NIST 800-86

NIST 800-86

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

định dạng trang chiếu

định dạng trang chiếu

6th - 8th Grade

14 Qs

Uji Pengetahuan TIK untuk Siswa Kelas 7

Uji Pengetahuan TIK untuk Siswa Kelas 7

7th Grade - University

15 Qs

CLASS 7 COMPUTER CH-3 QUIZ

CLASS 7 COMPUTER CH-3 QUIZ

7th Grade

11 Qs

ÔN TẬP HKII-02

ÔN TẬP HKII-02

8th Grade

15 Qs

Micro:bit assessment 1

Micro:bit assessment 1

7th - 8th Grade

10 Qs

Administrasi Sistem Jaringan

Administrasi Sistem Jaringan

1st - 10th Grade

10 Qs

G7_ICT_1.1_Digital Data

G7_ICT_1.1_Digital Data

7th Grade

10 Qs

Quiz Kelas 8

Quiz Kelas 8

8th Grade

15 Qs

NIST 800-86

NIST 800-86

Assessment

Quiz

Computers

6th - 8th Grade

Practice Problem

Medium

Created by

Naveen HV

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which one of these is not a basic phases go Digital Forensics

Collection
Analysis
Reporting
Preservation
Examination

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

What is the primary goal of digital forensics?

Collect evidence for criminal investigations
Recover deleted data
Restore damaged systems
Enhance system performance

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which one of the following is not part of Forensic staffing?

Investigators
IT professionals
Incident Handlers
HR Staff
APT Actor

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which of the following is an example of volatile data?

A saved document on hard drive

A web browser history

A file that has been deleted

A backup file on remote server

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which file system is used in Mac?

HFS
FAT 16
UFS
NTFS

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

Which of the following perform perform packet sniffing and analyze network traffic to identify suspicious activity and record relevant information

Host IDS
Network IDS
Anti-virus
EDR

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

What is the purpose of hashing data during the forensic process?

To recover deleted data
To verify the integrity of the data
To access encrypted files
To analyze metadata

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?