Search Header Logo

Digital Forensics Quiz

Authored by ANIKET PAUL

Computers

University

Used 1+ times

Digital Forensics Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Windows forensics, which log type would most likely reveal evidence of privilege escalation attempts?

Application Log

Security Log

Setup Log

Forwarded Events

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An investigator detects unusual SSH login attempts on a Linux server. Which command provides the most targeted view of authentication-related events?

cat /var/log/messages

journalctl -u sshd

less /var/log/syslog

dmesg

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which log correlation scenario provides the strongest indication of a web server compromise?

Apache access.log shows multiple 404 errors from the same IP.

Apache error.log shows repeated PHP warnings.

Firewall logs show denied outbound traffic.

Apache access.log indicates a SQL injection payload followed by a database error in MySQL logs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the digital forensic workflow, why is hashing (MD5/SHA-256) applied immediately after evidence acquisition?

To compress evidence for storage efficiency.

To prove evidence integrity throughout investigation.

To encrypt the evidence against attackers.

To anonymize sensitive data during analysis.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which forensic artifact from the Windows Registry is most useful to confirm that a specific USB device was used for data exfiltration?

NTUSER.DAT RecentDocs

SYSTEM\MountedDevices

SYSTEM\CurrentControlSet\Enum\USBSTOR

SAM hive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During vulnerability assessment, a team discovers HTTP PUT enabled on a production server. What is the most critical risk this configuration introduces?

Unauthorized data deletion

Upload of malicious files such as web shells

Brute-force login attacks

Misconfigured TLS certificates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which log management tool is best suited for real-time detection of insider threats by correlating user login anomalies across multiple systems?

Autopsy

Splunk

FTK Imager

Nikto

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers