Digital Forensics_Graphic Files

Digital Forensics_Graphic Files

10th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Word Processing Lessons 3 and 4 Review

Word Processing Lessons 3 and 4 Review

KG - University

20 Qs

Disk Management and Boot Sequence Vocab

Disk Management and Boot Sequence Vocab

9th - 12th Grade

15 Qs

Communication Technologies

Communication Technologies

10th Grade

18 Qs

Data/Copyright

Data/Copyright

11th Grade

20 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

Chapter 3: Storage devices and media (Part 2):

Chapter 3: Storage devices and media (Part 2):

10th - 11th Grade

15 Qs

emptech L1 A

emptech L1 A

12th Grade

15 Qs

Features & Uses of the Cloud

Features & Uses of the Cloud

10th - 11th Grade

20 Qs

Digital Forensics_Graphic Files

Digital Forensics_Graphic Files

Assessment

Quiz

Computers

10th - 12th Grade

Practice Problem

Medium

Created by

Tanesha Hollingshed

Used 23+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of creating a duplicate image of data; one of the required functions of digital forensics tools is called

Verification

Acquisition

Extraction

Validation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A project sponsored by the National Institute of Standards and Technology to manage research on digital forensics tools.

National Software Reference Library (NSRL)

password dictionary attack

Computer Forensics Tool Testing (CFTT)

Validation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A way to confirm that a tool is functioning as intended; one of the functions of digital forensics tools.

National Software Reference Library (NSRL)

Validation

Computer Forensics Tool Testing (CFTT)

Extraction

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of proving that two sets of data are identical by calculating hash values or using another similar method.

National Software Reference Library (NSRL)

Validation

Computer Forensics Tool Testing (CFTT)

Verification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A NIST project with the goal of collecting all known hash values for commercial software and OS files.

National Software Reference Library (NSRL)

Validation

Computer Forensics Tool Testing (CFTT)

Verification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools.

Extraction

Validation

Computer Forensics Tool Testing (CFTT)

Verification

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A method of finding files or other information by entering relevant characters, words, or phrases in a search tool.

Extraction

Keyword Search

Brute-Force Attack

Verification

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?