Try to answer these 80 Computer forensics MCQs and check your understanding of the Computer forensics subject. Scroll down and let's begin!
A. ISO2960
B. NISPOM
C. SSO 990
D. STORSEC
A. Computer evidence bags (antistatic bags)
B. Leather gloves and disposable latex gloves
C. A digital camera with extra batteries or 35mm camera with film and flash
D. External USB devices or a portable hard drive
A. Business
B. Commingled
C. Sniffing
D. Government
A. Bookmarks
B. Hiding
C. Scope creep
D. Hexadecimal editor, computer forensics tool
A. Linux
B. Windows
C. Vista
D. Mac
A. Variables
B. hex values
C. Hashes
D. Slack spaces
A. Cross-examination banks
B. Examination banks
C. Deposition banks
D. Disqualification banks
A. Data transformation
B. Data contraception
C. Data hiding
D. Data fabrication
A. Write
B. DD
C. Cat
D. Dump
A. /etc/group
B. /etc/exports
C. Data block
D. None of these
A. Etherape
B. Argus
C. Tcpslice
D. Tethereal
A. .Bigger and more powerful
B. Smaller and more powerful
C. Bigger and less powerful
D. Smaller and less powerful
A. Search boxes
B. The address bar
C. The resolution finder
D. Folder windows
A. Reporting
B. Validation / verification
C. Extraction
D. Acquisition
A. Hexadecimal
B. Image
C. Disk
D. Text
A. Hal.dll
B. User32.sys
C. Pagefile.sys
D. Ntoskrnl.exe
A. Emotional
B. Biological
C. Hearsay
D. Physical
A. Defendant
B. Empanelling the jury
C. Plaintiff
D. Motion in limine
A. Sparse acquisition
B. Fourth Amendment
C. U.S. DOJ
A. SubSe7en
B. 10pht
C. PDServer
D. VNCServer
A. Warning banner
B. Consumer
C. User banner
D. End user
A. Zone Bit Recorder (ZBR)
B. Boot.ini
C. The outer most track
D. Logical cluster numbers
A. Professional
B. Direct
C. Discovery
D. Expert
A. Examination
B. Discovery
C. Direct
D. Rebuttal
A. Keyed hash set
B. Computer-stored records
C. Professional curiosity
D. Probable cause
A. Probable cause
B. Sparse acquisition
C. Business
D. Much easier than
A. Raw format
B. Sparse acquisition
C. Proprietary format
D. Raid imaging
A. ProDiscover Basic
B. FDisk
C. ProDelete
D. GainFile
A. 700
B. 701
C. 702
D. 703
A. Hashsum
B. Sha1sum
C. Shasum
D. Rcsum
A. Compare
B. Cmp
C. Vf
D. Imgcheck
A. Attrition
B. Attribution
C. Allegation
D. Assignment
A. Digital investigations
B. Data recovery
C. Vulnerability/threat assessment and risk management
D. Network intrusion detection and incident response
A. A text editor tool
B. A write-blocker device
C. An SCSI card
D. Remote access software
A. RAID 0
B. RAID 15
C. RAID 10
D. RAID 16
A. Secure Facility.
B. Silver-Platter
C. Digital Forensics
D. Hash Value
A. A witness list
B. the nature of the case
C. a description of evidence
D. Vendor names for computer components
A. AFD
B. AFF
C. MD5
D. RC4
A. 25 GB
B. 50 GB
C. 75 GB
D. 100 GB
A. Individuals; groups
B. Civil law.
C. Society; individuals
D. Society; government
A. 10
B. 16
C. 4
D. 8
A. FFE0
B. FFE1
C. FFD8
D. FFD9
A. Words
B. Text
C. Paragraphs
D. Sections
A. 3
B. 4
C. 5
D. 6
A. Two
B. Five
C. One
D. Three
A. 0x88
B. 0x90
C. 0x85
D. 0x80
A. Nigerian Scam
B. Lake Venture Scam
C. Conficker virus
D. Iloveyou Scam.
A. Federal Rules of Evidence
B. federal consistency standards
C. Federal proceedings law
D. data recovery
A. Cross-examination
B. Direct examination
C. Rebuttal
D. Motions in limine
A. Bitcopy
B. Dcfldd
C. Raw
D. Echo