Digital Forensics Week 04 Practice Quiz (18 Questions)


Score 11 or greater to pass.

  1. DF6 W04: Q01. Which type of data is captured in Live Acquisition?

  2. DF6 W04: Q02. Which of the following is NOT considered a type of digital evidence?

  3. DF6 W04: Q03. What tool is commonly used to capture network traffic in real time?

  4. DF6 W04: Q04. In digital forensics, which of the following would be the best choice for imaging a hard drive to prevent data loss?

  5. DF6 W04: Q05. Which of the following terms is associated with Audit Trail Documentation in relation to digital evidence handling?

  6. DF6 W04: Q06. During forensic analysis, what is the significance of volatile memory?

  7. DF6 W04: Q07. Which technique is used to prevent digital devices from connecting to wireless networks during forensic examination?

  8. DF6 W04: Q08. What is the main purpose of a "forensic image" of a hard drive?

  9. DF6 W04: Q09. Which of the following is a type of Operating System?

  10. DF6 W04: Q10. Which of the following is NOT a common use of forensic imaging tools?

  11. DF6 W04: Q11. What is a common challenge investigators face with encrypted files?

  12. DF6 W04: Q12. What kind of data is typically NOT recovered through file carving?

  13. DF6 W04: Q13. Which file attribute would indicate a file has been accessed but NOT modified?

  14. DF6 W04: Q14. Which of the following can be used to identify the geographic origin of an IP address?

  15. DF6 W04: Q15. Which one of the following is considered a primary tool in digital forensics investigations?

  16. DF6 W04: Q16. What is a potential risk of using the original device for examination in a digital forensic case?

  17. DF6 W04: Q17. In digital forensics, what is the main function of 'data carving'?

  18. DF6 W04: Q18. In mobile device forensics, what type of memory is commonly extracted to retrieve deleted data?