1. Computer forensics also known as?
A. digital forensic science
B. computer crime
C. computer forensic science
D. computer forensics investigations
Explanation: Computer forensics also known as computer forensic science
2. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?
A. Steganography
B. Stochastic forensics
C. Both A and B
D. None of the above
Explanation: A method which uses stochastic properties of the computer system to investigate activities lacking digital artifacts. Its chief use is to investigate data theft.
3. computer forensics also be used in civil proceedings.
A. Yes
B. No
C. Can be yes or no
D. Can not say
Explanation: Yes, computer forensics may also be used in civil proceedings.
4. Which of the following techniques are used during computer forensics investigations?
A. Cross-drive analysis
B. Live analysis
C. Deleted files
D. All of the above
Explanation: All of the above are techniques are used during computer forensics investigations.
5. CCFP stands for?
A. Cyber Certified Forensics Professional
B. Certified Cyber Forensics Professional
C. Certified Cyber Forensics Program
D. Certified Cyber Forensics Product
Explanation: CCFP : Certified Cyber Forensics Professional
6. How many c’s in computer forensics?
A. 1
B. 2
C. 3
D. 4
Explanation: There are three c’s in computer forensics : confidence. credibility. Cost
7. You are suppose to maintain three types of records. Which answer is not a record?
A. Chain of custody
B. Documentation of the crime scene
C. Searching the crime scene
D. Document your actions
Explanation: You are suppose to maintain three types of records. Searching the crime scene is not a record
8. Physical Forensics Discipline include which of the following?
A. Bloodstain
B. Eating
C. Searching
D. Watching
Explanation: Physical Forensics Discipline include Bloodstain.
9. Volatile data resides in ?
A. registries
B. cache
C. RAM
D. All of the above
Explanation: Volatile data resides in registries, cache, and random access memory (RAM). The investigation of this volatile data is called live forensics.
10. Deleted files is a common technique used in computer forensics is the recovery of deleted files.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
Explanation: True, Deleted files is a common technique used in computer forensics is the recovery of deleted files.