
Digital Forensics Quiz
Authored by ANIKET PAUL
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Windows forensics, which log type would most likely reveal evidence of privilege escalation attempts?
Application Log
Security Log
Setup Log
Forwarded Events
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An investigator detects unusual SSH login attempts on a Linux server. Which command provides the most targeted view of authentication-related events?
cat /var/log/messages
journalctl -u sshd
less /var/log/syslog
dmesg
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which log correlation scenario provides the strongest indication of a web server compromise?
Apache access.log shows multiple 404 errors from the same IP.
Apache error.log shows repeated PHP warnings.
Firewall logs show denied outbound traffic.
Apache access.log indicates a SQL injection payload followed by a database error in MySQL logs.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the digital forensic workflow, why is hashing (MD5/SHA-256) applied immediately after evidence acquisition?
To compress evidence for storage efficiency.
To prove evidence integrity throughout investigation.
To encrypt the evidence against attackers.
To anonymize sensitive data during analysis.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which forensic artifact from the Windows Registry is most useful to confirm that a specific USB device was used for data exfiltration?
NTUSER.DAT RecentDocs
SYSTEM\MountedDevices
SYSTEM\CurrentControlSet\Enum\USBSTOR
SAM hive
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During vulnerability assessment, a team discovers HTTP PUT enabled on a production server. What is the most critical risk this configuration introduces?
Unauthorized data deletion
Upload of malicious files such as web shells
Brute-force login attacks
Misconfigured TLS certificates
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which log management tool is best suited for real-time detection of insider threats by correlating user login anomalies across multiple systems?
Autopsy
Splunk
FTK Imager
Nikto
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Security Threats and Trust Boundaries
Quiz
•
University
15 questions
Round 2 Debug-The-Code
Quiz
•
University
20 questions
3°DS _AV2_R2 3TEC_PM_Programação Mobile _12_20 Quizizz
Quiz
•
11th Grade - University
20 questions
System and network support and management
Quiz
•
11th Grade - Professi...
15 questions
INTELLECTUAL REVOLUTIONS THAT DEFINED SOCIETY
Quiz
•
University
20 questions
Hashing
Quiz
•
University
20 questions
Linux Directory Structures
Quiz
•
10th Grade - University
20 questions
Computer Forensics Investigation Process
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade