CHFI v9 Module 1

CHFI v9 Module 1

University

10 Qs

quiz-placeholder

Similar activities

Computer Basics 2 - CESA

Computer Basics 2 - CESA

7th Grade - University

10 Qs

Node.js

Node.js

University

10 Qs

WAN Sesi 1

WAN Sesi 1

1st Grade - University

10 Qs

GUESS THE ANSWER

GUESS THE ANSWER

University

10 Qs

Software Testing

Software Testing

University

10 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

C++ Array Quiz

C++ Array Quiz

University

10 Qs

Information System and Modern Organization part 1

Information System and Modern Organization part 1

University

14 Qs

CHFI v9 Module 1

CHFI v9 Module 1

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Karen Diggs

Used 26+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When retrieving evidence from a particular electronic device, investigators need not worry about unlawful search and seizure according to Fourth Amendment laws.

True

False

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

In the Enterprise Theory of Investigation (ETI) you can view criminal acts as more than isolated crimes.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many types of Cybercrime investigations are there?

4

2

3

Many

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This principle refers to the fact that when you enter a crime scene you both take something with you and leave something behind.

Exchange Principle

Locard's Exchange Principle

Cybercrime Principle

Evidence Principle

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many types of cybercrime are there?

3

2

5

Many

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Non-volatile data changes when a system is shut down or unable to power up.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

Network Forensics

Data Recovery

Disaster Recovery

Computer Forensics

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?