CNET151 Chapt 14 - Introduction to Forensics

CNET151 Chapt 14 - Introduction to Forensics

University

15 Qs

quiz-placeholder

Similar activities

Sistem Operasi

Sistem Operasi

University

15 Qs

linux basics

linux basics

9th Grade - University

10 Qs

ข้อสอบระบบปฏิบัติการคอมพิวเตอร์ 1

ข้อสอบระบบปฏิบัติการคอมพิวเตอร์ 1

University

20 Qs

OSSA - SAMBA

OSSA - SAMBA

University

10 Qs

Linux Server

Linux Server

University - Professional Development

15 Qs

Chapter 13 - UNIX II

Chapter 13 - UNIX II

University

15 Qs

Linux Directory Structures

Linux Directory Structures

10th Grade - University

20 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

CNET151 Chapt 14 - Introduction to Forensics

CNET151 Chapt 14 - Introduction to Forensics

Assessment

Quiz

Computers

University

Medium

Created by

Karen Diggs

Used 32+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Frequently, the first responder to a computer crime is __________.

The network administrator

A law enforcement officer

The news media

A private investigator

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

If you fail to handle evidence properly __________.

You may damage the hard drive

It may be unusable in court

Law enforcement may not look at it

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You may use Linux to make a __________ of the hard drive.

Bootable copy

Screenshot

New version

Forensically valid copy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use the Linux __________ command-line command to wipe the target drive in a forensics examination.

cc

dd

nc

md5sum

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use the Linux __________ command-line command to back up your hard drive if you want to create a hash.

cc

dd

nd

md5sum

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Documentation of every person who had access to evidence, how they interacted with it, and where it was stored is called the __________.

Forensic trail

Chain of custody

Audit trail

Inspection report

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Usually, the first thing you do to a computer to prevent further tampering is to __________.

Make a backup

Make a copy

Take it offline

Lock it in a secure room

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?