Formative 1 Flashcards

(53 cards)

1
Q

Why is forensic readiness important for organizations?
Group of answer choices

To improve public relations

To recover data more quickly after a system crash

To minimize investigation costs and disruptions

To identify vulnerabilities in their system

A

To minimize investigation costs and disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a key responsibility of a forensic investigator regarding evidence?
Group of answer choices

Developing secure systems

Encrypting evidence for safekeeping

Altering evidence for better clarity

Maintaining the chain of custody

A

Maintaining the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does forensic evidence need to be considered “authentic”?
Group of answer choices

It must be encrypted

It must be compressed into a secure format

It must be supported by the original source details

It must be verified by all parties

A

It must be supported by the original source details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main benefit of forensic readiness?
Group of answer choices

Reduces investigation disruption

Prevents data breaches entirely

Eliminates all cyber threats

Optimizes system performance

A

Reduces investigation disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following cybercrimes involves modifying data during transmission?
Group of answer choices

Phishing

Espionage

Data manipulation

Cyber defamation

A

Data Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of ACPO Principle 4?
Group of answer choices

To verify the authenticity of evidence

To designate responsibility to the case officer

To maintain the chain of custody

To ensure evidence is clearly understood

A

To designate responsibility to the case officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a type of digital evidence?
Group of answer choices

Physical devices

Encrypted files

RAM data

Slack space

A

Physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary goal of computer forensics?
Group of answer choices

To detect and analyze digital evidence for legal use

To monitor user activity

To develop cybersecurity strategies

To optimize network speed

A

To detect and analyze digital evidence for legal use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital evidence must meet which criterion to be admissible in court?
Group of answer choices

Be understandable, authentic, and complete

Be publicly available

Be encrypted for security

Be compressed for easier handling

A

Be understandable, authentic, and complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an objective of computer forensics?
Group of answer choices

Performing penetration tests on IT systems

Replacing damaged IT systems

Preserving evidence for prosecution

Detecting vulnerabilities in software development

A

Preserving evidence for prosecution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to Locard’s Exchange Principle, what happens when a crime is committed?
Group of answer choices

No physical evidence is left behind

Some exchange of evidence occurs between the criminal and the environment

All digital evidence is automatically stored on the cloud

All traces of the activity are permanently erased

A

Some exchange of evidence occurs between the criminal and the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary objective of forensic readiness?
Group of answer choices

To ensure employee training

To minimize network traffic

To prevent cybercrime

To reduce investigation time and costs

A

To reduce investigation time and costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which law outlines the admissibility of evidence in US courts?
Group of answer choices

Federal Rules of Evidence

Cybersecurity Law

Locard’s Evidence Rules

Digital Forensics Act

A

Federal Rules of Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an internal cyberattack?
Group of answer choices

A denial-of-service attack from an external source

Exploitation of a system vulnerability by hackers

An attack carried out by an insider with authorized access

Phishing emails sent to employees

A

An attack carried out by an insider with authorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between volatile and non-volatile data?
Group of answer choices

Volatile data is temporary, while non-volatile data is permanent

Volatile data is encrypted, while non-volatile is not

Volatile data is stored in hard drives, while non-volatile is stored in RAM

There is no difference

A

Volatile data is temporary, while non-volatile data is permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main focus of the post-investigation phase?
Group of answer choices

Reporting findings to law enforcement

Identifying cybersecurity risks

Evidence decryption

Analyzing remaining threats

A

Reporting findings to law enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Search and seizure require forensic investigators to:
Group of answer choices

Execute search warrants and collect evidence

Analyze only cloud-based systems

Train users in data management practices

Create backups of company data

A

Execute search warrants and collect evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Proper evidence preservation ensures:
Group of answer choices

Evidence is excluded from legal cases

Evidence is admissible in court

Only deleted data is recovered

All data is permanently encrypted

A

Evidence is admissible in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Evidence acquisition involves:
Group of answer choices

Developing malware analysis reports

Encrypting data for secure storage

Analyzing suspicious email attachments

Capturing and cloning digital evidence from devices

A

Capturing and cloning digital evidence from devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the first phase of the Forensic Investigation Process?
Group of answer choices

Post-investigation

Pre-investigation

Investigation

Evidence analysis

A

Pre-investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A forensic lab must follow which set of guidelines for evidence handling?
Group of answer choices

Local industry compliance standards

Organizational privacy policies

General data protection regulations

Evidence integrity principles

A

Evidence integrity principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is NOT a requirement for a forensic investigation report?
Group of answer choices

Adherence to local laws

Supporting evidence for conclusions

Accuracy and clarity

Inclusion of all organizational data

A

Inclusion of all organizational data

23
Q

What is the importance of understanding hardware and software requirements in a forensic lab?
Group of answer choices

