
Digital Forensics
Authored by Priya Savla
Computers
University
Used 354+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital evidence can't be time sensitive.
TRUE
FALSE
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Digital evidence can be altered, damaged or destroyed with little effort.
TRUE
FALSE
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
At which stage of the digital forensics process would a write-blocker be used?
Acquisition
Reporting
Verification
Analysis
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of copying data is known as:
data acquisition
data analysis
data documentation
data recovery
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Harold, a fraud examiner, collects a computer hard drive as potential evidence in an investigation. He creates a memorandum to record the chain of custody and documents what item was received, when it was received, and from whom it was received. To meet the minimum standard for a chain of custody memorandum, what else would Harold need to include?
The name of the judge who signed the seizure order, if applicable,
The value of the noncash item received,
An explanation of why the item was collected,
Where the item is maintained
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______ is the practice of concealing a file, message, image, or video within another file, message, image, or video.
Steganography
Cryptography
File hidding
Media Analysis
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Command to find out the internal ip using the dos prompt is ?
ipscan
itconfig
ipconflict
ipconfig
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?