Quiz 1 CCF10103

Quiz 1 CCF10103

University

10 Qs

quiz-placeholder

Similar activities

Career Path in IT

Career Path in IT

University

10 Qs

Advanced Cyber Security Quiz

Advanced Cyber Security Quiz

University

15 Qs

Digital Forensics Quiz A

Digital Forensics Quiz A

University

10 Qs

IMS555 - Chapter 7

IMS555 - Chapter 7

University

14 Qs

Social media and mental health

Social media and mental health

University

12 Qs

Demster Shafer

Demster Shafer

University

7 Qs

Dino Code!: The Trivia Showdown

Dino Code!: The Trivia Showdown

University

10 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

Quiz 1 CCF10103

Quiz 1 CCF10103

Assessment

Quiz

Computers

University

Hard

Created by

basri ismail

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                Which of the following is not a component of “chain of evidence”?

Time evidence obtained

Location evidence obtained

Who discovered the evidence

Identification of person who left the evidence

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

From a legal perspective, which rule must be addressed when investigating a computer crime?

A                Evidence

Engagement

A                Data protection

A                Search and seizure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                Which of the following evidence collection method is most likely accepted in a court case?

Create a file-level archive of all files

Provide a full system backup inventory

Provide a mirror image of the hard drive

A                Copy all files accessed at the time of the incident

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                Before powering off a computer system, what is the action should be taken by computer crime investigator in crime scene?

A                backup the hard drive.

collect the owner’s boot up disks.

A                save the contents of the spooler queue.

A                record contents of the monitor and dump the memory contents to a disk

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                All of the following methods ensure the stored data are unreadable except;

A                   degaussing the disk or tape.

A                   physical alteration of media.

writing random data over the old file

A                   removing the volume header information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the Internet History file has been deleted, which of information may still provide about what Web sites the user has visited?

A                Cookies

Metadata

A                Sessions

A                User profiles

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. Thus, the ability to hide data in another file is called;

Encryption

Data parsing

A                Steganography.

A and B

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?