Desktop Forensics

Desktop Forensics

11th Grade

15 Qs

quiz-placeholder

Similar activities

Midterm Review 2

Midterm Review 2

11th Grade

14 Qs

R12 Digital Forensics

R12 Digital Forensics

9th - 12th Grade

11 Qs

System Unit

System Unit

10th Grade - University

15 Qs

CN IT - LO3 Collecting, storing & using data

CN IT - LO3 Collecting, storing & using data

8th - 12th Grade

20 Qs

Mobile Devices

Mobile Devices

9th - 12th Grade

14 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

1.4.2 The Internet and the WWW

1.4.2 The Internet and the WWW

10th - 11th Grade

20 Qs

Network Forensics

Network Forensics

11th Grade

15 Qs

Desktop Forensics

Desktop Forensics

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Jerry Jackson Bent

Used 47+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is forensics?

Finding something

application of science to criminal and civil investigations

Science of using police

IT science of security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do Forensic scientists do?

Connect to internet

Design software applications

Collect, preserve, and analyze scientific evidence

Arrest IT criminals

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Do all forensic scientists work in a lab?

Yes

No

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What 2 tasks must be performed in order to complete forensic investigations thoroughly and securely?

Confiscation of Devices

Training Forensic scientists

Arresting cybercriminals

Reviewing Files & Settings

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Desktop forensics is the investigation of computer systems and networks to identify evidence of cybercrimes.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does it mean to 'Confiscate Devices'

Taking custody of affected devices

Locking devices

Searching affected devices

Marking affected devices

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why do we confiscate devices involved in a cyberattack?

To make a point to the criminals

To perform our investigation without contaminating evidence on the original device.

To help cybercriminals escape

To replace them with new ones

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?