Digital Forensics Ch1-2

Digital Forensics Ch1-2

University

•

33 Qs

quiz-placeholder

Similar activities

Blank Quiz

Blank Quiz

University

•

30 Qs

CW412 PART III

CW412 PART III

University

•

29 Qs

Freehand and Digital Drawing Midterm Exam 2021-2022

Freehand and Digital Drawing Midterm Exam 2021-2022

University

•

30 Qs

Lesson 4 - CMS: How it works?

Lesson 4 - CMS: How it works?

University

•

28 Qs

MOS Word 2016 - Quiz 2

MOS Word 2016 - Quiz 2

University

•

34 Qs

Scanners and Touch Screen Technologies (Pages 96-101)

Scanners and Touch Screen Technologies (Pages 96-101)

10th Grade - University

•

28 Qs

sistem enterprise

sistem enterprise

University

•

29 Qs

Bridge Course - Screening Test

Bridge Course - Screening Test

10th Grade - Professional Development

•

30 Qs

Digital Forensics Ch1-2

Digital Forensics Ch1-2

Assessment

Quiz

•

Computers

•

University

•

Practice Problem

•

Hard

Created by

Christian De Jesus

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The triad of computing security includes which of the following?

Vulnerability assessment, intrusion response, and monitoring

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation

Vulnerability assessment, detection, and monitoring

Detection, response, and monitoring

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Digital forensics and data recovery refer to the same activities. True or False?

True

False

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Criminal proceedings in the United States must use procedures that adhere to which of the following?

Fourth Amendment

First Amendment

None of these choices

Third Amendment

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Policies can address rules for which of the following?

All of these choices

The amount of personal email you can send

The Internet sites you can or can't access

When you can log on to a company network from home

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A warning banner should contain information about ____________. (Choose all that apply.)

who owns the computer

who can use the site

the content of websites

consequences of misuse

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Under normal circumstances, a private-sector investigator is considered an agent of law enforcement. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When collecting computer components as evidence, you should place them in antistatic bags. True or False?

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?