
CNET151 - Chapt 14 - Intro to Forensics
Authored by Karen Diggs
Computers
11th Grade
Used 24+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Frequently, the first responder to a computer crime is the network administrator.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You use the netstat command with a forensic copy of a machine to compare two files and show the differences.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Windows Registry contains a list of USB devices that have been connected to the machine.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Linux, you use the dd command to set up a target forensics server to receive a copy of a drive. True or False?
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The chain of custody documents the handling of evidence from the moment of seizure until it is presented in court.
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Most Windows logs are turned on automatically.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Windows stores information such as web addresses, search queries, and recently opened files in a file called index.dat.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?