Search Header Logo

CNET151 - Chapt 14 - Intro to Forensics

Authored by Karen Diggs

Computers

11th Grade

Used 24+ times

CNET151 - Chapt 14 - Intro to Forensics
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Frequently, the first responder to a computer crime is the network administrator.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You use the netstat command with a forensic copy of a machine to compare two files and show the differences.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Windows Registry contains a list of USB devices that have been connected to the machine.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Linux, you use the dd command to set up a target forensics server to receive a copy of a drive. True or False?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The chain of custody documents the handling of evidence from the moment of seizure until it is presented in court.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Most Windows logs are turned on automatically.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Windows stores information such as web addresses, search queries, and recently opened files in a file called index.dat.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?