Gathering Evidence

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Katherine Newport-forbes
Used 115+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are some reasons for not pulling the plug on a computer that may contain evidence(check all that apply)
Any evidence on RAM is under threat of destruction
Interacting with a running computer in any way causes changes to the system
Sudden loss of power could damage the data
System may be unencrypted when powered on but return to an encrypted stage when powered off
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are some reasons to pull the plug on a computer that may contain evidence(check all that apply)
Any evidence on RAM is under threat of destruction
Interacting with a running computer in any way causes changes to the system
Sudden loss of power could damage the data
Change to a system may invalidate evidence
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of evidence is the least volatile
Data on hard disk
Routing table
CPU
Temporary file system/swap space
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which are the ideal ways to isolate a cell phone that may contain evidence(check all that apply)
Access data via find my phone
Turn it off
Put it in a Faraday bag
Put it in an empty paint can
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a clone?
Member of the republic's army
bit-for-bit copy of a hard drive
A program for file carving
Copy-and-pasted copy of a hard drive
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Why is it important to clone hard drives that may contain evidence?(check all that apply)
Clone gets data in unallocated space such as deleted or partially overwritten files
Clone also gets file system data
Clones allow for a "do over" if investigation alters the system
Clones only get active data
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
In what circumstances might an investigator have to clone a drive on site?(check all that apply)
If they do not have the proper warrants to take the drive to a lab
If the device is a personal computer
If the device is a server generating revenue for a business
If the investigation is a missing persons case
8.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Why are hash values valuable to forensic investigators?(check all that apply)
They can be used to verify that a system is identical to the original
Any change to a system will change the hash value
They are used to create and edit files
They are used to help clone a device
Similar Resources on Wayground
10 questions
HTML5 Forms

Quiz
•
11th - 12th Grade
10 questions
Basic Computer Parts

Quiz
•
7th - 9th Grade
10 questions
Error Detection Methods of Data Tranmission

Quiz
•
9th - 12th Grade
10 questions
Programming - Test Data

Quiz
•
3rd - 11th Grade
9 questions
Unit 1 - Data and Quality of Data

Quiz
•
10th Grade
8 questions
Communication and internet technologies

Quiz
•
9th - 11th Grade
11 questions
2.2 Methods of Error Detection Cambridge IGCSE 0478

Quiz
•
10th Grade - University
10 questions
DATA, INFORMATION AND KNOWLEDGE

Quiz
•
6th - 11th Grade
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade