Unit 1 - Practice Quiz

INT250

1 What is the primary definition of computer forensics?

A. The process of hacking into computer systems to test security
B. The application of computer investigation and analysis techniques in the interest of determining potential legal evidence
C. The repair of damaged computer hardware to recover lost data
D. The monitoring of network traffic for marketing purposes

2 Which legal principle states that evidence must be gathered in a way that allows the court to verify its origin and integrity?

A. Hearsay Rule
B. Chain of Custody
C. Miranda Rights
D. Double Jeopardy

3 In the context of cybercrimes, what distinguishes a 'computer as a target' crime from a 'computer as a tool' crime?

A. Target crimes involve theft of hardware; tool crimes involve software piracy
B. Target crimes attack the system's integrity (e.g., DDoS); tool crimes use the computer to commit other offenses (e.g., fraud)
C. Target crimes are civil; tool crimes are criminal
D. There is no difference; they are legal synonyms

4 Which of the following best describes 'Forensic Readiness'?

A. The ability of an organization to maximize its potential to use digital evidence while minimizing the costs of an investigation
B. The process of training all employees to be forensic investigators
C. Buying the most expensive forensic software available
D. Keeping all servers offline to prevent attacks

5 What is the primary role of a Security Operations Center (SOC) in relation to computer forensics?

A. To conduct full legal prosecutions
B. To write legislation regarding cybercrime
C. To monitor, detect, and respond to security incidents, often providing the initial data for forensic analysis
D. To repair broken hardware in the office

6 According to the Order of Volatility, which data should be collected first?

A. Archival media (Backup tapes)
B. Hard disk drive data
C. CPU registers and cache
D. Temporary file systems

7 What is the primary purpose of a hardware Write Blocker?

A. To speed up the data transfer process
B. To encrypt the data being copied
C. To prevent the forensic workstation from modifying data on the suspect drive
D. To compress the evidence files

8 What does Locard's Exchange Principle state in the context of digital forensics?

A. Data can never be fully deleted
B. Anyone entering a digital scene leaves a trace, and takes something with them
C. Encryption is impossible to break without a key
D. All evidence must be printed on paper

9 Which phase of the investigation involves obtaining a search warrant?

A. Post-investigation Phase
B. Analysis Phase
C. Pre-investigation Phase
D. Reporting Phase

10 What is a 'Bit-stream image'?

A. A copy of only the active files on a disk
B. A sector-by-sector copy of the hard drive, including hidden and deleted data
C. A screenshot of the desktop
D. A compressed zip folder of the My Documents folder

11 Who is typically the 'First Responder' in a computer forensic scenario?

A. The lead judge on the case
B. The suspect
C. The first person to arrive at the crime scene and assess the situation
D. The CEO of the company

12 What is the cardinal rule of computer forensics regarding original evidence?

A. Always work on the original evidence to save time
B. Never work on the original evidence; always work on a forensic copy
C. Modify the original evidence to fix security holes
D. Send the original evidence to the suspect for verification

13 What is the function of a cryptographic hash (like MD5 or SHA-256) in forensics?

A. To encrypt the drive so no one can read it
B. To act as a digital fingerprint to verify data integrity
C. To formatting the drive for reuse
D. To organize files alphabetically

14 Which of the following is a characteristic of 'Civil' investigations compared to 'Criminal' ones?

A. They are always conducted by law enforcement
B. The standard of proof is 'Beyond a reasonable doubt'
C. They typically involve disputes between individuals or companies regarding contracts or intellectual property
D. They result in jail time for the offender

15 What is 'Slack Space'?

A. The space on a desk where the computer sits
B. The unused space in a disk cluster when a file does not fill the entire cluster
C. The space taken up by the operating system
D. The RAM memory used by the web browser

16 In the context of First Response, what should be done if a computer is found powered OFF?

A. Turn it on to see what is on the screen
B. Turn it on to install forensic software
C. Leave it off and secure it
D. Turn it on and immediately copy the My Documents folder

17 What is the primary responsibility of a Forensic Investigator regarding bias?

A. To prove the suspect is guilty at all costs
B. To prove the suspect is innocent
C. To remain objective and report facts regardless of whom they help or hurt
D. To support the client who is paying them

18 What defines 'Digital Evidence'?

A. Any printed document found near a computer
B. Information of probative value that is stored or transmitted in binary form
C. The physical hardware of a laptop only
D. Verbal testimony given by a computer user

19 Which of the following is considered 'Volatile Memory'?

A. CD-ROM
B. USB Flash Drive
C. RAM (Random Access Memory)
D. Hard Disk Drive

20 What is the purpose of 'Bag and Tag'?

A. To sell the computer equipment
B. To organize cables neatly
C. To identifying, seizing, and securing evidence in appropriate containers to preserve integrity
D. To throw away useless hardware

21 What is the difference between Incident Response (IR) and Computer Forensics?

A. IR focuses on containment and recovery; Forensics focuses on analysis and legal evidence
B. IR happens in court; Forensics happens in the lab
C. IR is for hardware; Forensics is for software
D. There is no difference

22 Which tool is used to block radio signals from reaching a mobile device after seizure?

A. Write Blocker
B. Faraday Bag
C. Anti-static wrist strap
D. Hashing Algorithm

23 What is 'Steganography'?

A. The study of dinosaur bones
B. The practice of hiding data within other files (like images or audio)
C. A type of computer virus
D. The process of deleting files permanently

