
CNET151 Chapt 14 - Introduction to Forensics
Authored by Karen Diggs
Computers
University
Used 36+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Frequently, the first responder to a computer crime is __________.
The network administrator
A law enforcement officer
The news media
A private investigator
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
If you fail to handle evidence properly __________.
You may damage the hard drive
It may be unusable in court
Law enforcement may not look at it
None of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You may use Linux to make a __________ of the hard drive.
Bootable copy
Screenshot
New version
Forensically valid copy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Use the Linux __________ command-line command to wipe the target drive in a forensics examination.
cc
dd
nc
md5sum
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Use the Linux __________ command-line command to back up your hard drive if you want to create a hash.
cc
dd
nd
md5sum
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Documentation of every person who had access to evidence, how they interacted with it, and where it was stored is called the __________.
Forensic trail
Chain of custody
Audit trail
Inspection report
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Usually, the first thing you do to a computer to prevent further tampering is to __________.
Make a backup
Make a copy
Take it offline
Lock it in a secure room
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?