Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
The organization should not tolerate a hostile working environment. In which of the following situation considered a Hostile Working Environment?
Correct
A hostile working environment is when a person finds that he/she being humiliating or with physical threats from others. It would be in the company’s best interest to take this problem seriously as it would affect an employee’s performance.
Incorrect
A hostile working environment is when a person finds that he/she being humiliating or with physical threats from others. It would be in the company’s best interest to take this problem seriously as it would affect an employee’s performance.
-
Question 2 of 10
2. Question
Mandy is a computer forensic investigator. When comes to the crime scene, she found that the laptop is switched off. In this scenario, which of the following should Mandy do next?
Correct
All the devices should be preserved in order to prevent data loss. When found that the device is switched off, it should remain off.
Incorrect
All the devices should be preserved in order to prevent data loss. When found that the device is switched off, it should remain off.
-
Question 3 of 10
3. Question
Once an investigation occurs, it would be important to keep the crime scene secured and at the same time ensure detach computers from the network. Which of the following best describes the reason?
Correct
There would be an opportunity for outsiders to hack into the computer via network and destroy the important evidence
Incorrect
There would be an opportunity for outsiders to hack into the computer via network and destroy the important evidence
-
Question 4 of 10
4. Question
Write protection can prevent data from being written, modified, or deleted on the original hard disk. Which of the following is the consequence when important information being destroyed.
Correct
Any damaged or destroyed data will not be able to submit to the court as it has lost its credibility
Incorrect
Any damaged or destroyed data will not be able to submit to the court as it has lost its credibility
-
Question 5 of 10
5. Question
What is the main function to apply for write protection in the forensic software during the evidence analysis?
Correct
Write protection could prevent data from being altered during the overall examination activity
Incorrect
Write protection could prevent data from being altered during the overall examination activity
-
Question 6 of 10
6. Question
Data duplication is one of the important steps for a forensic investigator to copy the original data and transfer it to another media, to prevent the original information from being destroyed. Which of the following is the correct way to duplicate the original data?
Correct
There should not be any item plug into the device during data extraction to prevent data lost
Incorrect
There should not be any item plug into the device during data extraction to prevent data lost
-
Question 7 of 10
7. Question
It would be crucial for computer forensic investigators for retaining the time and date of creation or modification
of a file in a criminal case. Which of the following is the best way for an officer to demonstrate the proper time zone?Correct
All the activity during the overall investigation need to be documented in order to ensure its integrity
Incorrect
All the activity during the overall investigation need to be documented in order to ensure its integrity
-
Question 8 of 10
8. Question
A logical extraction is one of the methods used by computer forensic investigators to identify and recover files based on a computer operating system. Which of the following is the correct action to be performed by the officer during the extraction activity?
Correct
All the data need to be extracted and find any evidence related to the incident
Incorrect
All the data need to be extracted and find any evidence related to the incident
-
Question 9 of 10
9. Question
What kind of information can be obtained by a computer forensic investigator while using timeframe analysis?
Correct
The timeframe analysis is used to identify the overall activity of the file
Incorrect
The timeframe analysis is used to identify the overall activity of the file
-
Question 10 of 10
10. Question
All the criminal data or information can be hidden in various ways by a criminal to avoid being detected by a forensic investigator. Which of the following way usually used by cybercriminals in hiding their file?
Correct
A forensic investigator needs to check on every file possible as a thief in nowadays is getting smart in hiding evidence
Incorrect
A forensic investigator needs to check on every file possible as a thief in nowadays is getting smart in hiding evidence