Search Header Logo

Unit 11 Topic E Forensics

Authored by Ralph Ellis

Computers

12th Grade

Used 35+ times

Unit 11 Topic E Forensics
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The digital forensic process has five basic stages:

Identification, Preservation, Collection, Analysis and what else?

Reporting

Diagnosis

Reduction

Ignoring

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which stage of the digital forensic process?

An in-depth systematic search of evidence relating to the incident being investigated.

Identification

Preservation

Collection

Analysis

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of digital forensics is the monitoring, capture, storing and analysis of network activities or events in order to discover the source of security attacks, intrusions or other problem incidents

Network Forensics

Computer Forensics

Mobile Device Forensics

Digital Image Forensics

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of digital forensics is the extraction and analysis of digitally acquired photographic images to validate their authenticity by recovering the metadata of the image file to ascertain its history.

Network Forensics

Computer Forensics

Mobile Device Forensics

Digital Image Forensics

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following forensics tools can be classified as a computer forensics category?

Disk and data capture tools

File viewers

Registry analysis tools

Packet inspection tool

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should not be done during a computer forensic investigation?

Modify date/time stamps of files

Take copy of hard drive

Identify and recover all files

Access hidden and protected files

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are reasons for a computer forensics investigation?

Intellectual Property theft

Fraud investigations

Inappropriate email and Internet use in the workplace

Burglary attempt

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?