Digital Forensics Quiz

Digital Forensics Quiz

University

20 Qs

quiz-placeholder

Similar activities

Arrays

Arrays

4th Grade - Professional Development

20 Qs

js basics

js basics

4th Grade - University

18 Qs

Web Systems Quiz - ICT 121

Web Systems Quiz - ICT 121

University

20 Qs

Microsoft Server Admin 98-365 Part 6

Microsoft Server Admin 98-365 Part 6

KG - Professional Development

20 Qs

Lección1 - JavaScript

Lección1 - JavaScript

1st Grade - Professional Development

17 Qs

Midterm Quiz # 1 - GEC 9

Midterm Quiz # 1 - GEC 9

University

15 Qs

JavaScript Basics

JavaScript Basics

University

20 Qs

KOMPUTER DASAR

KOMPUTER DASAR

12th Grade - Professional Development

15 Qs

Digital Forensics Quiz

Digital Forensics Quiz

Assessment

Quiz

Computers

University

Medium

Created by

ANIKET PAUL

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Windows forensics, which log type would most likely reveal evidence of privilege escalation attempts?

Application Log

Security Log

Setup Log

Forwarded Events

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An investigator detects unusual SSH login attempts on a Linux server. Which command provides the most targeted view of authentication-related events?

cat /var/log/messages

journalctl -u sshd

less /var/log/syslog

dmesg

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which log correlation scenario provides the strongest indication of a web server compromise?

Apache access.log shows multiple 404 errors from the same IP.

Apache error.log shows repeated PHP warnings.

Firewall logs show denied outbound traffic.

Apache access.log indicates a SQL injection payload followed by a database error in MySQL logs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the digital forensic workflow, why is hashing (MD5/SHA-256) applied immediately after evidence acquisition?

To compress evidence for storage efficiency.

To prove evidence integrity throughout investigation.

To encrypt the evidence against attackers.

To anonymize sensitive data during analysis.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which forensic artifact from the Windows Registry is most useful to confirm that a specific USB device was used for data exfiltration?

NTUSER.DAT RecentDocs

SYSTEM\MountedDevices

SYSTEM\CurrentControlSet\Enum\USBSTOR

SAM hive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During vulnerability assessment, a team discovers HTTP PUT enabled on a production server. What is the most critical risk this configuration introduces?

Unauthorized data deletion

Upload of malicious files such as web shells

Brute-force login attacks

Misconfigured TLS certificates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which log management tool is best suited for real-time detection of insider threats by correlating user login anomalies across multiple systems?

Autopsy

Splunk

FTK Imager

Nikto

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?