Formative 1 Flashcards
(53 cards)
Why is forensic readiness important for organizations?
Group of answer choices
To improve public relations
To recover data more quickly after a system crash
To minimize investigation costs and disruptions
To identify vulnerabilities in their system
To minimize investigation costs and disruptions
What is a key responsibility of a forensic investigator regarding evidence?
Group of answer choices
Developing secure systems
Encrypting evidence for safekeeping
Altering evidence for better clarity
Maintaining the chain of custody
Maintaining the chain of custody
What does forensic evidence need to be considered “authentic”?
Group of answer choices
It must be encrypted
It must be compressed into a secure format
It must be supported by the original source details
It must be verified by all parties
It must be supported by the original source details
What is the main benefit of forensic readiness?
Group of answer choices
Reduces investigation disruption
Prevents data breaches entirely
Eliminates all cyber threats
Optimizes system performance
Reduces investigation disruption
Which of the following cybercrimes involves modifying data during transmission?
Group of answer choices
Phishing
Espionage
Data manipulation
Cyber defamation
Data Manipulation
What is the purpose of ACPO Principle 4?
Group of answer choices
To verify the authenticity of evidence
To designate responsibility to the case officer
To maintain the chain of custody
To ensure evidence is clearly understood
To designate responsibility to the case officer
Which of the following is NOT a type of digital evidence?
Group of answer choices
Physical devices
Encrypted files
RAM data
Slack space
Physical devices
What is the primary goal of computer forensics?
Group of answer choices
To detect and analyze digital evidence for legal use
To monitor user activity
To develop cybersecurity strategies
To optimize network speed
To detect and analyze digital evidence for legal use
Digital evidence must meet which criterion to be admissible in court?
Group of answer choices
Be understandable, authentic, and complete
Be publicly available
Be encrypted for security
Be compressed for easier handling
Be understandable, authentic, and complete
Which of the following is an objective of computer forensics?
Group of answer choices
Performing penetration tests on IT systems
Replacing damaged IT systems
Preserving evidence for prosecution
Detecting vulnerabilities in software development
Preserving evidence for prosecution
According to Locard’s Exchange Principle, what happens when a crime is committed?
Group of answer choices
No physical evidence is left behind
Some exchange of evidence occurs between the criminal and the environment
All digital evidence is automatically stored on the cloud
All traces of the activity are permanently erased
Some exchange of evidence occurs between the criminal and the environment
What is the primary objective of forensic readiness?
Group of answer choices
To ensure employee training
To minimize network traffic
To prevent cybercrime
To reduce investigation time and costs
To reduce investigation time and costs
Which law outlines the admissibility of evidence in US courts?
Group of answer choices
Federal Rules of Evidence
Cybersecurity Law
Locard’s Evidence Rules
Digital Forensics Act
Federal Rules of Evidence
What is an internal cyberattack?
Group of answer choices
A denial-of-service attack from an external source
Exploitation of a system vulnerability by hackers
An attack carried out by an insider with authorized access
Phishing emails sent to employees
An attack carried out by an insider with authorized access
What is the difference between volatile and non-volatile data?
Group of answer choices
Volatile data is temporary, while non-volatile data is permanent
Volatile data is encrypted, while non-volatile is not
Volatile data is stored in hard drives, while non-volatile is stored in RAM
There is no difference
Volatile data is temporary, while non-volatile data is permanent
What is the main focus of the post-investigation phase?
Group of answer choices
Reporting findings to law enforcement
Identifying cybersecurity risks
Evidence decryption
Analyzing remaining threats
Reporting findings to law enforcement
Search and seizure require forensic investigators to:
Group of answer choices
Execute search warrants and collect evidence
Analyze only cloud-based systems
Train users in data management practices
Create backups of company data
Execute search warrants and collect evidence
Proper evidence preservation ensures:
Group of answer choices
Evidence is excluded from legal cases
Evidence is admissible in court
Only deleted data is recovered
All data is permanently encrypted
Evidence is admissible in court
Evidence acquisition involves:
Group of answer choices
Developing malware analysis reports
Encrypting data for secure storage
Analyzing suspicious email attachments
Capturing and cloning digital evidence from devices
Capturing and cloning digital evidence from devices
What is the first phase of the Forensic Investigation Process?
Group of answer choices
Post-investigation
Pre-investigation
Investigation
Evidence analysis
Pre-investigation
A forensic lab must follow which set of guidelines for evidence handling?
Group of answer choices
Local industry compliance standards
Organizational privacy policies
General data protection regulations
Evidence integrity principles
Evidence integrity principles
Which of the following is NOT a requirement for a forensic investigation report?
Group of answer choices
Adherence to local laws
Supporting evidence for conclusions
Accuracy and clarity
Inclusion of all organizational data
Inclusion of all organizational data
What is the importance of understanding hardware and software requirements in a forensic lab?
Group of answer choices
It simplifies operations by reducing costs
It ensures compatibility and efficiency during investigations
It guarantees no legal disputes arise
It eliminates the need for post-analysis reporting
It ensures compatibility and efficiency during investigations
The post-investigation phase is responsible for:
Group of answer choices
Building tools for malware testing
Summarizing findings into a detailed report
Training forensic investigators
Verifying evidence integrity
Summarizing findings into a detailed report