Search Header Logo

Computer forensics in crime investigation

Authored by Leydi Nayeli Dzul Pech

Computers

8th Grade

Used 72+ times

Computer forensics in crime investigation
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is computer forensics?

It is an attempt to expose, alter, destabilize, destroy, remove to gain unauthorized access or use an asset.

It is the discipline that combines the elements of law and computer science to collect and analyze data from computer Systems, network, Wireless communications and storage devices in a way that is admisible as evidence in a court of law.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the examples of latent data? choose 3.

Belkasoft Live RAM capturer

Information that is in the computer's storage but is not easily mentioned in the file allocation tables.

Data that has been deliberately removed.

Information that the operating System or commonly used software Application cannot easily see.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. A _______ has occurred, collecting all relevant evidence is of the utmost importance in answering the questions described above.

file headers.

forensic investigator.

cyber attack.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the main types of computer forensics?

Of operating Systems

Of security

Of network.

On the cloud.

On Mobile devices

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It is the process of retrieving useful Information from the computer or mobile device in questions.

Of network

On the cloud

Of operating Systems

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It aims to retrieve digital evidence or relevant data from a mobile device in a way that preserves the evidence in a sound forensic condition.

On the cloud

Of operating Systems

On mobile devices

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It refers to the collection, monitoring, and analysis of network activities to discover the source of attacks, viruses, intrusions, or security breaches that occur On a network or in network traffic.

On the cloud

On mobile devices

Of operating Systems

Of network

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?