
Computer forensics in crime investigation
Authored by Leydi Nayeli Dzul Pech
Computers
8th Grade
Used 72+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is computer forensics?
It is an attempt to expose, alter, destabilize, destroy, remove to gain unauthorized access or use an asset.
It is the discipline that combines the elements of law and computer science to collect and analyze data from computer Systems, network, Wireless communications and storage devices in a way that is admisible as evidence in a court of law.
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the examples of latent data? choose 3.
Belkasoft Live RAM capturer
Information that is in the computer's storage but is not easily mentioned in the file allocation tables.
Data that has been deliberately removed.
Information that the operating System or commonly used software Application cannot easily see.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
1. A _______ has occurred, collecting all relevant evidence is of the utmost importance in answering the questions described above.
file headers.
forensic investigator.
cyber attack.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the main types of computer forensics?
Of operating Systems
Of security
Of network.
On the cloud.
On Mobile devices
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It is the process of retrieving useful Information from the computer or mobile device in questions.
Of network
On the cloud
Of operating Systems
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It aims to retrieve digital evidence or relevant data from a mobile device in a way that preserves the evidence in a sound forensic condition.
On the cloud
Of operating Systems
On mobile devices
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It refers to the collection, monitoring, and analysis of network activities to discover the source of attacks, viruses, intrusions, or security breaches that occur On a network or in network traffic.
On the cloud
On mobile devices
Of operating Systems
Of network
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
24 questions
Information Transfer
Quiz
•
8th Grade
20 questions
Informatika_Kelas 8
Quiz
•
8th Grade
15 questions
Cyber Security KS4
Quiz
•
8th - 12th Grade
15 questions
Linux-2 Quiz 2 -- LAMP
Quiz
•
1st - 12th Grade
20 questions
End of year quiz: Spreadsheet Modelling
Quiz
•
8th Grade
20 questions
Name The Disney Animation Films
Quiz
•
KG - University
15 questions
Empowerment Technologies
Quiz
•
KG - 12th Grade
17 questions
Microsoft Office Quiz
Quiz
•
KG - 9th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade