2. B
3. B
4. D
5. C
6. A
7. B
8. C
9. D
10. A
11. B
12. D
CHAPTER 10 Macintosh Forensics
1. A
2. D
3. A
4. A
CHAPTER 11 Mobile Forensics
1. A
2. C
3. A
4. Nascent
5. C.
CHAPTER 12 Performing Network Analysis
1. C
2. D
3. A
4. B
5. C
CHAPTER 13 Incident and Intrusion Response
1. B
2. A
3. B
4. B
CHAPTER 14 Trends and Future Directions
1. C
2. doubles; half
3. B
4. B
CHAPTER 15 System Forensics Resources
1. D
2. C
3. B