It simplifies operations by reducing costs

It ensures compatibility and efficiency during investigations

It guarantees no legal disputes arise

It eliminates the need for post-analysis reporting

A

It ensures compatibility and efficiency during investigations

24
Q

The post-investigation phase is responsible for:
Group of answer choices

Building tools for malware testing

Summarizing findings into a detailed report

Training forensic investigators

Verifying evidence integrity

A

Summarizing findings into a detailed report

25
The investigator’s role in court includes: Group of answer choices Analyzing cybersecurity risks Suggesting penalties for the defendant Presenting evidence and findings objectively Providing legal interpretations
Presenting evidence and findings objectively
26
Which of the following is an essential consideration when building an investigation team? Group of answer choices Marketing strategies Budget allocation Networking capabilities Specialized roles and responsibilities
Specialized roles and responsibilities
27
Evidence gathering should occur during which phase? Group of answer choices Pre-investigation Post-investigation Investigation Analysis
Investigation
28
Why is documenting the crime scene critical? Group of answer choices It creates a detailed record for analysis and presentation It provides evidence for defense attorneys It ensures forensic labs meet international standards It helps investigators verify their findings
It creates a detailed record for analysis and presentation
29
Search and seizure require investigators to: Group of answer choices Analyze incident logs immediately Securely handle all electronic devices Prioritize data encryption Create investigative software
Securely handle all electronic devices
30
Which of the following is NOT an example of user-created files? Group of answer choices Spreadsheets Images and graphics Audio files Log files
Log Files
31
What is the role of a forensic investigator? Group of answer choices To train employees on data compliance To identify, collect, and analyze evidence To design secure network architectures To optimize IT systems for efficiency
To identify, collect, and analyze evidence
32
What is a common source of digital evidence? Group of answer choices System logs Network logs Hidden partitions All of the above
All of the above
33
What is the first step in the computer forensics process? Group of answer choices Legal compliance review Case documentation Data analysis Evidence acquisition
Evidence acquisition
34
What is the main use of the chain of custody in computer forensics? Group of answer choices Encrypting evidence for safekeeping Preventing data alteration during analysis Ensuring evidence is admissible in court Providing data backup
Ensuring evidence id admissible in court
35
According to the text, computer forensics is a subset of which field? Cybersecurity Ethical Hacking Digital Forensics Information Technology
Digital Forensics
36
What does the best evidence rule state? Group of answer choices All evidence must be encrypted Only copies of digital files can be submitted in court The original evidence must be submitted when possible Evidence must be kept in physical form
The original evidence must be submitted when possible
37
Which rule ensures digital evidence is clear and understandable to the jury? Group of answer choices Understandable evidence Authentic evidence Reliable evidence Admissible evidence
Understandable evidence
38
Which document must be created during the investigation phase to ensure accuracy? Operating Manual Legal Affidavit Crime Scene Sketch Incident Timeline
Incident Timeline
39
What is the purpose of hashing during the investigation phase? Group of answer choices To decrypt secure data files To recover deleted system logs To verify the integrity of digital evidence To compare evidence between cases
To verify the integrity of digital evidence
40
During the pre-investigation phase, setting up a forensic lab ensures: Group of answer choices Evidence preservation Compliance with laws and regulations Efficient analysis of evidence All of the above
All of the above
41
The forensic investigation report should include all of the following EXCEPT: Group of answer choices Evidence supporting the findings A detailed description of each investigative step Opinions of the investigation team Recommendations for legal proceedings
Opinions of the investigation team
42
Evidence acquired during an investigation must: Group of answer choices Remain unchanged to ensure integrity Verifying evidence integrity Be encrypted before presentation in court Be altered for clarity
Remain unchanged to ensure integrity
43
Chain of custody refers to: Group of answer choices The process of securing evidence against tampering A timeline of legal compliance during an investigation Transferring data securely between devices Deleting irrelevant evidence
The process of securing evidence against tampering
44
What is the most important quality of a forensic investigation report? Group of answer choices It must include all background research It must be concise, clear, and legally admissible It must outline potential cybersecurity improvements It should be technical and comprehensive
It must be concise, clear, and legally admissible
45
Data analysis during the investigation phase focuses on: Group of answer choices Interpreting evidence to determine its relevance Preparing malware for testing Documenting user activities Rewriting damaged logs
Interpreting evidence to determine its relevance
46
Which step ensures that evidence remains unaltered during acquisition? Group of answer choices Malware analysis Chain of custody Evidence preservation Documentation
Evidence preservation
47
Digital evidence can be located in which of the following devices? Group of answer choices Mobile phones Printers All of the above Network servers
All of the above
48
Which principle states that all processes applied to evidence must be documented? Group of answer choices Locard's Exchange Principle Chain of custody Understandable evidence ACPO Principle 3
ACPO Principle 3
49
Which of the following is an example of volatile data? Group of answer choices Files stored on a hard drive Network logs System time and open files Hidden partitions
System time and open files
50
What is a critical factor when organizing gathered evidence for a report? Group of answer choices Categorizing information for clarity Anonymizing all data sources The location of the incident Redacting unnecessary details
Categorizing information for clarity
51
In the forensic investigation methodology, which of the following steps comes after the identification of evidence? Group of answer choices Final reporting Data analysis Documentation of findings Evidence acquisition
Evidence acquisition
52
What is the main goal of the investigation phase? Group of answer choices To train new employees To acquire, analyze, and document evidence To create malware samples for testing To perform security audits
To acquire, analyze, and document evidence
53
What is the purpose of the pre-investigation phase? Group of answer choices To analyze and document findings To plan and prepare for the forensic investigation To compile a legal report To acquire evidence from a suspect’s device
To plan and prepare for the forensic investigation