Computer Forensics Practice Questions - 768 Verified Questions

Page 1


Computer Forensics Practice Questions

Course Introduction

Computer Forensics is an advanced course that explores the principles and practices of investigating digital crimes by recovering, analyzing, and preserving data from computers and other digital devices. Students learn about the methodologies used to identify and extract electronic evidence while maintaining its integrity for legal proceedings. The course covers topics such as file systems, data recovery, network forensics, incident response, and the relevant laws and ethical considerations associated with digital investigations. Practical exercises and case studies provide hands-on experience with industry-standard forensic tools and techniques, preparing students for real-world cybersecurity challenges in law enforcement, corporate, and governmental contexts.

Recommended Textbook

Guide to Computer Forensics and Investigations 4th Edition by Bill Nelson

Available Study Resources on Quizplus 16 Chapters

768 Verified Questions

768 Flashcards

Source URL: https://quizplus.com/study-set/1690

Page 2

Chapter 1: Computer Forensics and Investigations As a Profession

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33478

Sample Questions

Q1) What questions should an investigator ask to determine whether a computer crime was committed?

Answer: In a criminal case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.To determine whether there was a computer crime, an investigator asks questions such as the following: What was the tool used to commit the crime? Was it a simple trespass? Was it a theft, a burglary, or vandalism? Did the perpetrator infringe on someone else's rights by cyberstalking or e-mail harassment?

Q2) By the 1970s, electronic crimes were increasing, especially in the financial sector. A)True B)False

Answer: True

Q3) The ____________________ to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.

Answer: Fourth Amendment

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: Understanding Computer Investigations

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33479

Sample Questions

Q1) Describe some of the technologies used with hardware write-blocker devices. Identify some of the more commonly used vendors and their products.

Answer: There are many hardware write-blockers on the market.Some are inserted between the disk controller and the hard disk; others connect to USB or FireWire ports.Several vendors sell write-blockers, including Technology Pathways NoWrite FPU; Digital Intelligence Ultra- Kit, UltraBlock, FireFly, FireChief 800, and USB Write Blocker; WiebeTECH Forensic DriveDock; Guidance Software FastBloc2; Paralan's SCSI Write Blockers; and Intelligent Computer Solutions (www.ics-iq.com) Image LinkMaSSter Forensics Hard Case.

Q2) Employees surfing the Internet can cost companies millions of dollars.

A)True

B)False

Answer: True

Q3) Chain of custody is also known as chain of evidence.

A)True

B)False

Answer: True

Q4) A(n) ____________________ lists each piece of evidence on a separate page. Answer: single-evidence form

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: The Investigators Office and Laboratory

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33480

Sample Questions

Q1) sponsors the EnCE certification program

A)FireWire

B)Guidance Software

C)Business case

D)F.R.E.D.C.i.Disaster recovery plan

E)ASCLD/LAB

F)SIG

G)MAN

H)Norton Ghost

Answer: B

Q2) Requirements for taking the EnCE certification exam depend on taking the Guidance Software EnCase training courses.

A)True

B)False

Answer: False

Q3) What are the four levels of certification offered by HTCN?

Answer: Certified Computer Crime Investigator, Basic Level

Certified Computer Crime Investigator, Advanced Level

Certified Computer Forensic Technician, Basic

Certified Computer Forensic Technician, Advanced

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Data Acquisition

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33481

Sample Questions

Q1) FTK Imager requires that you use a device such as a USB or parallel port dongle for licensing.

A)True

B)False

Q2) SnapBack DatArrest runs from a true ____ boot floppy.

A) UNIX

B) Linux

C) Mac OS X

D) MS-DOS

Q3) What are some of the features offered by proprietary data acquisition formats?

Q4) For computer forensics, ____ is the task of collecting digital evidence from electronic media.

A) hashing

B) data acquisition

C) lossy compression

D) lossless compression

Q5) What are the steps to update the Registry for Windows XP SP2 to enable write-protection with USB devices?

Q6) Explain the use of hash algorithms to verify the integrity of lossless compressed data.

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Processing Crime and Incident Scenes

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33482

Sample Questions

Q1) _____________________ can be any information stored or transmitted in digital form.

Q2) During an investigation involving a live computer, do not cut electrical power to the running system unless it's an older ____ or MS-DOS system.

A) Windows XP

B) Windows 9x

C) Windows NT

D) Windows Me

Q3) How can you determine who is in charge of an investigation?

Q4) A(n) ____ should include all the tools you can afford to take to the field.

A) initial-response field kit

B) extensive-response field kit

C) forensic lab

D) forensic workstation

Q5) The most common computer-related crime is ____.

A) homicide

B) check fraud

C) car stealing

D) sniffing

Q6) Briefly describe the process of obtaining a search warrant.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Working With Windows and Dos Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33483

Sample Questions

Q1) gives an OS a road map to data on a disk

A)File system

B)Tracks

C)Track density

D)Partition gap

E)Drive slack

F)NTFS

G)Unicode

H)Data streams

I)BitLocker

Q2) The type of file system an OS uses determines how data is stored on the disk.

A)True

B)False

Q3) In Microsoft file structures, sectors are grouped to form ____________________, which are storage allocation units of one or more sectors.

Q4) Records in the MFT are referred to as ____.

A) hyperdata

B) metadata

C) inodes

D) infodata

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Current Computer Forensics Tools

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33484

Sample Questions

Q1) a direct copy of a disk drive

A)JFIF

B)Lightweight workstation

C)Pagefile.sys

D)Salvaging

E)Raw data

F)PDBlock

G)Norton DiskEdit

H)Stationary workstation

I)SafeBack

Q2) a tower with several bays and many peripheral devices

A)JFIF

B)Lightweight workstation

C)Pagefile.sys

D)Salvaging

E)Raw data

F)PDBlock

G)Norton DiskEdit

H)Stationary workstation

I)SafeBack

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Macintosh and Linux Boot Processes and File Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33485

Sample Questions

Q1) Describe the CD creation process.

Q2) Ext2fs can support disks as large as ____ TB and files as large as 2 GB.

A) 4

B) 8

C) 10

D) 12

Q3) What is a bad block inode on Linux?

Q4) ____ components define the file system on UNIX.

A) 2

B) 3

C) 4

D) 5

Q5) In older Mac OSs, a file consists of two parts: a data fork, where data is stored, and a ____ fork, where file metadata and application information are stored.

A) resource

B) node

C) blocks

D) inodes

Q7) What is a continuation inode? Page 10

Q6) Explain the use of forensic tools for Macintosh systems.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Computer Forensics Analysis and Validation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33486

Sample Questions

Q1) ____ attacks use every possible letter, number, and character found on a keyboard when cracking a password.

A) Brute-force

B) Dictionary

C) Profile

D) Statistics

Q2) What are the basic guidelines to identify steganography files?

Q3) a hashing algorithm

A)Court orders for discovery

B)Investigation plan

C)Digital Intelligence PDWipe

D)Live search

E)Cabinet

F)PRTK

G)Validating digital evidence

H)MD5

I)System Commander

Q4) Describe the effects of scope creep on an investigation in the corporate environment.

Q5) What are the file systems supported by FTK for forensic analysis?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Recovering Graphics Files

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33487

Sample Questions

Q1) The image format XIF is derived from the more common ____ file format.

A) GIF

B) JPEG

C) BMP

D) TIFF

Q2) You use ____ to create, modify, and save bitmap, vector, and metafile graphics files.

A) graphics viewers

B) image readers

C) image viewers

D) graphics editors

Q3) ____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

A) Replacement

B) Append

C) Substitution

D) Insertion

Q4) Give a brief overview of copyright laws pertaining to graphics within and outside the U.S.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Virtual Machines, Network Forensics, and Live Acquisitions

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33488

Sample Questions

Q1) What are some of the tools included with the PSTools suite?

Q2) The Knoppix STD tool ____ enables you to reset passwords on a Windows computer, including the administrator password

A) chntpw

B) john

C) oinkmaster

D) memfetch

Q3) ____ hide the most valuable data at the innermost part of the network.

A) Layered network defense strategies

B) Firewalls

C) Protocols

D) NAT

Q4) The term ____________________ means how long a piece of information lasts on a system.

Q5) What is the general procedure for a live acquisition?

