Digital Forensics Ch1-2

Digital Forensics Ch1-2

University

33 Qs

quiz-placeholder

Similar activities

Digital Forensics Report Writing Quiz

Digital Forensics Report Writing Quiz

University

28 Qs

IT 101 | Quiz No. 1

IT 101 | Quiz No. 1

University

30 Qs

CHAPTER 2 – ANALYZING BUSINESS CASE

CHAPTER 2 – ANALYZING BUSINESS CASE

University

37 Qs

UIT 2221 COPTPA REVISION

UIT 2221 COPTPA REVISION

University

30 Qs

Enterprise Resource Planning

Enterprise Resource Planning

University - Professional Development

30 Qs

Database

Database

KG - University

35 Qs

Seatwork 15 -CC102

Seatwork 15 -CC102

University

35 Qs

DCI 2025 Quiz 1

DCI 2025 Quiz 1

University

30 Qs

Digital Forensics Ch1-2

Digital Forensics Ch1-2

Assessment

Quiz

Computers

University

Hard

Created by

Christian De Jesus

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The triad of computing security includes which of the following?

Vulnerability assessment, intrusion response, and monitoring

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation

Vulnerability assessment, detection, and monitoring

Detection, response, and monitoring

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Digital forensics and data recovery refer to the same activities. True or False?

True

False

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Criminal proceedings in the United States must use procedures that adhere to which of the following?

Fourth Amendment

First Amendment

None of these choices

Third Amendment

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Policies can address rules for which of the following?

All of these choices

The amount of personal email you can send

The Internet sites you can or can't access

When you can log on to a company network from home

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A warning banner should contain information about ____________. (Choose all that apply.)

who owns the computer

who can use the site

the content of websites

consequences of misuse

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Under normal circumstances, a private-sector investigator is considered an agent of law enforcement. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When collecting computer components as evidence, you should place them in antistatic bags. True or False?

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?