Search Header Logo

Digital Forensics Revision

Authored by Laura Sherrington

Computers

University

Used 217+ times

Digital Forensics Revision
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following acts states that individuals have a right to respect for the privacy of their e-mails

Copyright, Designs and Patents Act

Criminal Justice and Police Act

Human Rights Act

Computer Misuse Act

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following show why it is important to conduct an investigation on a copy of the data instead of the original

To allow other investigators to work on the data to speed up the investigation

To allow the investigation to be replicated

some tools will only work on copied data

To prevent any aspect of the investigation from tampering with the original evidence

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which stage of the digital forensics process would a write-blocker be used?

Acquisition

Reporting

Verification

Analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Applying preservation techniques during data acquisition can help to identify which of the following?

The name of the person who last logged in

Mac Number

Running programs

The IP address

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following software tools could be used during the analysis phase of the digital forensics process?

A word processor

A hex-editor

A network packet analyser

A file encryption tool

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three of the following statement s describes forensic readiness?

How prepared a digital forensic investigator is to present their evidence in a court of law

How easy it is for the digital forensic investigator to find evidence which proves that someone is guilty

A machine which has been imaged for the forensic purposes

How prepared an organisation is to respond to an incident

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following files could be retrieved during browser forensics?

index.dat

history.ffx

passwords.txt

google.cache

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?