ONE 6th FORM Forensic Computing

ONE 6th FORM Forensic Computing

12th Grade

30 Qs

quiz-placeholder

Similar activities

CS & A | M1L2 Inside a Computer Learning by Mr. B

CS & A | M1L2 Inside a Computer Learning by Mr. B

12th Grade

25 Qs

Comptia A+ Final Tri 2

Comptia A+ Final Tri 2

12th Grade

25 Qs

Basic of Computers

Basic of Computers

9th - 12th Grade

25 Qs

Quiz Computer Repair - Ports

Quiz Computer Repair - Ports

9th - 12th Grade

25 Qs

CS-10 Chapter-3 Ethical & Social Issues In ICT Part1: Rabin G.

CS-10 Chapter-3 Ethical & Social Issues In ICT Part1: Rabin G.

10th Grade - University

25 Qs

Chapter 1:Information Technology

Chapter 1:Information Technology

12th Grade - University

30 Qs

2.7 System Software - function of OS

2.7 System Software - function of OS

12th Grade - University

25 Qs

Computer Hardware

Computer Hardware

6th - 12th Grade

33 Qs

ONE 6th FORM Forensic Computing

ONE 6th FORM Forensic Computing

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Lorna Jarrett

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The digital forensic process has five basic stages:

Identification, Preservation, Collection, Analysis and what else?

Reporting

Diagnosis

Reduction

Ignoring

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which stage of the digital forensic process?

An in-depth systematic search of evidence relating to the incident being investigated.

Identification

Preservation

Collection

Analysis

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of digital forensics is the monitoring, capture, storing and analysis of network activities or events in order to discover the source of security attacks, intrusions or other problem incidents

Network Forensics

Computer Forensics

Mobile Device Forensics

Digital Image Forensics

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should not be done during a computer forensic investigation?

Modify date/time stamps of files

Take copy of hard drive

Identify and recover all files

Access hidden and protected files

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are reasons for a computer forensics investigation?

Intellectual Property theft

Fraud investigations

Inappropriate email and Internet use in the workplace

Burglary attempt

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A generic Network forensic examination includes the following steps:

Identification, preservation, collection, examination, analysis, presentation and what else?

Incident Response

Network shutdown

Employee interrogation

Application installation tracking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What might make it difficult for the Network investigator to find the origin of the attacker's address?

Attack via remote proxy server

Addresses provided using IPv6

Port scanning blocker

Data is encrypted

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?