Digital Forensics Quiz

Digital Forensics Quiz

University

20 Qs

quiz-placeholder

Similar activities

3. e-Commerce Infrastructure : The Internet and The Web

3. e-Commerce Infrastructure : The Internet and The Web

University

20 Qs

Laravel-Manajemen-User

Laravel-Manajemen-User

University

15 Qs

KSK1014 BOOTUP STARTUP

KSK1014 BOOTUP STARTUP

KG - University

20 Qs

Bridge course with C

Bridge course with C

University

20 Qs

Fundamentals of Algorithms - Unit 1 - Test 1

Fundamentals of Algorithms - Unit 1 - Test 1

University

15 Qs

Section J Exam

Section J Exam

University

19 Qs

Quiz CSA (Final)

Quiz CSA (Final)

University

20 Qs

Fundamentos de Git e GitHub

Fundamentos de Git e GitHub

12th Grade - University

15 Qs

Digital Forensics Quiz

Digital Forensics Quiz

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

ANIKET PAUL

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Windows forensics, which log type would most likely reveal evidence of privilege escalation attempts?

Application Log

Security Log

Setup Log

Forwarded Events

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An investigator detects unusual SSH login attempts on a Linux server. Which command provides the most targeted view of authentication-related events?

cat /var/log/messages

journalctl -u sshd

less /var/log/syslog

dmesg

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which log correlation scenario provides the strongest indication of a web server compromise?

Apache access.log shows multiple 404 errors from the same IP.

Apache error.log shows repeated PHP warnings.

Firewall logs show denied outbound traffic.

Apache access.log indicates a SQL injection payload followed by a database error in MySQL logs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the digital forensic workflow, why is hashing (MD5/SHA-256) applied immediately after evidence acquisition?

To compress evidence for storage efficiency.

To prove evidence integrity throughout investigation.

To encrypt the evidence against attackers.

To anonymize sensitive data during analysis.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which forensic artifact from the Windows Registry is most useful to confirm that a specific USB device was used for data exfiltration?

NTUSER.DAT RecentDocs

SYSTEM\MountedDevices

SYSTEM\CurrentControlSet\Enum\USBSTOR

SAM hive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During vulnerability assessment, a team discovers HTTP PUT enabled on a production server. What is the most critical risk this configuration introduces?

Unauthorized data deletion

Upload of malicious files such as web shells

Brute-force login attacks

Misconfigured TLS certificates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which log management tool is best suited for real-time detection of insider threats by correlating user login anomalies across multiple systems?

Autopsy

Splunk

FTK Imager

Nikto

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?