Q6) Describe some of the Windows tools available at Sysinternals.

Q7) When intruders break into a network, they rarely leave a trail behind.

A)True

B)False

Q8) What is Knoppix-STD? Page 14

To view all questions and flashcards with answers, click on the resource link above.

Page 15

Chapter 12: E-Mail Investigations

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/33489

Sample Questions

Q1) text editor used with UNIX

A)Contacts

B)Pico

C)syslogd file

D)www.arin.net

E)PU020101.db

F)Notepad

G)CISCO Pix

H)www.whatis.com

I)Pine

Q2) ____ allocates space for a log file on the server, and then starts overwriting from the beginning when logging reaches the end of the time frame or the specified log size.

A) Continuous logging

B) Automatic logging

C) Circular logging

D) Server logging

Q3) What are the steps for retrieving e-mail headers on Pine?

Q4) What kind of information can you find in an e-mail header?

Q5) Describe how e-mail account names are created on an intranet environment.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 13: Cell Phone and Mobile Device Forensics

Available Study Resources on Quizplus for this Chatper

37 Verified Questions

37 Flashcards

Source URL: https://quizplus.com/quiz/33490

Sample Questions

Q1) nonvolatile memory

A)CDMA

B)iDEN

C)EDGE

D)ROM

Q2) What is the bandwidth offered by 3G mobile phones?

Q3) Mobile devices can range from simple phones to small computers, also called ______________________.

Q4) Investigating cell phones and mobile devices is a relatively easy task in digital forensics.

A)True

B)False

Q5) Typically, phones developed for use on a GSM network are compatible with phones designed for a CDMA network.

A)True

B)False

Q6) Most Code Division Multiple Access (CDMA) networks conform to IS-95, created by the ______________________.

Q7) What are the three main components used for cell phone communications?

Page 17

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Report Writing for High-Tech Investigations

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/33491

Sample Questions

Q1) a witness testifying to personally observed facts

A)Decimal numbering

B)Lay witness

C)FTK

D)Examination plan

E)Signposts

F)Verbal report

G)Spoliation

H)Conclusion section

I)MD5

Q2) Briefly explain how to limit your report to specifics.

Q3) A written preliminary report is considered a ____ document because opposing counsel can demand discovery on it.

A) low-risk

B) middle-risk

C) high-risk

D) no-risk

Q4) Explain how to use supportive material on a report.

Q5) Provide some guidelines for writing an introduction section for a report.

Q6) What are the report requirements for civil cases as specified on Rule 26, FRCP?

Page 18

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Expert Testimony in High-Tech Investigations

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/33492

Sample Questions

Q1) The purpose of the _____________________ is for the opposing attorney to preview your testimony before trial.

Q2) At a trial, _____________________ are statements that organize the evidence and state the applicable law.

Q3) What are some of the technical definitions that you should prepare before your testimony?

Q4) Like a job resume, your CV should be geared for a specific trial.

A)True

B)False

Q5) Discuss any potential problems with your attorney ____ a deposition.

A) before B) after C) during D) during direct examination at

Q6) What are the procedures followed during a trial?

Q7) When cases go to trial, you as a forensics examiner can play one of ____ roles.

A) 2

B) 3

C) 4

D) 5

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 16: Ethics for the Expert Witness

Available Study Resources on Quizplus for this Chatper

35 Verified Questions

35 Flashcards

Source URL: https://quizplus.com/quiz/33493

Sample Questions

Q1) In the United States, there's no state or national licensing body for computer forensics examiners.

A)True

B)False

Q2) People need ethics to help maintain their balance, especially in difficult and contentious situations.

A)True

B)False

Q3) The American Bar Association (ABA) is a licensing body.

A)True

B)False

Q4) one of the effects of violating court rules or laws

A)Ethics

B)Federal Rules of Evidence (FRE)

C)Disqualification

D)IACIS

Q5) What are some of standards for IACIS members that apply to testifying?

Q6) What are some of the guidelines included in the ISFCE code of ethics?

Q7) What are some of the factors courts have used in determining whether to disqualify an expert?

To view all questions and flashcards with answers, click on the resource link above. Page 20

Turn static files into dynamic content formats.

Create a flipbook