
Computer Forensics Investigation Process
Authored by Aidora Abdullah
Computers
University
Used 217+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of copying data is known as:
data acquisition
data analysis
data documentation
data recovery
2.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
There are 2 types of data acquisition: static and (a) .
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Warrants are NOT needed during the search and seizure stage if:
we are very sure the suspect is guilty.
destruction of evidence is imminent.
person with authority consents.
the crime committed is in plain sight.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false: live acquisition can file metadata, like date and time values.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: static acquisition will produce the same results no matter how many times the data is acquired.
True
False
6.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
The (a) format is an older, open source disk-to-image file format.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the advantages of the raw format?
Fast data transfer
Capability to ignore minor data read errors on the source drive.
Does not require as much storage space as the original disk.
Most forensic tools can read the raw format.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?