Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the following should be check by a computer forensic investigator when exploring for evidence?
Correct
The forensic investigator should explore and investigate all relevant information relating to the incident
Incorrect
The forensic investigator should explore and investigate all relevant information relating to the incident
-
Question 2 of 10
2. Question
The Temp Folder is one of the important locations that need to be check by a computer forensic investigator. Which of the following best describes the reason?
Correct
Temp file is the most recent activities on the computer system and could reveal the latest movement of the user
Incorrect
Temp file is the most recent activities on the computer system and could reveal the latest movement of the user
-
Question 3 of 10
3. Question
When a computer forensic investigator performs the analysis of the evidence on a Window system, it is important to undergo an extensive backup of data. Which of the following best describes the reason?
Correct
An extension backup of data is used to back up for data lost
Incorrect
An extension backup of data is used to back up for data lost
-
Question 4 of 10
4. Question
The Alternate Data Streams (ADS) provide an attacker with hiding rootkits or hacker tools on the compromised system. What is the purpose of using this tool?
Correct
The ADS let the hacker from noticed by the system administrator
Incorrect
The ADS let the hacker from noticed by the system administrator
-
Question 5 of 10
5. Question
All the file systems need to be mounted before used under Linux or they will be overwritten to devices if not mounted. Which of the following is the feature of the mount command?
Correct
The mount command is used to record the last access times on a driver image of the device
Incorrect
The mount command is used to record the last access times on a driver image of the device
-
Question 6 of 10
6. Question
Which of the following demonstrates the challenges of using Linux as a forensic tool in analyzing a disk image?
Correct
The Linux does not have a GUI interface at the command line, the data can be written at all time, and unable to recognize off a number of sectors
Incorrect
The Linux does not have a GUI interface at the command line, the data can be written at all time, and unable to recognize off a number of sectors
-
Question 7 of 10
7. Question
Which of the following evidence search functionality is provided by Autopsy Browser?
Correct
Autopsy Browser do provide the function of file listing, image details, and file content
Incorrect
Autopsy Browser do provide the function of file listing, image details, and file content
-
Question 8 of 10
8. Question
Which of the following functions designed by Autopsy for case management?
Correct
The Autopsy has the function of event sequence, image integrity, and audit logs for case management
Incorrect
The Autopsy has the function of event sequence, image integrity, and audit logs for case management
-
Question 9 of 10
9. Question
What does the concept of image steganography mean?
Correct
Image steganography is used to hide information in the form of image
Incorrect
Image steganography is used to hide information in the form of image
-
Question 10 of 10
10. Question
What is the main intention of using watermarking in the data or information?
Correct
The watermarking that display in the data or information is used to protect the intellectual property right of the data or information
Incorrect
The watermarking that display in the data or information is used to protect the intellectual property right of the data or information