
Digital Forensics Quiz
Authored by ANIKET PAUL
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Windows forensics, which log type would most likely reveal evidence of privilege escalation attempts?
Application Log
Security Log
Setup Log
Forwarded Events
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An investigator detects unusual SSH login attempts on a Linux server. Which command provides the most targeted view of authentication-related events?
cat /var/log/messages
journalctl -u sshd
less /var/log/syslog
dmesg
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which log correlation scenario provides the strongest indication of a web server compromise?
Apache access.log shows multiple 404 errors from the same IP.
Apache error.log shows repeated PHP warnings.
Firewall logs show denied outbound traffic.
Apache access.log indicates a SQL injection payload followed by a database error in MySQL logs.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the digital forensic workflow, why is hashing (MD5/SHA-256) applied immediately after evidence acquisition?
To compress evidence for storage efficiency.
To prove evidence integrity throughout investigation.
To encrypt the evidence against attackers.
To anonymize sensitive data during analysis.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which forensic artifact from the Windows Registry is most useful to confirm that a specific USB device was used for data exfiltration?
NTUSER.DAT RecentDocs
SYSTEM\MountedDevices
SYSTEM\CurrentControlSet\Enum\USBSTOR
SAM hive
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During vulnerability assessment, a team discovers HTTP PUT enabled on a production server. What is the most critical risk this configuration introduces?
Unauthorized data deletion
Upload of malicious files such as web shells
Brute-force login attacks
Misconfigured TLS certificates
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which log management tool is best suited for real-time detection of insider threats by correlating user login anomalies across multiple systems?
Autopsy
Splunk
FTK Imager
Nikto
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
PHP MySQL
Quiz
•
7th Grade - Professio...
20 questions
Web Systems Quiz - ICT 121
Quiz
•
University
17 questions
Lección1 - JavaScript
Quiz
•
1st Grade - Professio...
16 questions
CTAE Programs Quiz
Quiz
•
9th Grade - University
16 questions
Linked List and Arrays in JAVA
Quiz
•
University
18 questions
HTML,CSS,SCRIPT QUIZZ
Quiz
•
University
16 questions
QUIZ FORUM ISAS 2022
Quiz
•
University
18 questions
js basics
Quiz
•
4th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade