
Computer forensics in crime investigation
Authored by Leydi Nayeli Dzul Pech
Computers
8th Grade
Used 72+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is computer forensics?
It is an attempt to expose, alter, destabilize, destroy, remove to gain unauthorized access or use an asset.
It is the discipline that combines the elements of law and computer science to collect and analyze data from computer Systems, network, Wireless communications and storage devices in a way that is admisible as evidence in a court of law.
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the examples of latent data? choose 3.
Belkasoft Live RAM capturer
Information that is in the computer's storage but is not easily mentioned in the file allocation tables.
Data that has been deliberately removed.
Information that the operating System or commonly used software Application cannot easily see.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
1. A _______ has occurred, collecting all relevant evidence is of the utmost importance in answering the questions described above.
file headers.
forensic investigator.
cyber attack.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the main types of computer forensics?
Of operating Systems
Of security
Of network.
On the cloud.
On Mobile devices
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It is the process of retrieving useful Information from the computer or mobile device in questions.
Of network
On the cloud
Of operating Systems
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It aims to retrieve digital evidence or relevant data from a mobile device in a way that preserves the evidence in a sound forensic condition.
On the cloud
Of operating Systems
On mobile devices
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
It refers to the collection, monitoring, and analysis of network activities to discover the source of attacks, viruses, intrusions, or security breaches that occur On a network or in network traffic.
On the cloud
On mobile devices
Of operating Systems
Of network
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
CPA Revision MCQ1
Quiz
•
8th - 9th Grade
15 questions
History of Computers
Quiz
•
6th - 12th Grade
15 questions
Microsoft PowerPoint 2016
Quiz
•
8th Grade
16 questions
Python Basics
Quiz
•
KG - University
20 questions
Python Recap
Quiz
•
7th Grade - University
20 questions
SDA Chapter 1A VOCABULARY
Quiz
•
6th - 8th Grade
17 questions
Cyber Camps 2018 - Review Day 3 Windows
Quiz
•
7th - 12th Grade
20 questions
Microsoft PPT. - Scavenger Hunt
Quiz
•
6th - 12th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade