CSF 6.6 Assessment Review - Digital Forensics

CSF 6.6 Assessment Review - Digital Forensics

Assessment

Flashcard

Computers

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

6 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which image best portrays your current mood?

Back

undefined

2.

FLASHCARD QUESTION

Front

True or False? The overall goal of digital forensics is to troubleshoot, monitor, recover, and protect sensitive data.

Back

True

Answer explanation

The statement is true because the overall goal of digital forensics is indeed to troubleshoot, monitor, recover, and protect sensitive data. Here's why:

  1. Troubleshooting: Digital forensics involves investigating and analyzing digital devices and systems to identify and resolve issues related to security breaches, cybercrimes, data breaches, or other incidents. This may include identifying the cause of a security incident, such as a data breach or unauthorized access, and implementing measures to prevent similar incidents in the future.

  2. Monitoring: Digital forensics also includes continuous monitoring of digital systems and networks to detect and prevent security threats or unauthorized activities. This may involve monitoring network traffic, system logs, user activities, and other digital artifacts for signs of suspicious behavior or security vulnerabilities.

  3. Recovery: In the event of a security incident or data breach, digital forensics professionals are responsible for recovering and preserving digital evidence related to the incident. This may involve collecting and analyzing data from various sources, such as computers, mobile devices, servers, and cloud services, to reconstruct the sequence of events and identify the perpetrators.

  4. Protecting Sensitive Data: Digital forensics aims to protect sensitive data by implementing security measures to prevent unauthorized access, data breaches, and other security incidents. This may include implementing encryption, access controls, intrusion detection systems, and other security measures to safeguard sensitive information from unauthorized disclosure or misuse.

3.

FLASHCARD QUESTION

Front

Which is a type of cyber forensics? Options: Mobile device forensics, Encryption forensics, Trojan horse forensics, None of the above

Back

Mobile device forensics

Answer explanation

The correct answer is:

Mobile device forensics

Explanation:

  1. Mobile device forensics: This type of cyber forensics involves the investigation and analysis of digital evidence from mobile devices such as smartphones, tablets, and wearables. Mobile device forensics is crucial in cases involving crimes or incidents where digital evidence is stored or accessed through mobile devices.

  2. Encryption forensics: While encryption plays a significant role in cybersecurity, encryption forensics isn't typically recognized as a distinct type of cyber forensics. Instead, it's part of the broader field of digital forensics, involving the analysis of encrypted data to recover plaintext or assess the strength of encryption methods used.

  3. Trojan horse forensics: Similarly, "Trojan horse forensics" isn't a recognized category of cyber forensics. Trojan horses are a type of malicious software that masquerades as legitimate software, but their investigation and analysis would typically fall under malware forensics, a subfield of digital forensics.

4.

FLASHCARD QUESTION

Front

Documentation is crucial when dealing with a digital crime scene. The crime scene should be documented in as much detail as possible, especially before any evidence is moved and or examined. True or False?

Back

True

Answer explanation

True

Explanation: Documentation is indeed crucial when dealing with a digital crime scene. It's essential to document the scene thoroughly and in as much detail as possible before any evidence is moved or examined. Proper documentation helps preserve the integrity of the evidence and ensures that investigators have a clear understanding of the scene and the context of the evidence they collect. This documentation may include photographs, videos, sketches, notes, and logs of observations made at the crime scene.

5.

FLASHCARD QUESTION

Front

True or False. After documenting the crime scene through photographs and diagramming, the investigator can feel free to power down and pack up all of the devices.

Back

False

Answer explanation

After documenting the digital/cybercrime scene, the investigator should not power down and pack up all devices until they have made a forensic copy of all the relevant data and information found on the devices. This copy is made using specialized forensic tools that preserve the integrity of the data and ensure that it can be used as evidence in court.

Additionally, in digital/cybercrime investigations, the investigator may need to continue monitoring the network or device for any ongoing activity or communication. Therefore, it is important to be methodical and complete in the processing of a digital/cybercrime scene to ensure that all relevant evidence is collected, preserved, and analyzed.

6.

FLASHCARD QUESTION

Front

How confident do you feel about this topic?

Back

Very confident, Mostly confident, Somewhat confident, Not confident at all