Unit 1 - Practice Quiz

INT250 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary definition of computer forensics?

A. The process of hacking into computer systems to test security
B. The repair of damaged computer hardware to recover lost data
C. The monitoring of network traffic for marketing purposes
D. The application of computer investigation and analysis techniques in the interest of determining potential legal evidence

2 Which legal principle states that evidence must be gathered in a way that allows the court to verify its origin and integrity?

A. Miranda Rights
B. Hearsay Rule
C. Double Jeopardy
D. Chain of Custody

3 In the context of cybercrimes, what distinguishes a 'computer as a target' crime from a 'computer as a tool' crime?

A. There is no difference; they are legal synonyms
B. Target crimes are civil; tool crimes are criminal
C. Target crimes involve theft of hardware; tool crimes involve software piracy
D. Target crimes attack the system's integrity (e.g., DDoS); tool crimes use the computer to commit other offenses (e.g., fraud)

4 Which of the following best describes 'Forensic Readiness'?

A. Buying the most expensive forensic software available
B. The ability of an organization to maximize its potential to use digital evidence while minimizing the costs of an investigation
C. The process of training all employees to be forensic investigators
D. Keeping all servers offline to prevent attacks

5 What is the primary role of a Security Operations Center (SOC) in relation to computer forensics?

A. To write legislation regarding cybercrime
B. To repair broken hardware in the office
C. To monitor, detect, and respond to security incidents, often providing the initial data for forensic analysis
D. To conduct full legal prosecutions

6 According to the Order of Volatility, which data should be collected first?

A. Archival media (Backup tapes)
B. Temporary file systems
C. Hard disk drive data
D. CPU registers and cache

7 What is the primary purpose of a hardware Write Blocker?

A. To encrypt the data being copied
B. To compress the evidence files
C. To speed up the data transfer process
D. To prevent the forensic workstation from modifying data on the suspect drive

8 What does Locard's Exchange Principle state in the context of digital forensics?

A. Anyone entering a digital scene leaves a trace, and takes something with them
B. Data can never be fully deleted
C. All evidence must be printed on paper
D. Encryption is impossible to break without a key

9 Which phase of the investigation involves obtaining a search warrant?

A. Pre-investigation Phase
B. Post-investigation Phase
C. Reporting Phase
D. Analysis Phase

10 What is a 'Bit-stream image'?

A. A screenshot of the desktop
B. A copy of only the active files on a disk
C. A sector-by-sector copy of the hard drive, including hidden and deleted data
D. A compressed zip folder of the My Documents folder

11 Who is typically the 'First Responder' in a computer forensic scenario?

A. The CEO of the company
B. The suspect
C. The first person to arrive at the crime scene and assess the situation
D. The lead judge on the case

12 What is the cardinal rule of computer forensics regarding original evidence?

A. Send the original evidence to the suspect for verification
B. Never work on the original evidence; always work on a forensic copy
C. Always work on the original evidence to save time
D. Modify the original evidence to fix security holes

13 What is the function of a cryptographic hash (like MD5 or SHA-256) in forensics?

A. To formatting the drive for reuse
B. To act as a digital fingerprint to verify data integrity
C. To encrypt the drive so no one can read it
D. To organize files alphabetically

14 Which of the following is a characteristic of 'Civil' investigations compared to 'Criminal' ones?

A. They are always conducted by law enforcement
B. They typically involve disputes between individuals or companies regarding contracts or intellectual property
C. The standard of proof is 'Beyond a reasonable doubt'
D. They result in jail time for the offender

15 What is 'Slack Space'?

A. The space on a desk where the computer sits
B. The space taken up by the operating system
C. The RAM memory used by the web browser
D. The unused space in a disk cluster when a file does not fill the entire cluster

16 In the context of First Response, what should be done if a computer is found powered OFF?

A. Turn it on and immediately copy the My Documents folder
B. Leave it off and secure it
C. Turn it on to see what is on the screen
D. Turn it on to install forensic software

17 What is the primary responsibility of a Forensic Investigator regarding bias?

A. To support the client who is paying them
B. To prove the suspect is innocent
C. To remain objective and report facts regardless of whom they help or hurt
D. To prove the suspect is guilty at all costs

18 What defines 'Digital Evidence'?

A. Any printed document found near a computer
B. Information of probative value that is stored or transmitted in binary form
C. Verbal testimony given by a computer user
D. The physical hardware of a laptop only

19 Which of the following is considered 'Volatile Memory'?

A. Hard Disk Drive
B. CD-ROM
C. USB Flash Drive
D. RAM (Random Access Memory)

20 What is the purpose of 'Bag and Tag'?

A. To identifying, seizing, and securing evidence in appropriate containers to preserve integrity
B. To sell the computer equipment
C. To throw away useless hardware
D. To organize cables neatly

21 What is the difference between Incident Response (IR) and Computer Forensics?

A. IR is for hardware; Forensics is for software
B. IR focuses on containment and recovery; Forensics focuses on analysis and legal evidence
C. IR happens in court; Forensics happens in the lab
D. There is no difference

22 Which tool is used to block radio signals from reaching a mobile device after seizure?

A. Write Blocker
B. Hashing Algorithm
C. Faraday Bag
D. Anti-static wrist strap

23 What is 'Steganography'?

A. The process of deleting files permanently
B. The study of dinosaur bones
C. A type of computer virus
D. The practice of hiding data within other files (like images or audio)

