Computer forensics in crime investigation

Computer forensics in crime investigation

8th Grade

20 Qs

quiz-placeholder

Similar activities

Jaringan komputer n sejarah internat

Jaringan komputer n sejarah internat

8th Grade

15 Qs

Coding Quiz

Coding Quiz

6th - 10th Grade

15 Qs

Networks & Topologies (OCR GCSE)

Networks & Topologies (OCR GCSE)

8th - 10th Grade

21 Qs

3D Printing-Tinker/Brain Pop

3D Printing-Tinker/Brain Pop

6th - 8th Grade

20 Qs

Design your website

Design your website

7th - 12th Grade

20 Qs

Artificial Intelligence and SketchUp

Artificial Intelligence and SketchUp

8th - 10th Grade

20 Qs

Computational Thinking - Review

Computational Thinking - Review

7th - 9th Grade

15 Qs

Computer forensics in crime investigation

Computer forensics in crime investigation

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Leydi Nayeli Dzul Pech

Used 70+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is computer forensics?

It is an attempt to expose, alter, destabilize, destroy, remove to gain unauthorized access or use an asset.

It is the discipline that combines the elements of law and computer science to collect and analyze data from computer Systems, network, Wireless communications and storage devices in a way that is admisible as evidence in a court of law.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the examples of latent data? choose 3.

Belkasoft Live RAM capturer

Information that is in the computer's storage but is not easily mentioned in the file allocation tables.

Data that has been deliberately removed.

Information that the operating System or commonly used software Application cannot easily see.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

1. A _______ has occurred, collecting all relevant evidence is of the utmost importance in answering the questions described above.

file headers.

forensic investigator.

cyber attack.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the main types of computer forensics?

Of operating Systems

Of security

Of network.

On the cloud.

On Mobile devices

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It is the process of retrieving useful Information from the computer or mobile device in questions.

Of network

On the cloud

Of operating Systems

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It aims to retrieve digital evidence or relevant data from a mobile device in a way that preserves the evidence in a sound forensic condition.

On the cloud

Of operating Systems

On mobile devices

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

It refers to the collection, monitoring, and analysis of network activities to discover the source of attacks, viruses, intrusions, or security breaches that occur On a network or in network traffic.

On the cloud

On mobile devices

Of operating Systems

Of network

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers