Evaluating Digital Forensic Tool Needs

Evaluating Digital Forensic Tool Needs

9th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

Intro to DF

Intro to DF

12th Grade

10 Qs

Gathering Evidence

Gathering Evidence

9th - 12th Grade

8 Qs

Keamanan Komputer - Enkripsi Data

Keamanan Komputer - Enkripsi Data

1st Grade - University

10 Qs

2. Acquisition and Analysis

2. Acquisition and Analysis

9th Grade

10 Qs

CTF 101 - Forensics

CTF 101 - Forensics

9th - 12th Grade

11 Qs

Google Workspace

Google Workspace

4th Grade - University

10 Qs

Computer Apps 2 Exam Review

Computer Apps 2 Exam Review

9th - 12th Grade

15 Qs

Quiz Digital Forensics

Quiz Digital Forensics

1st - 12th Grade

15 Qs

Evaluating Digital Forensic Tool Needs

Evaluating Digital Forensic Tool Needs

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Brian Guillotte

Used 26+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Forensics software tools are grouped into GUI and command-line applications

True

False

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

According to ISO standard 27037, which of the following is an important factor in data acquisition?

The DEFR’s competency

The DEFR’s skills in using the command line

Conditions at the acquisition setting

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An encrypted drive is one reason to choose a logical acquisition.

True

False

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Hashing, filtering, and file header analysis make up which function of computer forensics tools?

Validation and verification

Acquisition

Extraction

Reconstruction

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hardware acquisition tools typically have built-in software for data analysis.

True

False

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following purposes is the reconstruction function NOT needed for

Re-create a suspect drive to show what happened

Create a copy of a drive for other investigators.

Recover file headers.

Re-create a drive compromised by malware.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Decompressing, carving, decrypting, and bookmarking are examples of subfunctions of the extraction function

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?