Digital Forensics SQA

Digital Forensics SQA

University

12 Qs

quiz-placeholder

Similar activities

Chapter 3 Exploring Linux Filesystems

Chapter 3 Exploring Linux Filesystems

11th Grade - University

10 Qs

Computer Network Fun Review 5 - Data Link Layer

Computer Network Fun Review 5 - Data Link Layer

University

10 Qs

QUIZ NUMBER 2

QUIZ NUMBER 2

University

10 Qs

Adobe Photoshop

Adobe Photoshop

University

10 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

BIM1014 Quiz 2

BIM1014 Quiz 2

KG - University

15 Qs

Digital Forensics SQA

Digital Forensics SQA

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Laura Sherrington

Used 77+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following acts states that individuals have a right to respect for the privacy of their e-mails

Copyright, Designs and Patents Act

Criminal Justice and Police Act

Human Rights Act

Computer Misuse Act

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following show why it is important to conduct an investigation on a copy of the data instead of the original

To allow other investigators to work on the data to speed up the investigation

To allow the investigation to be replicated

some tools will only work on copied data

To prevent any aspect of the investigation from tampering with the original evidence

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which stage of the digital forensics process would a write-blocker be used?

Acquisition

Reporting

Verification

Analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Applying preservation techniques during data acquisition can help to identify which of the following?

The name of the person who last logged in

Mac Number

Running programs

The IP address

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following software tools could be used during the analysis phase of the digital forensics process?

A word processor

A hex-editor

A network packet analyser

A file encryption tool

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three of the following statement s describes forensic readiness?

How prepared a digital forensic investigator is to present their evidence in a court of law

How easy it is for the digital forensic investigator to find evidence which proves that someone is guilty

A machine which has been imaged for the forensic purposes

How prepared an organisation is to respond to an incident

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following files could be retrieved during browser forensics?

index.dat

history.ffx

passwords.txt

google.cache

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?