Search Header Logo

Anti-forensics Techniques

Authored by dono pradana

Computers

University

Used 3+ times

Anti-forensics Techniques
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of anti-forensics?

To make the investigator's task of finding evidence difficult

To compromise the accuracy of a forensics report or testimony

To delete evidence that an anti-forensics tool has been run

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when a file is deleted from the hard drive in Windows?

The file contents are immediately erased from the disk

The file is moved to a temporary storage place called Recycle Bin

The file is permanently deleted and cannot be recovered

The file is renamed and hidden in the file system structures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is file carving?

A technique to recover files from a hard disk in the absence of file system metadata

A technique to hide files in the Recycle Bin

A technique to encrypt files to prevent forensic analysis

A technique to compress files to minimize their footprint

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can file carving be performed on Windows?

Using data recovery tools like Autopsy and R-Studio

Using the copy command in the command prompt

Using file carving tools like 010 Editor and Hexinator

Using forensic analysis tools like FTK and EnCase

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool can be used to recover deleted files from a Linux system?

Stellar Phoenix Linux Data Recovery

Recover My Files

DiskDigger

EaseUS Data Recovery Wizard Pro

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are investigators using to scan a disk for lost partitions and recover them?

R-Studio and EaseUS Data Recovery Wizard

Passware Kit and L0phtCrack

OpenStego and StegSpy

BCWipe Total WipeOut and DriveScrubber

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique is used to hide a secret message within an ordinary message?

Steganography

Trail Obfuscation

Alternate Data Streams

Artifact Wiping

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?