
DFE - Modules 1-2 - Exercises
Authored by BYRONELLE WILLIAMS
Information Technology (IT)
11th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the module, what is the primary goal of the forensic investigation process?
To punish cybercriminals immediately
To have a better understanding of an incident by identifying and analyzing evidence
To develop new software tools for hacking
To erase all digital data from devices
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the pre-investigation phase, what is one key activity mentioned?
Analyzing evidentiary data
Setting up a computer forensics lab
Writing the final investigation report
Testifying in court
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Computer Forensics Lab (CFL) described as in the module?
A public library for reading about crimes
A designated location for conducting computer-based investigations of collected evidence
A room for storing personal computers
An online forum for discussing cybercrimes
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When planning and budgeting for a forensics lab, what factor should be considered first?
The color of the walls
Types of investigations (e.g., criminal, civil, corporate) based on crime statistics
The number of coffee machines
The brand of office chairs
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the physical security considerations for a forensics lab, what is recommended to prevent eavesdropping on electromagnetic signals?
Using loud music
Shielding emissions through a process called TEMPEST
Opening all windows
Painting the walls black
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is responsible for photographing the crime scene and evidence in the investigation team?
Incident Analyzer
Photographer
Attorney
Evidence Manager
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the investigation phase, what is the purpose of data acquisition?
To delete data from devices
To extract Electronically Stored Information (ESI) from suspect devices using established methods
To create new data files
To share data on social media
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?