Ready to test your Knowledge?
Try out our new practice tests completely free!
exam preparation banner icon

Computer Security Fundamentals

Computing

Quiz 14 :

Introduction to Forensics

Quiz 14 :

Introduction to Forensics

search
arrow
Windows stores information on web address,search queries,and recently opened files in a file called___________.
Free
Multiple Choice
Answer:

Answer:

B

arrow
Windows stores web browsing information in a file called index.dat.
Free
True False
Answer:

Answer:

True

arrow
netstat is a command you can use with a forensic copy of a machine to compare two files.
Free
True False
Answer:

Answer:

False

arrow
Frequently the first responder to a computer crime is ________.
Multiple Choice
Answer:
arrow
Usually,the first thing you do to a computer to prevent further tampering is to _________.
Multiple Choice
Answer:
arrow
If you fail to handle evidence properly ___________.
Multiple Choice
Answer:
arrow
The Windows command fc lists all active sessions to the computer.
True False
Answer:
arrow
Windows logging can be turned on and off with a tool called auditpol.exe.
True False
Answer:
arrow
Using Linux to backup your hard drive,if you want to create a hash,you would use the command-line command ___________.
Multiple Choice
Answer:
arrow
In Linux the command to set up a target forensics server to receive a copy of a drive is dd.
True False
Answer:
arrow
_________ can include logs,portable storage,emails,tablets,and cell phones.
Multiple Choice
Answer:
arrow
You may use Linux to make a ______________ of the hard drive.
Multiple Choice
Answer:
arrow
In Windows,the log that stores events from a single application or component rather than events that might have system wide impact is the ____________ log.
Multiple Choice
Answer:
arrow
Most Windows logs are turned on automatically.
True False
Answer:
arrow
The chain of custody accounts for the handling of evidence and documents that handling.
True False
Answer:
arrow
The Windows Registry lists USB devices that have been connected to the machine.
True False
Answer:
arrow
Frequently the first responder to a computer crime is the network administrator.
True False
Answer:
arrow
Documentation of every person who had access to evidence,how they interacted with it,and where it was stored is called the ________________.
Multiple Choice
Answer:
arrow
Using Linux to wipe the target drive,the command-line command would be ___ .
Multiple Choice
Answer:
arrow
The Windows Registry contains a list of USB devices that have been connected to the machine.
True False
Answer:
Showing 1 - 20 of 25