Podcast
Questions and Answers
What is the most effective way to avoid leaving evidence of activity?
What is the most effective way to avoid leaving evidence of activity?
- Avoid creating the data in the first place (correct)
- Use a virtual machine
- Run the OS from a removable drive
- Use a portable app
What is the importance of encryption in removing evidence of activity?
What is the importance of encryption in removing evidence of activity?
- It deletes all files created by the registry
- It secures data on a removable disk
- It makes data recoverable without a key (correct)
- It makes data readable without a key
What is the advantage of running the OS from a removable drive?
What is the advantage of running the OS from a removable drive?
- It deletes all files created by the registry
- It makes data unrecoverable without the encryption key
- It allows for physical security or destruction of the data (correct)
- It makes data readable without a key
What is the promise of using a virtual machine?
What is the promise of using a virtual machine?
What is the benefit of using portable apps?
What is the benefit of using portable apps?
What can be used if none of the previous methods were used?
What can be used if none of the previous methods were used?
What is the availability of CCleaner?
What is the availability of CCleaner?
What is the availability of BleachBit?
What is the availability of BleachBit?
Why is it important to avoid creating data in the first place?
Why is it important to avoid creating data in the first place?
What is the purpose of securely wiping the VM?
What is the purpose of securely wiping the VM?
A forensic expert can always recover deleted data from a computer.
A forensic expert can always recover deleted data from a computer.
Encryption can make data unrecoverable even if it is found.
Encryption can make data unrecoverable even if it is found.
Running the OS from a removable drive can completely eliminate evidence of activity.
Running the OS from a removable drive can completely eliminate evidence of activity.
Using a virtual machine can completely delete all files created by the registry.
Using a virtual machine can completely delete all files created by the registry.
CCleaner is only available on Windows.
CCleaner is only available on Windows.
BleachBit is available on all operating systems.
BleachBit is available on all operating systems.
Portable apps can make it impossible to retrieve data.
Portable apps can make it impossible to retrieve data.
CCleaner and BleachBit can be used to securely wipe data.
CCleaner and BleachBit can be used to securely wipe data.
Running the OS from a removable drive can make data retrieval easier.
Running the OS from a removable drive can make data retrieval easier.
Using encryption can make data readable without the encryption key.
Using encryption can make data readable without the encryption key.
Using a virtual machine can make it impossible to retrieve data.
Using a virtual machine can make it impossible to retrieve data.
CCleaner is only available on Windows and Linux.
CCleaner is only available on Windows and Linux.
A forensic expert will always find some data left behind.
A forensic expert will always find some data left behind.
BleachBit is only available on Windows.
BleachBit is only available on Windows.
Running the OS from a removable drive can eliminate all evidence of activity.
Running the OS from a removable drive can eliminate all evidence of activity.
Encryption can make data readable without the encryption key.
Encryption can make data readable without the encryption key.
Avoiding creating data in the first place is the most effective way to remove evidence of activity.
Avoiding creating data in the first place is the most effective way to remove evidence of activity.
CCleaner and BleachBit can be used to securely wipe data.
CCleaner and BleachBit can be used to securely wipe data.
Using portable apps can make it impossible to retrieve data.
Using portable apps can make it impossible to retrieve data.
Encryption can make data unrecoverable even if it is found.
Encryption can make data unrecoverable even if it is found.
Avoiding creating data in the ______ place is the most effective way to remove evidence of activity.
Avoiding creating data in the ______ place is the most effective way to remove evidence of activity.
A forensic expert will always find some data left behind either on ______ or in the operating system registry.
A forensic expert will always find some data left behind either on ______ or in the operating system registry.
Using ______ can make retrieving the data much more difficult.
Using ______ can make retrieving the data much more difficult.
The third option is running the OS from a ______ drive.
The third option is running the OS from a ______ drive.
Using ______ can make data unrecoverable even if it is found.
Using ______ can make data unrecoverable even if it is found.
We can use programs like ______ if none of the previous methods were used.
We can use programs like ______ if none of the previous methods were used.
BleachBit is available on ______ and Linux.
BleachBit is available on ______ and Linux.
The promise of using a ______ machine is that we can delete the VM with all the data after we are done with our work.
The promise of using a ______ machine is that we can delete the VM with all the data after we are done with our work.
CCleaner is available on ______, Mac, and Linux.
CCleaner is available on ______, Mac, and Linux.
Running the OS from a ______ drive can make retrieving the data much more difficult.
Running the OS from a ______ drive can make retrieving the data much more difficult.