Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
There is a circumstance where the deleted item does not appear in the Recycle Bin in the computer system. Which of the following might be the reason for the above situation to appear?
Correct
A deleted file will not appear in Recycle Bin when an INFO error happened
Incorrect
A deleted file will not appear in Recycle Bin when an INFO error happened
-
Question 2 of 10
2. Question
What would be the reason for a computer user to repair a damaged file in a computer system?
Correct
A forensic investigator needs to perform file recovery for them to start the investigation analysis
Incorrect
A forensic investigator needs to perform file recovery for them to start the investigation analysis
-
Question 3 of 10
3. Question
Which of the following step can be taken by the computer user to recover their file if the file has been removed from Recycle Bin or deleted from removable media?
Correct
The deleted file can be recovered via specific forensic siftware
Incorrect
The deleted file can be recovered via specific forensic siftware
-
Question 4 of 10
4. Question
There is a MUST for computer forensic investigators to perform analysis through software that is designed for forensic use. Which of the following best describes the reason for it?
Correct
Data retrieved from non-computer forensic tools could be deemed inadmissible in court
Incorrect
Data retrieved from non-computer forensic tools could be deemed inadmissible in court
-
Question 5 of 10
5. Question
Which of the following is the correct way for forensic investigators to perform data recovery when examining a cybercrime incident?
Correct
An outsource item has a high possibility to destroy the original data in computer system
Incorrect
An outsource item has a high possibility to destroy the original data in computer system
-
Question 6 of 10
6. Question
Which of the following software can be used to repair Microsoft Office products?
Correct
Microsoft Office products can be recovered via My Excel, My Word, OutlookFix and etc
Incorrect
Microsoft Office products can be recovered via My Excel, My Word, OutlookFix and etc
-
Question 7 of 10
7. Question
When a computer forensic investigator performs data analysis, they might encounter challenges with trapped in the computer a system whereby the program could run to automatically reformat the hard disk or overwrite the data if an incorrect password was entered. What is step should be taken by an officer when doing this kind of analysis?
Correct
A forensic investigator must duplicate the original data before performing analysis in order to avoid being trapped.
Incorrect
A forensic investigator must duplicate the original data before performing analysis in order to avoid being trapped.
-
Question 8 of 10
8. Question
Data acquisition is one of the vital processes in gathering information and evidence from a suspect computer or devices to gain crime evidence. Which of the following best describes the goal of data acquisition?
Correct
The data acquisition process is used to perform analysis from a cybercrime incident in order to obtain adequate evidence to present it to the court
Incorrect
The data acquisition process is used to perform analysis from a cybercrime incident in order to obtain adequate evidence to present it to the court
-
Question 9 of 10
9. Question
A number of tools can be used to create a copy of data in a computer forensic investigation. The data will be converted and compressed into a file called an image file, which is exactly the same as the original. Which of the following element would be includedd in the mirror image?
Correct
All the file that duplicates from original devices will be preform in an image file
Incorrect
All the file that duplicates from original devices will be preform in an image file
-
Question 10 of 10
10. Question
There will be always advisable to use hardware-based write-blocking software to perform data duplication from the suspect’s computer or devices. Which of the following best describes the reason for it?
Correct
Hardware-based write-blocking software is the safest way to perform data analysis, which could avoid the original data from being altered
Incorrect
Hardware-based write-blocking software is the safest way to perform data analysis, which could avoid the original data from being altered