Search Header Logo

Quiz 1 CCF10103

Authored by basri ismail

Computers

University

Used 5+ times

Quiz 1 CCF10103
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                Which of the following is not a component of “chain of evidence”?

Time evidence obtained

Location evidence obtained

Who discovered the evidence

Identification of person who left the evidence

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

From a legal perspective, which rule must be addressed when investigating a computer crime?

A                Evidence

Engagement

A                Data protection

A                Search and seizure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                Which of the following evidence collection method is most likely accepted in a court case?

Create a file-level archive of all files

Provide a full system backup inventory

Provide a mirror image of the hard drive

A                Copy all files accessed at the time of the incident

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                Before powering off a computer system, what is the action should be taken by computer crime investigator in crime scene?

A                backup the hard drive.

collect the owner’s boot up disks.

A                save the contents of the spooler queue.

A                record contents of the monitor and dump the memory contents to a disk

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                All of the following methods ensure the stored data are unreadable except;

A                   degaussing the disk or tape.

A                   physical alteration of media.

writing random data over the old file

A                   removing the volume header information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the Internet History file has been deleted, which of information may still provide about what Web sites the user has visited?

A                Cookies

Metadata

A                Sessions

A                User profiles

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.                Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. Thus, the ability to hide data in another file is called;

Encryption

Data parsing

A                Steganography.

A and B

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?