Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
According to the operating system, those files are stored in a particular cluster with a given number for tracking purposes. However, some cluster does not belong to any particular files which are known as a lost cluster, and this might due to:
Correct
The data will be reallocated to a new cluster when there is improper shut down of devices or without following the right way
Incorrect
The data will be reallocated to a new cluster when there is improper shut down of devices or without following the right way
-
Question 2 of 10
2. Question
There is an increasing challenge for investigators on computer-facilitated crime. Which of the following best describes the reason?
Correct
The hacking tools are now can be easily downloaded and use by anyone and it does not remain no physical evidence that can be proved. Therefore, the forensic investigator needs to find a way to prove the evidence
Incorrect
The hacking tools are now can be easily downloaded and use by anyone and it does not remain no physical evidence that can be proved. Therefore, the forensic investigator needs to find a way to prove the evidence
-
Question 3 of 10
3. Question
A qualified forensic investigator must always follow certain rules. Which of the following should NOT apply to the forensic investigators?
Correct
The forensic investigator is not advised to examine the original evidence but uses the duplicated instead.
Incorrect
The forensic investigator is not advised to examine the original evidence but uses the duplicated instead.
-
Question 4 of 10
4. Question
What is the main reason for forensic investigator to duplicate the original evidence before doing the investigation?
Correct
The original evidence needs to be duplicate and FI should use the duplicated data for the investigation to avoid alternation or spoilage.
Incorrect
The original evidence needs to be duplicate and FI should use the duplicated data for the investigation to avoid alternation or spoilage.
-
Question 5 of 10
5. Question
Which of the following need to takes into consideration by a forensic investigator while purchase for desktop laboratory processing system?
Correct
As the hardware ages quickly, they need to choose specifications that could last longer to avoid frequent purchases.
Incorrect
As the hardware ages quickly, they need to choose specifications that could last longer to avoid frequent purchases.
-
Question 6 of 10
6. Question
What are the important portable devices forensic kit tools should forensic investigators equip with when handling volatile evidence?
Correct
The forensic investigator needs to well known on tools that are available for the investigation
Incorrect
The forensic investigator needs to well known on tools that are available for the investigation
-
Question 7 of 10
7. Question
When starting to investigate a crime, there will be a number of teams involved in the case. Which of the following role will NOT be involved when conducting an investigation?
Correct
The team of investigation should be knowledgeable in forensic and have specific duties when involved in the computer crime case investigation
Incorrect
The team of investigation should be knowledgeable in forensic and have specific duties when involved in the computer crime case investigation
-
Question 8 of 10
8. Question
Collect volatile data/evidence is a challenging job for computer forensic investigators. Which of the following best describe the reason?
Correct
The volatile data are not physically touchable and would be easily altered by others without being noticed
Incorrect
The volatile data are not physically touchable and would be easily altered by others without being noticed
-
Question 9 of 10
9. Question
FTK Imager is one of the Forensic Tool Kit that assist with computer forensic analysis. Which of the following is the function of these tools?
Correct
Forensic analysis tools should not have to damage the original evidence
Incorrect
Forensic analysis tools should not have to damage the original evidence
-
Question 10 of 10
10. Question
Which of the following example considered to commit an email crime?
Correct
Email may be directly classified into crime which related to offensive intention and immoral activities
Incorrect
Email may be directly classified into crime which related to offensive intention and immoral activities