Evaluating Digital Forensic Tool Needs

Evaluating Digital Forensic Tool Needs

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

Data Structures

Data Structures

10th Grade - University

18 Qs

Unit 11 Topic E Forensics

Unit 11 Topic E Forensics

12th Grade

10 Qs

Java HashMap Quiz

Java HashMap Quiz

11th Grade

14 Qs

Emerging Trends - Class XI

Emerging Trends - Class XI

11th - 12th Grade

10 Qs

Java Basic Data Structures

Java Basic Data Structures

6th - 10th Grade

15 Qs

Digital Technology Careers Quiz

Digital Technology Careers Quiz

10th Grade - University

10 Qs

ICT- CSS 10

ICT- CSS 10

10th Grade

10 Qs

Chrome: Oooo...Shiny!!

Chrome: Oooo...Shiny!!

KG - University

10 Qs

Evaluating Digital Forensic Tool Needs

Evaluating Digital Forensic Tool Needs

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Brian Guillotte

Used 26+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Forensics software tools are grouped into GUI and command-line applications

True

False

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

According to ISO standard 27037, which of the following is an important factor in data acquisition?

The DEFR’s competency

The DEFR’s skills in using the command line

Conditions at the acquisition setting

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An encrypted drive is one reason to choose a logical acquisition.

True

False

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Hashing, filtering, and file header analysis make up which function of computer forensics tools?

Validation and verification

Acquisition

Extraction

Reconstruction

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hardware acquisition tools typically have built-in software for data analysis.

True

False

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following purposes is the reconstruction function NOT needed for

Re-create a suspect drive to show what happened

Create a copy of a drive for other investigators.

Recover file headers.

Re-create a drive compromised by malware.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Decompressing, carving, decrypting, and bookmarking are examples of subfunctions of the extraction function

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?