Search Header Logo

Cyber Forensics Under Cyber Closet Project

Authored by Deeksha Agrawal

Professional Development

Professional Development

Used 83+ times

Cyber Forensics Under Cyber Closet Project
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When shutting down a computer what information is typically lost?

Data in a RAM memory

Running Processes

Current Network connections

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The volatile memory of the computer is known as

Binary Input Output System (BIOS)

Random Access Memory (RAM)

Read Only Memory (ROM)

Central Processing Unit (CPU)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Physical address of a computer is known as

MAC address

IP address

Network Interface Card

Address Resolution Protocol

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a digital forensics investigation,______________ describes the route that evidence takes from the time you find it until the case is closed or goes to court.

Rules of evidence

Law of probability

Chain of custody

Policy of separation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first responder toolkit essentially consists of the following items:

Storage media & Software

Package & transportation

Miscellaneous items like gloves, evidence stickers etc.

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most significant legal issue in computer forensics?

Preserving Evidence

Seizing Evidence

Admissibility of Evidence

Discovery of Evidence

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of following is not a rule of digital forensics?

An examination should be performed on the original data

A copy is made onto forensically sterile media. New media should always be used if available

The copy of the evidence must be an exact, bit-by-bit copy

The examination must be conducted in such a way as to prevent any modification of theevidence

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development