Gathering Evidence
Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Katherine Newport-forbes
Used 116+ times
FREE Resource
Enhance your content in a minute
8 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are some reasons for not pulling the plug on a computer that may contain evidence(check all that apply)
Any evidence on RAM is under threat of destruction
Interacting with a running computer in any way causes changes to the system
Sudden loss of power could damage the data
System may be unencrypted when powered on but return to an encrypted stage when powered off
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are some reasons to pull the plug on a computer that may contain evidence(check all that apply)
Any evidence on RAM is under threat of destruction
Interacting with a running computer in any way causes changes to the system
Sudden loss of power could damage the data
Change to a system may invalidate evidence
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of evidence is the least volatile
Data on hard disk
Routing table
CPU
Temporary file system/swap space
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which are the ideal ways to isolate a cell phone that may contain evidence(check all that apply)
Access data via find my phone
Turn it off
Put it in a Faraday bag
Put it in an empty paint can
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a clone?
Member of the republic's army
bit-for-bit copy of a hard drive
A program for file carving
Copy-and-pasted copy of a hard drive
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Why is it important to clone hard drives that may contain evidence?(check all that apply)
Clone gets data in unallocated space such as deleted or partially overwritten files
Clone also gets file system data
Clones allow for a "do over" if investigation alters the system
Clones only get active data
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
In what circumstances might an investigator have to clone a drive on site?(check all that apply)
If they do not have the proper warrants to take the drive to a lab
If the device is a personal computer
If the device is a server generating revenue for a business
If the investigation is a missing persons case
8.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Why are hash values valuable to forensic investigators?(check all that apply)
They can be used to verify that a system is identical to the original
Any change to a system will change the hash value
They are used to create and edit files
They are used to help clone a device
Similar Resources on Wayground
10 questions
TIN 10 - LẦN 1 - STVB 1
Quiz
•
10th Grade
10 questions
Year 9 - Computing - Networking - Transmission Media
Quiz
•
9th Grade
10 questions
Internet seguro
Quiz
•
8th Grade - University
10 questions
Tree
Quiz
•
12th Grade
11 questions
Parcial Electiva Profesional
Quiz
•
12th Grade
10 questions
Internet
Quiz
•
7th - 10th Grade
10 questions
Grade 11 Term 4 Practice 2
Quiz
•
11th Grade
9 questions
Los periféricos del computador
Quiz
•
1st Grade - Professio...
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
Discover more resources for Computers
15 questions
Internet Vocabulary Notebook Check #2 - CTEA(2024)
Quiz
•
12th Grade
11 questions
Internet Terms Vocabulary- Notebook Check #1- CTEA
Quiz
•
12th Grade
39 questions
UNIT 7 and UNIT 8 — Multiple Choice Question Bank (Extracted)
Quiz
•
9th Grade
50 questions
Money Matters Fall 2025 Final Exam — Worksheet Questions
Quiz
•
12th Grade
47 questions
CSF Final Exam Practice
Quiz
•
9th - 12th Grade
