
Digital Forensics SQA
Authored by Laura Sherrington
Computers
University
Used 77+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following acts states that individuals have a right to respect for the privacy of their e-mails
Copyright, Designs and Patents Act
Criminal Justice and Police Act
Human Rights Act
Computer Misuse Act
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two of the following show why it is important to conduct an investigation on a copy of the data instead of the original
To allow other investigators to work on the data to speed up the investigation
To allow the investigation to be replicated
some tools will only work on copied data
To prevent any aspect of the investigation from tampering with the original evidence
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
At which stage of the digital forensics process would a write-blocker be used?
Acquisition
Reporting
Verification
Analysis
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Applying preservation techniques during data acquisition can help to identify which of the following?
The name of the person who last logged in
Mac Number
Running programs
The IP address
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two of the following software tools could be used during the analysis phase of the digital forensics process?
A word processor
A hex-editor
A network packet analyser
A file encryption tool
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which three of the following statement s describes forensic readiness?
How prepared a digital forensic investigator is to present their evidence in a court of law
How easy it is for the digital forensic investigator to find evidence which proves that someone is guilty
A machine which has been imaged for the forensic purposes
How prepared an organisation is to respond to an incident
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following files could be retrieved during browser forensics?
index.dat
history.ffx
passwords.txt
google.cache
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
11 questions
Computer Science (1-9) - Identifying & Preventing Threats
Quiz
•
University
14 questions
Semi-Long Quiz#1 - SAM, NW3A-3E
Quiz
•
University
12 questions
CIS1103 Week 9_10 CLO3 Part 1
Quiz
•
University
14 questions
IOTA : Web Development Bootcamp Quiz 2
Quiz
•
University
10 questions
BOOLEAN CLUB QUIZ 1
Quiz
•
University
11 questions
What is a computer
Quiz
•
KG - University
16 questions
Algo Quiz
Quiz
•
University
10 questions
Server Administration- Quiz 1
Quiz
•
12th Grade - University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
5 questions
What is Presidents' Day?
Interactive video
•
10th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
20 questions
Mardi Gras History
Quiz
•
6th Grade - University
10 questions
The Roaring 20's Crash Course US History
Interactive video
•
11th Grade - University
17 questions
Review9_TEACHER
Quiz
•
University