Gathering Evidence

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Katherine Newport-forbes
Used 115+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are some reasons for not pulling the plug on a computer that may contain evidence(check all that apply)
Any evidence on RAM is under threat of destruction
Interacting with a running computer in any way causes changes to the system
Sudden loss of power could damage the data
System may be unencrypted when powered on but return to an encrypted stage when powered off
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are some reasons to pull the plug on a computer that may contain evidence(check all that apply)
Any evidence on RAM is under threat of destruction
Interacting with a running computer in any way causes changes to the system
Sudden loss of power could damage the data
Change to a system may invalidate evidence
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of evidence is the least volatile
Data on hard disk
Routing table
CPU
Temporary file system/swap space
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which are the ideal ways to isolate a cell phone that may contain evidence(check all that apply)
Access data via find my phone
Turn it off
Put it in a Faraday bag
Put it in an empty paint can
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a clone?
Member of the republic's army
bit-for-bit copy of a hard drive
A program for file carving
Copy-and-pasted copy of a hard drive
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Why is it important to clone hard drives that may contain evidence?(check all that apply)
Clone gets data in unallocated space such as deleted or partially overwritten files
Clone also gets file system data
Clones allow for a "do over" if investigation alters the system
Clones only get active data
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
In what circumstances might an investigator have to clone a drive on site?(check all that apply)
If they do not have the proper warrants to take the drive to a lab
If the device is a personal computer
If the device is a server generating revenue for a business
If the investigation is a missing persons case
8.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Why are hash values valuable to forensic investigators?(check all that apply)
They can be used to verify that a system is identical to the original
Any change to a system will change the hash value
They are used to create and edit files
They are used to help clone a device
Similar Resources on Wayground
10 questions
แบบทดสอบหน่วยที่ 7 รีทัชตกแต่งภาพ

Quiz
•
9th Grade
8 questions
OCR MCQ's 1.1 Embedded Systems

Quiz
•
9th - 12th Grade
12 questions
IT Fundamentals - 1.1 and 1.2

Quiz
•
9th Grade - University
11 questions
Computer Software

Quiz
•
9th Grade
10 questions
GitHub Jan12

Quiz
•
11th Grade - University
10 questions
Computer Software

Quiz
•
9th - 10th Grade
10 questions
Photoshop 2022-23 Selection Tools

Quiz
•
12th Grade
11 questions
Computer Hardware and Software knowledge

Quiz
•
9th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)

Quiz
•
9th Grade
15 questions
MLA Formatting

Quiz
•
9th Grade
20 questions
Typing Practice

Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
20 questions
Google Sheets Quiz

Quiz
•
9th Grade