Digital Forensics Ch1-2

Digital Forensics Ch1-2

University

33 Qs

quiz-placeholder

Similar activities

BIS Revision

BIS Revision

University

30 Qs

Microsoft Access

Microsoft Access

University

30 Qs

PKB 7

PKB 7

University

30 Qs

IAS101

IAS101

University

30 Qs

Microsoft Word Refresher

Microsoft Word Refresher

9th Grade - University

33 Qs

Tables in MS Word

Tables in MS Word

5th Grade - University

30 Qs

Fun with Data and Python

Fun with Data and Python

University

30 Qs

Digital Forensics Ch1-2

Digital Forensics Ch1-2

Assessment

Quiz

Computers

University

Hard

Created by

Christian De Jesus

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The triad of computing security includes which of the following?

Vulnerability assessment, intrusion response, and monitoring

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation

Vulnerability assessment, detection, and monitoring

Detection, response, and monitoring

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Digital forensics and data recovery refer to the same activities. True or False?

True

False

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Criminal proceedings in the United States must use procedures that adhere to which of the following?

Fourth Amendment

First Amendment

None of these choices

Third Amendment

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Policies can address rules for which of the following?

All of these choices

The amount of personal email you can send

The Internet sites you can or can't access

When you can log on to a company network from home

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A warning banner should contain information about ____________. (Choose all that apply.)

who owns the computer

who can use the site

the content of websites

consequences of misuse

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Under normal circumstances, a private-sector investigator is considered an agent of law enforcement. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When collecting computer components as evidence, you should place them in antistatic bags. True or False?

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?