1) Kali Linux can be useful in forensics for ___________.
A. (none of the choices is correct)
B. quality control
C. primary analysis
D. OS installation
2) Which of the following is not a step in preparing a device for analysis?
A. hash hard drive
B. photograph connections
C. interview witnesses
D. label wires
3) One social issue we discussed that sometimes conflicts with the need for forensic analysis is ___________.
A. right to vote
B. freedom of assembly
C. privacy
D. food deserts
4) Where would an analyst search on a Windows machine for evidence of failed logon attempts?
A. application logs
B. (none of the choices is correct)
C. forwarded events logs
D. security logs