Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
- Question 1 of 10
1. Question
David, a forensic investigator, needs to acquire volatile data from a running system. Which of the following should he use?
CorrectIncorrect - Question 2 of 10
2. Question
Which of the following is a technique used to hide data within other data, such as an image or audio file?
CorrectIncorrect - Question 3 of 10
3. Question
A forensic investigator is examining a file system and needs to determine if files have been hidden using NTFS alternate data streams. Which tool should he use?
CorrectIncorrect - Question 4 of 10
4. Question
During a forensic investigation, Maria finds that several files on a suspect’s computer have been overwritten multiple times. Which of the following techniques was likely used to prevent data recovery?
CorrectIncorrect - Question 5 of 10
5. Question
Which file system is commonly used by Windows operating systems and supports features such as file compression, encryption, and large file support?
CorrectIncorrect - Question 6 of 10
6. Question
A forensic investigator is tasked with examining an Android device. Which of the following tools is specifically designed for mobile device forensics?
CorrectIncorrect - Question 7 of 10
7. Question
Which of the following methods is used to ensure the integrity and authenticity of digital evidence collected during an investigation?
CorrectIncorrect - Question 8 of 10
8. Question
While examining a suspect’s computer, a forensic investigator finds a large number of deleted files. Which tool can be used to recover these deleted files?
CorrectIncorrect - Question 9 of 10
9. Question
In the context of computer forensics, what does the term “chain of custody” refer to?
CorrectIncorrect - Question 10 of 10
10. Question
Which of the following is a digital forensics framework that provides a graphical interface for The Sleuth Kit?
CorrectIncorrect