
Quiz 1 CCF10103
Authored by basri ismail
Computers
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. Which of the following is not a component of “chain of evidence”?
Time evidence obtained
Location evidence obtained
Who discovered the evidence
Identification of person who left the evidence
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
From a legal perspective, which rule must be addressed when investigating a computer crime?
A Evidence
Engagement
A Data protection
A Search and seizure
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. Which of the following evidence collection method is most likely accepted in a court case?
Create a file-level archive of all files
Provide a full system backup inventory
Provide a mirror image of the hard drive
A Copy all files accessed at the time of the incident
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. Before powering off a computer system, what is the action should be taken by computer crime investigator in crime scene?
A backup the hard drive.
collect the owner’s boot up disks.
A save the contents of the spooler queue.
A record contents of the monitor and dump the memory contents to a disk
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. All of the following methods ensure the stored data are unreadable except;
A degaussing the disk or tape.
A physical alteration of media.
writing random data over the old file
A removing the volume header information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If the Internet History file has been deleted, which of information may still provide about what Web sites the user has visited?
A Cookies
Metadata
A Sessions
A User profiles
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. Thus, the ability to hide data in another file is called;
Encryption
Data parsing
A Steganography.
A and B
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?