300+ TOP Computer Forensics MCQs and Answers

1. Computer forensics also known as?

A. digital forensic science
B. computer crime
C. computer forensic science
D. computer forensics investigations

Explanation: Computer forensics also known as computer forensic science

2. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?

A. Steganography
B. Stochastic forensics
C. Both A and B
D. None of the above

Explanation: A method which uses stochastic properties of the computer system to investigate activities lacking digital artifacts. Its chief use is to investigate data theft.

3. computer forensics also be used in civil proceedings.

A. Yes
B. No
C. Can be yes or no
D. Can not say

Explanation: Yes, computer forensics may also be used in civil proceedings.

4. Which of the following techniques are used during computer forensics investigations?

A. Cross-drive analysis
B. Live analysis
C. Deleted files
D. All of the above

Explanation: All of the above are techniques are used during computer forensics investigations.

5. CCFP stands for?

A. Cyber Certified Forensics Professional
B. Certified Cyber Forensics Professional
C. Certified Cyber Forensics Program
D. Certified Cyber Forensics Product

Explanation: CCFP : Certified Cyber Forensics Professional

6. How many c’s in computer forensics?

A. 1
B. 2
C. 3
D. 4

Explanation: There are three c’s in computer forensics : confidence. credibility. Cost

7. You are suppose to maintain three types of records. Which answer is not a record?

A. Chain of custody
B. Documentation of the crime scene
C. Searching the crime scene
D. Document your actions

Explanation: You are suppose to maintain three types of records. Searching the crime scene is not a record

8. Physical Forensics Discipline include which of the following?

A. Bloodstain
B. Eating
C. Searching
D. Watching

Explanation: Physical Forensics Discipline include Bloodstain.

9. Volatile data resides in ?

A. registries
B. cache
C. RAM
D. All of the above

Explanation: Volatile data resides in registries, cache, and random access memory (RAM). The investigation of this volatile data is called live forensics.

10. Deleted files is a common technique used in computer forensics is the recovery of deleted files.

A. TRUE
B. FALSE
C. Can be true or false
D. Can not say

Explanation: True, Deleted files is a common technique used in computer forensics is the recovery of deleted files.

Leave a Reply

Your email address will not be published. Required fields are marked *