Digital Forensics Week 05 Practice Quiz (18 Questions)


Score 11 or greater to pass.

  1. DF6 W05: Q01. Which of the following relates to verifying the integrity of the data stored on a hard disk

  2. DF6 W05: Q02. Which of the following is NOT considered a type of digital evidence?

  3. DF6 W05: Q03. Which of the following provides details about file creation, access, and modification in relation to files digital forensics?

  4. DF6 W05: Q04. What is the primary goal of a digital forensics investigation?

  5. DF6 W05: Q05. Which protocol is most commonly used to preserve chain of custody in digital evidence handling?

  6. DF6 W05: Q06. Which of the following best describes volatile memory?

  7. DF6 W05: Q07. Which technique is used to prevent digital devices from connecting to wireless networks during a forensic investigation?

  8. DF6 W05: Q08. What is the main purpose of a forensic image of a hard drive?

  9. DF6 W05: Q09. Why is chain of custody important in digital forensics?

  10. DF6 W05: Q10. What does the term "data carving" refer to?

  11. DF6 W05: Q11. In forensic analysis, what is 'steganography' commonly used for?

  12. DF6 W05: Q12. What kind of data is typically NOT recovered through file carving?

  13. DF6 W05: Q13. Which file attribute would indicate a file has been accessed but NOT modified?

  14. DF6 W05: Q14. Which of the following can be used to identify the geographic origin of an IP address?

  15. DF6 W05: Q15. Which one of the following is considered a primary tool in digital forensics investigations?

  16. DF6 W05: Q16. What is a potential risk of using the original device for examination in a digital forensic case?

  17. DF6 W05: Q17. In digital forensics, what is the main function of 'data carving'?

  18. DF6 W05: Q18. In mobile device forensics, what type of memory is commonly extracted to retrieve deleted data?