This class was created by Brainscape user Joshua Tharrington. Visit their profile to learn more about the creator.

Decks in this class (15)

Cengage Chapter 1 - Understanding the Digital Forensics Profession and Operations
A notarized document given under ...,
A charge made against someone or ...,
A fireproof container locked by a...
38  cards
Cengage Chapter 2 - The Investigator's Office and Laboratory
A wholly owned subsidiary of ansi...,
A document that provides justific...,
A certification from the internat...
12  cards
Cengage Chapter 3 - Data Acquisition
An open source data acquisition f...,
An area of a disk drive reserved ...,
A data acquisition method used wh...
9  cards
Cengage Chapter 4 - Processing Crime and Incident Scenes
A computerized system for identif...,
Data generated by a computer such...,
Digital files generated by a pers...
24  cards
Cengage Chapter 5 - Working with Windows and CLI Systems
Ways in which data can be appende...,
An 8 bit coding scheme that assig...,
The number of bits per square inc...
57  cards
Cengage Chapter 6 - Current Digital Forensics Tools
The process of creating a duplica...,
The process of trying every combi...,
A project sponsored by the nation...
11  cards
Cengage Chapter 7 -Linux and Macintosh File Systems
The file system introduced in mac...,
In the macos file system a group ...,
A macos file that organizes the d...
37  cards
Cengage Chapter 8 - Recovering Graphic Files
Collections of dots or pixels in ...,
The process of recovering file fr...,
The process of coding data from a...
21  cards
Quiz 1
In the case of dennis rader bette...,
The principle that says in the ph...,
In a civil case both parties are ...
20  cards
Quiz 2
Flash memory is made up of transi...,
If you change the file extension ...,
Some instant messaging applicatio...
10  cards
Quiz 3
The variety of tools and software...,
Advantages including cost savings...,
Connecting an evidence drive brou...
19  cards
Quiz 4
Securing a traditional scene is a...,
Books and manuals can give invest...,
Cellphones are vulnerable because...
20  cards
Quiz 5
Deleting a file only tells the co...,
Unallocated space refers to the d...,
When a computer is in sleep mode ...
10  cards
Quiz 6
The microchip on the motherboard ...,
The key space or key length has n...,
The best encryption algorithms ar...
10  cards
Quiz 7
In order to be considered an expe...,
The duty to preserve potentially ...,
For fourth amendment purposes a p...
15  cards

More about
CCT-121

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Joshua Tharrington's CCT-121 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CCT
  • 22 decks
  • 291 flashcards
  • 2 learners
Decks: 01 Infosec Threats, 02 Information Security Attacks, 03 Information Security Fundamentals, And more!
Второе дыхание 1-21
  • 49 decks
  • 2136 flashcards
  • 91 learners
Decks: основные данные о курсе, 01, 01, And more!
CCT
  • 10 decks
  • 149 flashcards
  • 116 learners
Decks: Flight Physiology, Ventilator Management, Sepsis Shock, And more!
Bio 121
  • 22 decks
  • 567 flashcards
  • 101 learners
Decks: Lec 1, Lec 2, Lec 3, And more!
Make Flashcards