24 During the Pre-investigation phase, what is the importance of risk assessment?

A. To determine how much to charge the client
B. To identify potential hazards (biological, electrical, chemical) at the crime scene
C. To guess who the suspect is
D. To check the weather forecast

25 What is 'Live Acquisition'?

A. Acquiring data from a computer that is powered on and running
B. Acquiring data from a dead drive
C. Streaming the investigation on social media
D. Interviewing a suspect live

26 Which file system artifact allows an investigator to see which programs were recently executed?

A. The Recycle Bin
B. Prefetch Files
C. The Printer Spool
D. The Hosts file

27 What is the 'Best Evidence Rule'?

A. The most expensive evidence is the best
B. Courts prefer the original evidence (or an accurate duplicate) rather than a copy or oral testimony
C. Evidence found by the police is always best
D. Evidence found on a server is better than a laptop

28 What is the final phase of the Computer Forensics Investigation Process?

A. Acquisition
B. Analysis
C. Reporting
D. Identification

29 Why is 'documentation' critical throughout the investigation process?

A. To increase the billable hours
B. To ensure the investigation can be repeated and validated by a third party
C. To improve typing speed
D. To share with the press

30 What does a SIEM (Security Information and Event Management) system do in a SOC?

A. It is used to physically lock doors
B. It aggregates and analyzes log data from various sources to detect security threats
C. It acts as a backup generator
D. It is an email client

31 Which of the following is an example of 'Metadata'?

A. The text content of a Word document
B. The date created, date modified, and author of a file
C. The pixels in an image
D. The sound waves in an MP3

32 When photographing a crime scene, what is the best practice?

A. Take one photo of the room and leave
B. Photograph the computer screen only
C. Take photos of the entire scene, including connections, cable positions, and serial numbers
D. Selfies with the evidence

33 What is 'Anti-forensics'?

A. The study of law
B. Tools or techniques used to frustrate or prevent forensic analysis (e.g., data wiping, encryption)
C. A group of people against technology
D. Old school investigation methods

34 In a criminal investigation, who carries the 'Burden of Proof'?

A. The Defense
B. The Suspect
C. The Prosecution
D. The Jury

35 What is the definition of 'Unallocated Space'?

A. Disk space that is currently not flagged as in use by the file system, but may contain deleted data
B. Space on the hard drive that has never been used
C. The space occupied by the Operating System
D. Broken sectors on a hard drive

36 Which organization typically creates the 'Search Warrant'?

A. The Forensic Investigator
B. The Internet Service Provider
C. Law Enforcement / The Court
D. The Victim

37 What is the primary risk of pulling the plug (abrupt shutdown) on a server?

A. It saves too much data
B. It might corrupt the file system and result in loss of volatile data (RAM)
C. It uses too much electricity
D. It alerts the hacker

38 What role does an 'Expert Witness' play in court?

A. They decide the verdict
B. They assist the judge/jury in understanding complex technical evidence through their specialized knowledge
C. They defend the accused
D. They prosecute the accused

39 Which of the following is a key component of a Forensic Report?

A. Personal opinions about the suspect's character
B. Executive Summary, Methodology, Findings, and Conclusion
C. Marketing material for the forensic firm
D. A list of the investigator's favorite software

40 What is 'Data Wiping'?

A. Cleaning the computer screen with a cloth
B. Overwriting data multiple times to make it unrecoverable
C. Deleting a file to the Recycle Bin
D. Formatting a disk

41 What is the role of the 'Evidence Custodian'?

A. To analyze the evidence
B. To arrest the suspect
C. To manage the secure storage and log the entry/exit of evidence in the storage facility
D. To repair the evidence

42 Why is 'Timeline Analysis' important?

A. It tells the investigator when to take a lunch break
B. It reconstructs events in chronological order to understand the sequence of the attack
C. It sorts files by file size
D. It predicts future crimes

43 What is the difference between 'Static' and 'Dynamic' analysis?

A. Static analyzes the system at rest (off); Dynamic analyzes the system while running (behavior)
B. Static is fast; Dynamic is slow
C. Static is for Windows; Dynamic is for Linux
D. Static uses electricity; Dynamic does not

44 Which of the following describes an 'Internal Threat'?

A. A hacker from another country
B. A disgruntled employee misusing their access privileges
C. A lightning strike
D. A virus from a website

45 What is 'Logical Acquisition'?

A. Copying the entire physical drive bit-by-bit
B. Extracting specific files and objects (like photos or chats) accessible by the file system
C. Guessing the password logically
D. Drawing a picture of the drive

46 In the context of SOC, what is 'Triage'?

A. Fixing the computer completely
B. The initial assessment to prioritize incidents based on severity and potential impact
C. Deleting all infected files immediately
D. Calling the police

47 What should an investigator do if they accidentally alter the evidence?

A. Hide the mistake
B. Document the alteration and explain how and why it happened
C. Quit the investigation
D. Blame the software

48 What does the term 'Admissibility' refer to?

A. Whether the investigator is hired
B. Whether the evidence meets legal standards to be presented in court
C. The cost of the investigation
D. The speed of the computer

49 Which is a common challenge in Cloud Forensics compared to traditional Computer Forensics?

A. Cloud computers are too slow
B. Physical access to the storage hardware is often impossible or restricted
C. Cloud data is always unencrypted
D. There is no difference

50 What is the purpose of 'Keyword Searching' in the Analysis phase?

A. To find the investigator's keys
B. To locate specific terms (e.g., names, credit card numbers) within the massive amount of data
C. To unlock encrypted files
D. To rename files