Digital Forensics SQA

Digital Forensics SQA

University

12 Qs

quiz-placeholder

Similar activities

Review Pertemuan 1 dan 2 - RKS Python

Review Pertemuan 1 dan 2 - RKS Python

University

16 Qs

Komputer Masyarakat IF VI-E

Komputer Masyarakat IF VI-E

University

10 Qs

Cyber Attribution Quiz

Cyber Attribution Quiz

University

10 Qs

TECHNOLOGY FOR TEACHING AND LEARNING

TECHNOLOGY FOR TEACHING AND LEARNING

University

10 Qs

E-Commerce

E-Commerce

University

10 Qs

Digital Forensics Examinations Lab

Digital Forensics Examinations Lab

University

8 Qs

Incident Response - Quiz 1

Incident Response - Quiz 1

University

10 Qs

UTB - FCNS 221PB

UTB - FCNS 221PB

University

10 Qs

Digital Forensics SQA

Digital Forensics SQA

Assessment

Quiz

Computers

University

Hard

Created by

Laura Sherrington

Used 76+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following acts states that individuals have a right to respect for the privacy of their e-mails

Copyright, Designs and Patents Act

Criminal Justice and Police Act

Human Rights Act

Computer Misuse Act

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following show why it is important to conduct an investigation on a copy of the data instead of the original

To allow other investigators to work on the data to speed up the investigation

To allow the investigation to be replicated

some tools will only work on copied data

To prevent any aspect of the investigation from tampering with the original evidence

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which stage of the digital forensics process would a write-blocker be used?

Acquisition

Reporting

Verification

Analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Applying preservation techniques during data acquisition can help to identify which of the following?

The name of the person who last logged in

Mac Number

Running programs

The IP address

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following software tools could be used during the analysis phase of the digital forensics process?

A word processor

A hex-editor

A network packet analyser

A file encryption tool

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three of the following statement s describes forensic readiness?

How prepared a digital forensic investigator is to present their evidence in a court of law

How easy it is for the digital forensic investigator to find evidence which proves that someone is guilty

A machine which has been imaged for the forensic purposes

How prepared an organisation is to respond to an incident

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following files could be retrieved during browser forensics?

index.dat

history.ffx

passwords.txt

google.cache

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?