Chapter 6

1. What set of rules and conventions governs how computers exchange information over the network medium?

Answer: Protocols. A protocol describes the syntax, semantics, and synchronization of communication and may be implemented in hardware, software, or both.

2. Name some factors that motivate criminal activity.

Answer: Financial gain, anger or revenge, power, addiction, boredom, thrill-seeking, intellectual gain, recognition, sexual impulses, curiosity, and psychiatric illness.

3. As a Word document is written and changed, these changes are tracked and produce a type of evidence that is called what?

Answer: Metadata. Metadata includes hidden information that Microsoft Office programs add to a file to help people collaborate on writing ...

Get Computer Forensics JumpStart, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.