-
DF6 W04: Q01. Which type of data is captured in Live Acquisition?
-
DF6 W04: Q02. Which of the following is NOT considered a type of digital evidence?
-
DF6 W04: Q03. What tool is commonly used to capture network traffic in real time?
-
DF6 W04: Q04. In digital forensics, which of the following would be the best choice for imaging a hard drive to prevent data loss?
-
DF6 W04: Q05. Which of the following terms is associated with Audit Trail Documentation in relation to digital evidence handling?
-
DF6 W04: Q06. During forensic analysis, what is the significance of volatile memory?
-
DF6 W04: Q07. Which technique is used to prevent digital devices from connecting to wireless networks during forensic examination?
-
DF6 W04: Q08. What is the main purpose of a "forensic image" of a hard drive?
-
DF6 W04: Q09. Which of the following is a type of Operating System?
-
DF6 W04: Q10. Which of the following is NOT a common use of forensic imaging tools?
-
DF6 W04: Q11. What is a common challenge investigators face with encrypted files?
-
DF6 W04: Q12. What kind of data is typically NOT recovered through file carving?
-
DF6 W04: Q13. Which file attribute would indicate a file has been accessed but NOT modified?
-
DF6 W04: Q14. Which of the following can be used to identify the geographic origin of an IP address?
-
DF6 W04: Q15. Which one of the following is considered a primary tool in digital forensics investigations?
-
DF6 W04: Q16. What is a potential risk of using the original device for examination in a digital forensic case?
-
DF6 W04: Q17. In digital forensics, what is the main function of 'data carving'?
-
DF6 W04: Q18. In mobile device forensics, what type of memory is commonly extracted to retrieve deleted data?