Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
At the beginning of the investigation, a forensic analysis activity should standby with 2 persons, one for carrying out the analysis while the other makes a record for the whole process of the investigation. Which of the following best describes the reason?
Correct
All the evidence needs to be handled and preserved properly to ensure its integrity
Incorrect
All the evidence needs to be handled and preserved properly to ensure its integrity
-
Question 2 of 10
2. Question
What are the main criteria that should be considered and recorded in the logbook while carrying out the investigation for a cybercrime incident, to prove the integrity of evidence?
Correct
All the details of the investigations need to record properly to ensure their integrity and to be able recognized by the court
Incorrect
All the details of the investigations need to record properly to ensure their integrity and to be able recognized by the court
-
Question 3 of 10
3. Question
Computer forensic investigators need to trace, analyze and examine data during the process, while some data cannot stay long, which called volatile data. Which of the following is one of the storage methods for volatile data?
Correct
There must be always power supply for volatile evidence as all the data might be lost once the device shut down
Incorrect
There must be always power supply for volatile evidence as all the data might be lost once the device shut down
-
Question 4 of 10
4. Question
Digital evidence is one of the important data from computer forensic that extract from the crime scene. Which are the following can be considered as valid and integrated digital evidence to be submitted to the court?
Correct
A forensic investigator department has its own way of rules in handling volatile data and ensures its integrity
Incorrect
A forensic investigator department has its own way of rules in handling volatile data and ensures its integrity
-
Question 5 of 10
5. Question
Which of the following situation need to carry out a computer forensic investigation?
Correct
All cybercrime that occurs should include a computer forensic investigation
Incorrect
All cybercrime that occurs should include a computer forensic investigation
-
Question 6 of 10
6. Question
International issues can be raised when carrying out a computer forensic investigation. Which of the following best describe the scenario?
Correct
The investigation team might need to need to communicate with law enforcement from other countries to carry out the investigation
Incorrect
The investigation team might need to need to communicate with law enforcement from other countries to carry out the investigation
-
Question 7 of 10
7. Question
The first rule of digital forensic investigator in handling evidence is:
Correct
The very first task for a forensic investigation team is to preserve the original evidence and to ensure its integrity
Incorrect
The very first task for a forensic investigation team is to preserve the original evidence and to ensure its integrity
-
Question 8 of 10
8. Question
Most of the computer crime preferred to attack small companies. Which of the following is the main reason for it?
Correct
Small companies are with lower internet security protection and easier to attack in order to obtain financial relevant information
Incorrect
Small companies are with lower internet security protection and easier to attack in order to obtain financial relevant information
-
Question 9 of 10
9. Question
Cybercrime or cyber attack become more easily accessible by individuals. Which of the following best describe the purpose of these individuals committed cybercrime?
Correct
There are various purposes for theft to hack into others network in order to gain information that bring benefits to them
Incorrect
There are various purposes for theft to hack into others network in order to gain information that bring benefits to them
-
Question 10 of 10
10. Question
There are many modes of cybercrime attack such as insider attack and outsider attack. Which of the following situation considered a cyber attack?
Correct
Most of the cyber-attacks are with the purpose of gaining information that brings benefit to them
Incorrect
Most of the cyber-attacks are with the purpose of gaining information that brings benefit to them