CO2517 Digital Evidence 2023 Part 1

CO2517 Digital Evidence 2023 Part 1

University

23 Qs

quiz-placeholder

Similar activities

Pra UPS 2

Pra UPS 2

University

20 Qs

c.i.s.c.o

c.i.s.c.o

University

20 Qs

Ulangan Harian 1 Smstr 2 TIK

Ulangan Harian 1 Smstr 2 TIK

University

18 Qs

Relational Algebra and Calculus

Relational Algebra and Calculus

University

20 Qs

ITN_Explore the networks_1.1 Globally connected

ITN_Explore the networks_1.1 Globally connected

11th Grade - University

20 Qs

Artificial Intelligence CT-1

Artificial Intelligence CT-1

University

20 Qs

Micro Arch - CPUs & Fetch-Execute

Micro Arch - CPUs & Fetch-Execute

University

20 Qs

Python Recap

Python Recap

7th Grade - University

20 Qs

CO2517 Digital Evidence 2023 Part 1

CO2517 Digital Evidence 2023 Part 1

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Christopher Finnigan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these is NOT an example of Digital Evidence

E-mails and attachments

Event logs

Printed, faxed or scanned documents

Telephone logs

DNA, fingerprints, or blood samples

Answer explanation

Digital evidence refers to any information or data that is stored or transmitted electronically and can be used in a court of law to support or refute a legal case.

Physical evidence - Evidence that can be seen, touched, or analyzed in a laboratory, such as DNA, fingerprints, or blood samples.

2.

MATCH QUESTION

1 min • 1 pt

Match the ACPO principle to the definition

An audit trail or other record of all processes applied, recorded, and preserved.

ACPO Principle 3

Where it is necessary to access original data 'live' - a component person must do so.

ACPO Principle 2

The person in charge of the investigation has overall responsibility to ensure all laws are followed

ACPO Principle 1

No action taken should change data held on a computer which may then be relied upon in court.

ACPO Principle 4

Answer explanation

ACPO Principle 1 • No action taken should change data held on a computer or storage media which may subsequently be relied upon in court

ACPO Principle 2 • In circumstances where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and implications of their actions

ACPO Principle 3 • An audit trail or other record of all processes applied to a computer-based electronic evidence should be created and preserved.

ACPO Principle 4 • The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a test of evidence admissibility?

Weight of evidence

Authenticity/integrity

Hearsay

Proper handling

Credibility

Answer explanation

Credibility - The credibility or believability of evidence is also a matter for the trier of fact to decide and is not considered a test of evidence admissibility.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which document records the transfer of evidence?

Audit Trail

Chain of Custody

Evidence Tags

Evidence Logs

Answer explanation

Chain of Custody It is a document that records the transfer of evidence It should provide the chronology of the movement and handling of the potential digital evidence up to its current state

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can we resolve the issue of collision attacks by just using MD5 or SHA-1, to confirm evidence integrity?

Two (or more) hash algorithms are often used.

The hash is ran more than once.

The integrity is confirmed throughout the process

Answer explanation

Although largely used, these algorithms are known to be subject to collision attacks since 2005/2006 − i.e., two different files can be manipulated to generate matching hashes

• To address this issue, in Forensics, two (or more) hash algorithms are often used − Some tools automatically generate MD5 and SHA-1 hash values and others allow the selection of algorithms.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is the purpose of the Chain of Custody ? Choose three

All analysis activities are recorded step by step.

Legal requirement to show any transfer of ownership must be well documented.

Accountability is recorded

This will also be used to strengthen the assurance of Principle 1, 2, 3 & 4

7.

REORDER QUESTION

1 min • 1 pt

Reorder the following actions in this Audit Form.

Power up HDD and begin analysis

Confirm HDD external details/marks etc

Confirm HDD is attached to your analysis unit correctly and in read only configuration, prior to powering up.

Remove HDD from evidence bag

Confirm the evidence bag and chain of custody are valid

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?