Welcome to Forensics and Network Intrusion!
This course provides you with the knowledge and skills needed to work in the exciting, high-demand field of digital forensics. In preparation for the highly regarded Computer Hacking Forensic Investigator (CHFI) certification, you will learn about how to detect hacking attacks, how to properly extract and preserve evidence, and how to get the evidence needed for audits aimed at preventing future attacks.
Throughout the course, you will find readings, videos, labs, and learning checks. These activities are designed to let you check your retention of the topics presented. It is important to note that the labs and learning checks are not meant to reveal any characteristics of the format or design of the final assessment. Instead, they are explicitly designed to help you learn, and are offered as tools for you to use to your advantage as you work through the course.
Presentation of admissible evidence
Value or cost to the victim
Collection of clues and forensic evidence
Analysis of digital evidence
Rate this question:
Prosecute the evidence
Obfuscate the evidence
Authorize the evidence
Preserve the evidence
Rate this question:
(C:)
(B:)
(A:)
(D:)
Rate this question:
Magistrate
Court of law
First responder
Concerned authority
Rate this question:
Spindle
NAND chips
Read/write heads
Platters
Rate this question:
Extended partition
Tertiary partition
Primary partition
Secondary partition
Rate this question:
Thumb drive
Digital camera
Smart card
Processor
Rate this question:
Warm booting
Soft booting
Hot booting
Cold booting
Rate this question:
Magnetic storage devices
Optical storage devices
Flash memory devices
Quantum storage devices
Rate this question:
Windows 8
Windows 9
Windows XP
Windows 10
Rate this question:
Power-on self-test
Power-off system-test
Power-on system-test
Power-off self-test
Rate this question:
Windows 7
Windows 8
Windows 9
Windows 10
Rate this question:
Breakdown of costs into daily and annual expenditure
Current media coverage of high-profile computer crimes
Past success rate as a measure of value
Use of outdated, but trusted, technologies
Rate this question:
ISO 9431
ISO 6990
ISO 1349
ISO 9660
Rate this question:
BB
FDISK
DD
CP
Rate this question:
It adopts an approach toward criminal activity as a criminal act.
It adopts a holistic approach toward any criminal activity as a criminal operation rather than as a single criminal activity.
It differs from traditional investigative methods and is less complex and less time- consuming.
It encourages reactive action on the structure of the criminal enterprise.
Rate this question:
Computer forensics deals with the monetary cost of finding evidence related to a crime to find the culprits and initiate legal action against them.
Computer forensics deals with the search for evidence related to a digital crime, but the forensics specialist does not need to be concerned about the legal admissibility of the evidence he or she finds.
Computer forensics deals with the process of finding evidence related to a digital crime to find the culprits and initiate legal action against them.
Computer forensics deals only with the process of finding evidence related to a digital crime and does not try to estimate the monetary damages caused by that crime.
Rate this question:
256
128
512
1,024
Rate this question:
UEFI Partition Table (UPT)
Universal Partition Table (UPT)
General Partition Table (GPT)
GUID Partition Table (GPT)
Rate this question:
Windows 10
Windows 7
Windows Vista
Windows XP
Rate this question:
DiskPart
Gparted
Disk Utility
Fdisk
Rate this question:
The initial reporting of the evidence is generally informal.
Law enforcement agencies are responsible for collecting and analyzing evidence.
The standards of proof need to be very high.
A formal investigation report is required.
Rate this question:
LBA 2
LBA 3
LBA 0
LBA 1
Rate this question:
Second
First
Last
Third
Rate this question:
The primary track sector
The secondary volume descriptor
The primary volume descriptor
The secondary track sector
Rate this question:
32-bit
32-byte
64-bit
64-byte
Rate this question:
Fast-paced speed
Smaller evidence in size
Anonymity through masquerading
Volatile evidence
Rate this question:
-255
-1
0
255
Rate this question:
PAI Phase
PEI Phase
BSD Phase
PIE Phase
Rate this question:
64
128
32
256
Rate this question:
LBA 36
LBA 33
LBA 35
LBA 34
Rate this question:
Double-level cell (DLC)
Single-level cell (SLC)
Multi-level cell (MLC)
Triple-level cell (TLC)
Rate this question:
Rule 105
Rule 102
Rule 103
Rule 101
Rate this question:
Primary Boot Record (PBR)
512-byte boot sector
256-byte boot sector
First Boot Record (FBR)
Rate this question:
PowerPC
Intel
SPARC
ARM
Rate this question:
Boot Parameter Block (BPB)
BIOS Parameter Block (BPB)
Primary Sequential Sector (PSS)
Primary Reserved Sector (PRS)
Rate this question:
Rule 105
Rule 101
Rule 102
Rule 103
Rate this question:
Area density
Bit density
Block density
Track density
Rate this question:
16,384
32,768
512
256
Rate this question:
PAI Phase
PIE Phase
BDS Phase
BSD Phase
Rate this question:
Number 3
Number 1
Number 2
Number 0
Rate this question:
Third
Fourth
Second
First
Rate this question:
RT (Run Time) Phase
PEI (Pre-EFI Initialization) Phase
BDS (Boot Device Selection) Phase
DXE (Driver Execution Environment) Phase
Rate this question:
Get-GPT
Get-MBR
Get-BootSector
Get-PartitionTable
Rate this question:
Fdisk
GNU Parted
Disk Utility
DiskPart
Rate this question:
PEI (Pre-EFI Initialization) Phase
DXE (Driver Execution Environment) Phase
BDS (Boot Device Selection) Phase
RT (Run Time) Phase
Rate this question:
BDS (Boot Device Selection) Phase
PEI (Pre-EFI Initialization) Phase
DXE (Driver Execution Environment) Phase
SEC (Security) Phase
Rate this question:
LBA 2
LBA 0
LBA 3
LBA 1
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.