24 During the Pre-investigation phase, what is the importance of risk assessment?

A. To guess who the suspect is
B. To identify potential hazards (biological, electrical, chemical) at the crime scene
C. To check the weather forecast
D. To determine how much to charge the client

25 What is 'Live Acquisition'?

A. Interviewing a suspect live
B. Streaming the investigation on social media
C. Acquiring data from a computer that is powered on and running
D. Acquiring data from a dead drive

26 Which file system artifact allows an investigator to see which programs were recently executed?

A. Prefetch Files
B. The Printer Spool
C. The Hosts file
D. The Recycle Bin

27 What is the 'Best Evidence Rule'?

A. Evidence found on a server is better than a laptop
B. The most expensive evidence is the best
C. Evidence found by the police is always best
D. Courts prefer the original evidence (or an accurate duplicate) rather than a copy or oral testimony

28 What is the final phase of the Computer Forensics Investigation Process?

A. Analysis
B. Reporting
C. Acquisition
D. Identification

29 Why is 'documentation' critical throughout the investigation process?

A. To share with the press
B. To ensure the investigation can be repeated and validated by a third party
C. To increase the billable hours
D. To improve typing speed

30 What does a SIEM (Security Information and Event Management) system do in a SOC?

A. It aggregates and analyzes log data from various sources to detect security threats
B. It is used to physically lock doors
C. It is an email client
D. It acts as a backup generator

31 Which of the following is an example of 'Metadata'?

A. The pixels in an image
B. The sound waves in an MP3
C. The text content of a Word document
D. The date created, date modified, and author of a file

32 When photographing a crime scene, what is the best practice?

A. Take one photo of the room and leave
B. Take photos of the entire scene, including connections, cable positions, and serial numbers
C. Photograph the computer screen only
D. Selfies with the evidence

33 What is 'Anti-forensics'?

A. The study of law
B. Tools or techniques used to frustrate or prevent forensic analysis (e.g., data wiping, encryption)
C. A group of people against technology
D. Old school investigation methods

34 In a criminal investigation, who carries the 'Burden of Proof'?

A. The Suspect
B. The Defense
C. The Jury
D. The Prosecution

35 What is the definition of 'Unallocated Space'?

A. Broken sectors on a hard drive
B. The space occupied by the Operating System
C. Disk space that is currently not flagged as in use by the file system, but may contain deleted data
D. Space on the hard drive that has never been used

36 Which organization typically creates the 'Search Warrant'?

A. The Victim
B. The Forensic Investigator
C. The Internet Service Provider
D. Law Enforcement / The Court

37 What is the primary risk of pulling the plug (abrupt shutdown) on a server?

A. It saves too much data
B. It might corrupt the file system and result in loss of volatile data (RAM)
C. It uses too much electricity
D. It alerts the hacker

38 What role does an 'Expert Witness' play in court?

A. They prosecute the accused
B. They decide the verdict
C. They assist the judge/jury in understanding complex technical evidence through their specialized knowledge
D. They defend the accused

39 Which of the following is a key component of a Forensic Report?

A. Marketing material for the forensic firm
B. A list of the investigator's favorite software
C. Executive Summary, Methodology, Findings, and Conclusion
D. Personal opinions about the suspect's character

40 What is 'Data Wiping'?

A. Overwriting data multiple times to make it unrecoverable
B. Cleaning the computer screen with a cloth
C. Formatting a disk
D. Deleting a file to the Recycle Bin

41 What is the role of the 'Evidence Custodian'?

A. To repair the evidence
B. To manage the secure storage and log the entry/exit of evidence in the storage facility
C. To analyze the evidence
D. To arrest the suspect

42 Why is 'Timeline Analysis' important?

A. It tells the investigator when to take a lunch break
B. It sorts files by file size
C. It reconstructs events in chronological order to understand the sequence of the attack
D. It predicts future crimes

43 What is the difference between 'Static' and 'Dynamic' analysis?

A. Static analyzes the system at rest (off); Dynamic analyzes the system while running (behavior)
B. Static is for Windows; Dynamic is for Linux
C. Static is fast; Dynamic is slow
D. Static uses electricity; Dynamic does not

44 Which of the following describes an 'Internal Threat'?

A. A virus from a website
B. A lightning strike
C. A hacker from another country
D. A disgruntled employee misusing their access privileges

45 What is 'Logical Acquisition'?

A. Guessing the password logically
B. Copying the entire physical drive bit-by-bit
C. Extracting specific files and objects (like photos or chats) accessible by the file system
D. Drawing a picture of the drive

46 In the context of SOC, what is 'Triage'?

A. Calling the police
B. Fixing the computer completely
C. The initial assessment to prioritize incidents based on severity and potential impact
D. Deleting all infected files immediately

47 What should an investigator do if they accidentally alter the evidence?

A. Blame the software
B. Hide the mistake
C. Document the alteration and explain how and why it happened
D. Quit the investigation

48 What does the term 'Admissibility' refer to?

A. Whether the evidence meets legal standards to be presented in court
B. The cost of the investigation
C. Whether the investigator is hired
D. The speed of the computer

49 Which is a common challenge in Cloud Forensics compared to traditional Computer Forensics?

A. Physical access to the storage hardware is often impossible or restricted
B. Cloud computers are too slow
C. Cloud data is always unencrypted
D. There is no difference

50 What is the purpose of 'Keyword Searching' in the Analysis phase?

A. To find the investigator's keys
B. To rename files
C. To unlock encrypted files
D. To locate specific terms (e.g., names, credit card numbers) within the massive amount of data