NIST 800-86

NIST 800-86

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

G8_Ch2_Windows Movie Maker

G8_Ch2_Windows Movie Maker

8th Grade

15 Qs

Паскаль. Основные команды

Паскаль. Основные команды

8th - 11th Grade

10 Qs

Binary

Binary

6th - 9th Grade

11 Qs

IT quiz class 7 E-commerce and blogging

IT quiz class 7 E-commerce and blogging

6th - 7th Grade

15 Qs

More on powerpoint

More on powerpoint

6th Grade

11 Qs

Key Concepts 1

Key Concepts 1

5th - 7th Grade

11 Qs

21 Things Basics

21 Things Basics

7th - 8th Grade

10 Qs

Cyber Security Homework 1

Cyber Security Homework 1

7th - 9th Grade

15 Qs

NIST 800-86

NIST 800-86

Assessment

Quiz

Computers

6th - 8th Grade

Practice Problem

Medium

Created by

Naveen HV

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which one of these is not a basic phases go Digital Forensics

Collection
Analysis
Reporting
Preservation
Examination

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

What is the primary goal of digital forensics?

Collect evidence for criminal investigations
Recover deleted data
Restore damaged systems
Enhance system performance

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which one of the following is not part of Forensic staffing?

Investigators
IT professionals
Incident Handlers
HR Staff
APT Actor

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which of the following is an example of volatile data?

A saved document on hard drive

A web browser history

A file that has been deleted

A backup file on remote server

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which file system is used in Mac?

HFS
FAT 16
UFS
NTFS

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which of the following perform perform packet sniffing and analyze network traffic to identify suspicious activity and record relevant information

Host IDS
Network IDS
Anti-virus
EDR

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

What is the purpose of hashing data during the forensic process?

To recover deleted data
To verify the integrity of the data
To access encrypted files
To analyze metadata

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?