Search Header Logo
Computer Forensics part 3: Investigations

Computer Forensics part 3: Investigations

Assessment

Presentation

Computers

10th - 12th Grade

Easy

Created by

Mr. Marble

Used 5+ times

FREE Resource

9 Slides • 3 Questions

1

Computer Forensics

Part 3: Computer Investigations

Slide image

2

Slide image

3

Slide image

4

Slide image

5

Multiple Choice

Question image

What is the most important/critical part when it comes to Computer Forensics?

1

Scanning for incidents

2

using many tools for forensics

3

Preserving evidence and proper handling

4

Identification of an incident

6

Slide image

7

Multiple Choice

Question image

Why do we only use copies of the original file when using a Write-blocker in a computer forensics investigation?

1

Using the copied version is easier

2

The Write-blocker read hash data better.

3

By using the Copy you can preserve the original evidences.

8

Slide image

9

Poll

Question image

By using the Chain of custody when handling evidence this will also be following Legal hold. Do you agree or disagree?

Agree

Disagree

10

Slide image

11

Slide image

12

Slide image

Computer Forensics

Part 3: Computer Investigations

Slide image

Show answer

Auto Play

Slide 1 / 12

SLIDE