Digital Forensics SQA

Digital Forensics SQA

University

12 Qs

quiz-placeholder

Similar activities

Chapter 7+8

Chapter 7+8

University

7 Qs

MCQ 1

MCQ 1

University

10 Qs

CHFI v9 Module 1

CHFI v9 Module 1

University

10 Qs

ISFT - Introduction to Security & Forensic Technologies Module

ISFT - Introduction to Security & Forensic Technologies Module

University

8 Qs

Incident Response - STT NF - Sabtu

Incident Response - STT NF - Sabtu

University

10 Qs

ECM3435 IT Consulting 1 - Organisational IT environments

ECM3435 IT Consulting 1 - Organisational IT environments

University

10 Qs

Digital Forensics Quiz

Digital Forensics Quiz

University

15 Qs

DSF - Investigation Methodology

DSF - Investigation Methodology

University

12 Qs

Digital Forensics SQA

Digital Forensics SQA

Assessment

Quiz

Computers

University

Hard

Created by

Laura Sherrington

Used 76+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following acts states that individuals have a right to respect for the privacy of their e-mails

Copyright, Designs and Patents Act

Criminal Justice and Police Act

Human Rights Act

Computer Misuse Act

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following show why it is important to conduct an investigation on a copy of the data instead of the original

To allow other investigators to work on the data to speed up the investigation

To allow the investigation to be replicated

some tools will only work on copied data

To prevent any aspect of the investigation from tampering with the original evidence

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which stage of the digital forensics process would a write-blocker be used?

Acquisition

Reporting

Verification

Analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Applying preservation techniques during data acquisition can help to identify which of the following?

The name of the person who last logged in

Mac Number

Running programs

The IP address

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two of the following software tools could be used during the analysis phase of the digital forensics process?

A word processor

A hex-editor

A network packet analyser

A file encryption tool

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three of the following statement s describes forensic readiness?

How prepared a digital forensic investigator is to present their evidence in a court of law

How easy it is for the digital forensic investigator to find evidence which proves that someone is guilty

A machine which has been imaged for the forensic purposes

How prepared an organisation is to respond to an incident

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following files could be retrieved during browser forensics?

index.dat

history.ffx

passwords.txt

google.cache

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?