Digital Forensics Quiz

Digital Forensics Quiz

University

20 Qs

quiz-placeholder

Similar activities

Chapter 7 (Docker)

Chapter 7 (Docker)

University

21 Qs

Sorting Algorithms II

Sorting Algorithms II

University

18 Qs

Estrutura de Dados - Questionário 4

Estrutura de Dados - Questionário 4

University

17 Qs

Time and Space Complexity

Time and Space Complexity

University

20 Qs

NT-1230 Lesson 11

NT-1230 Lesson 11

University

25 Qs

T4_Forensic Techniques into Incident Response

T4_Forensic Techniques into Incident Response

University

20 Qs

CompTIA Sec+

CompTIA Sec+

University - Professional Development

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

Digital Forensics Quiz

Digital Forensics Quiz

Assessment

Quiz

Computers

University

Medium

Created by

ANIKET PAUL

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Windows forensics, which log type would most likely reveal evidence of privilege escalation attempts?

Application Log

Security Log

Setup Log

Forwarded Events

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An investigator detects unusual SSH login attempts on a Linux server. Which command provides the most targeted view of authentication-related events?

cat /var/log/messages

journalctl -u sshd

less /var/log/syslog

dmesg

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which log correlation scenario provides the strongest indication of a web server compromise?

Apache access.log shows multiple 404 errors from the same IP.

Apache error.log shows repeated PHP warnings.

Firewall logs show denied outbound traffic.

Apache access.log indicates a SQL injection payload followed by a database error in MySQL logs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the digital forensic workflow, why is hashing (MD5/SHA-256) applied immediately after evidence acquisition?

To compress evidence for storage efficiency.

To prove evidence integrity throughout investigation.

To encrypt the evidence against attackers.

To anonymize sensitive data during analysis.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which forensic artifact from the Windows Registry is most useful to confirm that a specific USB device was used for data exfiltration?

NTUSER.DAT RecentDocs

SYSTEM\MountedDevices

SYSTEM\CurrentControlSet\Enum\USBSTOR

SAM hive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During vulnerability assessment, a team discovers HTTP PUT enabled on a production server. What is the most critical risk this configuration introduces?

Unauthorized data deletion

Upload of malicious files such as web shells

Brute-force login attacks

Misconfigured TLS certificates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which log management tool is best suited for real-time detection of insider threats by correlating user login anomalies across multiple systems?

Autopsy

Splunk

FTK Imager

Nikto

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?