Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the following NOT under the email crimes investigation process?
Correct
Investigators should examine both email header and email message while conducting the analysis.
Incorrect
Investigators should examine both email header and email message while conducting the analysis.
-
Question 2 of 10
2. Question
What is the first step for forensic investigator should do before conducting the examination?
Correct
The forensic investigator needs to have a verified search warrant to be able to conduct onsite
examination of all the devicesIncorrect
The forensic investigator needs to have a verified search warrant to be able to conduct onsite
examination of all the devices -
Question 3 of 10
3. Question
When forensic investigator conduct an examination on PDA, the device needs to maintain in charging. Which of the following best describe the reason?
Correct
The PDA contains both volatile and non-volatile data, to maintain the device in charging could avoid the unexpected power supply cut off which might lead to data missing
Incorrect
The PDA contains both volatile and non-volatile data, to maintain the device in charging could avoid the unexpected power supply cut off which might lead to data missing
-
Question 4 of 10
4. Question
Signature analysis is a vital part of examination activity as it can help the forensic investigator to identify the file type. Which of the following situation best describe how signature analysis functioning?
Correct
A file extensions might be changed by suspect in order to predict themselves being detect
Incorrect
A file extensions might be changed by suspect in order to predict themselves being detect
-
Question 5 of 10
5. Question
As an forensic investigator, which of the following should NOT do when arrive on the scene?
Correct
All the duplication job should be done after the evidence bring back to lab
Incorrect
All the duplication job should be done after the evidence bring back to the lab
-
Question 6 of 10
6. Question
Once an investigation begins for a cybercrime incident, which of the following procedure(s) should be followed by all the team members?
Correct
The cyber forensic investigator needs to ensure the original crime scene been preserved and every action need to be recorded
Incorrect
The cyber forensic investigator needs to ensure the original crime scene been preserved and every action need to be recorded
-
Question 7 of 10
7. Question
Which of the following(s) best describe the proper procedure for a computer forensic team when handling a crime scene?
Correct
The evidence collected from the crime scene needs to be packaged properly to avoid destruction. This is because every piece of evidence should be ended up in court
Incorrect
The evidence collected from the crime scene needs to be packaged properly to avoid destruction. This is because every piece of evidence should be ended up in court
-
Question 8 of 10
8. Question
What is the basic soft skill that should equipped by a forensic investigator?
Correct
The skills and knowledge are equally important as a forensic investigator. The soft skills are including attention to details, teamwork spirit as well as patience
Incorrect
The skills and knowledge are equally important as a forensic investigator. The soft skills are including attention to details, teamwork spirit as well as patience
-
Question 9 of 10
9. Question
What is the primary function(s) of the computer forensic team?
Correct
The primary task for the computer forensic team is to collect relevant evidence and to ensure chains of custody
Incorrect
The primary task for the computer forensic team is to collect relevant evidence and to ensure chains of custody
-
Question 10 of 10
10. Question
During collecting the evidence for a cybercrime incident, the crime scene technician will start securing the type and location of the evidence. Which of the following best describes the reason for this action?
Correct
All the evidence in the crime scene needs to be preserved to ensure the integrity
Incorrect
All the evidence in the crime scene needs to be preserved to ensure the integrity