
Digital Forensics S18
Authored by Venkatesh Venkatesh
Engineering
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which method ensures integrity while creating a forensic disk image?
Copy-paste method
Incremental backup
Bit-stream imaging with hash verification
Disk compression
File export
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which step is FIRST in verifying a digital incident?
Confirm incident
Validate alerts
Identify assets
Analyze logs
Check backups
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which technique is MOST effective for recovering erased data clusters?
Overwrite data
Data carving
Sector replacement
Disk compression
File renaming
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the legal approach when encountering encrypted forensic evidence?
Ignore encrypted areas
Attempt brute force only
Use key escrow or subpoena
Reformat drive
Decrypt using random keys
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which minimizes FALSE NEGATIVES in forensic tools?
Multiple automated scans
Exclusive tool reliance
Manual hex review with automation
Skip unreadable sectors
File copy
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
According to Order of Volatility, which is MOST volatile?
Registers
Disk storage
Network logs
Cache memory
Backups
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which is LEAST reliable for reconstructing browsing history?
Proxy logs
Cache files
Cookie storage
DNS cache
Encrypted HTTPS logs
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?