-
DF6 W05: Q01. Which of the following relates to verifying the integrity of the data stored on a hard disk
-
DF6 W05: Q02. Which of the following is NOT considered a type of digital evidence?
-
DF6 W05: Q03. Which of the following provides details about file creation, access, and modification in relation to files digital forensics?
-
DF6 W05: Q04. What is the primary goal of a digital forensics investigation?
-
DF6 W05: Q05. Which protocol is most commonly used to preserve chain of custody in digital evidence handling?
-
DF6 W05: Q06. Which of the following best describes volatile memory?
-
DF6 W05: Q07. Which technique is used to prevent digital devices from connecting to wireless networks during a forensic investigation?
-
DF6 W05: Q08. What is the main purpose of a forensic image of a hard drive?
-
DF6 W05: Q09. Why is chain of custody important in digital forensics?
-
DF6 W05: Q10. What does the term "data carving" refer to?
-
DF6 W05: Q11. In forensic analysis, what is 'steganography' commonly used for?
-
DF6 W05: Q12. What kind of data is typically NOT recovered through file carving?
-
DF6 W05: Q13. Which file attribute would indicate a file has been accessed but NOT modified?
-
DF6 W05: Q14. Which of the following can be used to identify the geographic origin of an IP address?
-
DF6 W05: Q15. Which one of the following is considered a primary tool in digital forensics investigations?
-
DF6 W05: Q16. What is a potential risk of using the original device for examination in a digital forensic case?
-
DF6 W05: Q17. In digital forensics, what is the main function of 'data carving'?
-
DF6 W05: Q18. In mobile device forensics, what type of memory is commonly extracted to retrieve deleted data?