Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the following example is a way for a forensic investigator to obtain evidence from computer when cybercrime occurs?
Correct
A forensic investigator should examine all the log files as the suspect might hide in any of them.
Incorrect
A forensic investigator should examine all the log files as the suspect might hide in any of them.
-
Question 2 of 10
2. Question
Which of the following is the correct procedures when recovering a data from cybercrime incident?
Correct
Computer forensic investigator needs to be very careful on handling evidence and to ensure all the procedures being documented. Or the evidence will be questioned at court
Incorrect
Computer forensic investigator needs to be very careful on handling evidence and to ensure all the procedures being documented. Or the evidence will be questioned at court
-
Question 3 of 10
3. Question
Photography plays an important role in the crime scene during handling the evidence. Which of the following is the correct step that should be done during the photographing process?
Correct
Photography is one of the ways to document how the evidence being handled
Incorrect
Photography is one of the ways to document how the evidence being handled
-
Question 4 of 10
4. Question
Forensic is a way to identify and preserve evidence and present it for an investigation. Which one is one of the consequences when evidence is compromised?
Correct
The suspect has an opportunity to run away from being punished for their crime act
Incorrect
The suspect has an opportunity to run away from being punished for their crime act
-
Question 5 of 10
5. Question
Authentication is very important to confirm that all the data from the original devices are duplicated correctly without any alternation. Which of the following shows the consequence when the evidence is corrupted?
Correct
The examining outcome might not accurate and it will not be recognized in court
Incorrect
The examining outcome might not accurate and it will not be recognized in court
-
Question 6 of 10
6. Question
What is the important concept should be remembered when handling and examining the evidence or data during the analysis process for cybercrime?
Correct
All the evidence need to ensure its integrity to be able to present it to the court
Incorrect
All the evidence need to ensure its integrity to be able to present it to the court
-
Question 7 of 10
7. Question
It is vital for forensic investigation to secure the data and equipment from the crime scene and ensure the authentication. Which of the following best describes the reason?
Correct
The integrity of the evidence will be questioned
Incorrect
The integrity of the evidence will be questioned
-
Question 8 of 10
8. Question
Data retention should be done even the overall cybercrime investigation completed, and some team will retain their file for few years before deleting them. What is the main purpose of this?
Correct
There will be a standard procedure for every organization in keeping those old data for future reference
Incorrect
There might be further investigation required in the next few years
-
Question 9 of 10
9. Question
The first responder of a cybercrime incident must firstly able to identify and establish the scale of the crime scene and secure the spot area. Which of the following best describes the purpose of this action?
Correct
The original evidence from the crime scene must be preserved and ensure its integrity
Incorrect
The original evidence from the crime scene must be preserved and ensure its integrity
-
Question 10 of 10
10. Question
The crime scene needs to be secured and prevent from modification or destroyed intentionally by others. Which of the following is the correct way to ensure the safety of all the data and system?
Correct
Only specific personnel has the authority to access the original evidence
Incorrect
Only specific personnel has the authority to access the original evidence