Computer Forensics Assessment

Computer Forensics Assessment

Professional Development

20 Qs

quiz-placeholder

Similar activities

Endpoint Security for Bootcamp

Endpoint Security for Bootcamp

Professional Development

22 Qs

Network Plus

Network Plus

Professional Development

15 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

15 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

21 Qs

Encryption

Encryption

Professional Development

15 Qs

CHFI QUIZ

CHFI QUIZ

Professional Development

20 Qs

CYBER SECURITY

CYBER SECURITY

Professional Development

20 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Computer Forensics Assessment

Computer Forensics Assessment

Assessment

Quiz

Computers

Professional Development

Hard

Created by

mic micdeJC

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When was the PACE invented?

1984

1987

1990

1992

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How many stages are there in a computer forensic investigation?

4

6

7

8

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the first stage of computer forensic investigation?

Data Preservation

Data Collection

Consultancy

Computer Forensic Analysis

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following thing(s) a computer forensic expert should ensure?

Potential evidence is not damaged

Computer viruses are not introduced

Extracted data is protected from mechanical or electromagnetic

damage

All of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are the first and most basic forms of defence?

Anti-viruses

Two-way authentications

Passwords

Malicious activity

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does N stands for in DBAN?

New

Nuke

Network

Nash

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are the types of Encryption?

I. Private Key Encryption

II. Symmetric Encryption

III. Public Key Encryption

IV. Systematic Key Encryption

I and II

II and III

III and IV

I and III

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?