Attempt this 'Windows Networking & Computer Fundamentals Exercises Solutions' quiz and evaluate yourself whether you're a true computer genius or not. This quiz covers almost every topic related to computers, including windows, the internet, networking, system drives, cyber security, and many more. If you consider yourself a true computer engineer or an expert when it comes to computers, you should really play the quiz and assess yourself. The test becomes tougher after every question. So, go ahead and try to score at least 75 percent! Good luck!
Data collection
Secure the evidence
First response
Data analysis
Rate this question:
Microsoft Outlook
Eudora
Mozilla Thunderbird
Microsoft Outlook Express
Rate this question:
RAID Level 0
RAID Level 5
RAID Level 3
RAID Level 1
Rate this question:
The X509 Address
The SMTP reply Address
The E-mail Header
The Host Domain Name
Rate this question:
The ISP can investigate anyone using their service and can provide you with assistance
The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
The ISP can't conduct any type of investigations on anyone and therefore can't assist you
ISP's never maintain log files so they would be of no use to your investigation
Rate this question:
MIME
BINHEX
UT-16
UUCODE
Rate this question:
Universal Time Set
Network Time Protocol
SyncTime Service
Time-Sync Protocol
Rate this question:
Rules of evidence
Law of probability
Chain of custody
Policy of separation
Rate this question:
Parity-bit copy
Bit-stream copy
MS-DOS disc copy
System level copy
Rate this question:
A write-blocker
A protocol analyzer
A firewall
A disk editor
Rate this question:
Gif
Bmp
Jpeg
Png
Rate this question:
Removing the processor
Removing the CMOS battery
Remove all the system memory
Login to Windows and disable the BIOS password
Rate this question:
By law, three
Quite a few
Only one
At least two
Rate this question:
Social engineering exploit
Competitive exploit
Information vulnerability
Trade secret
Rate this question:
All virtual memory will be deleted
The wrong partition may be set to active
This action can corrupt the disk
The computer will be set in a constant reboot state
Rate this question:
Two
One
Three
Four
Rate this question:
Robust copy
Incremental backup copy
Bit-stream copy
Full backup copy
Rate this question:
The registry
The swap file
The recycle bin
The metadata
Rate this question:
Wipe magnetic media before recycling it
Make directories on an evidence disk
View graphics files on an evidence drive
Verify that a disk is not altered when you examine it
Rate this question:
Phishing
XSS attack
SQL injection
Spam
Rate this question:
Don't use deceptive subject lines
Don’t tell the recipients where you are located
Don’t identify the message as an ad
Don’t use true header information
Rate this question:
Data Extraction
Backup
Bit Stream Imaging
Data Deduplication
Rate this question:
Network Forensics
Computer Forensics
Incident Response
Event Reaction
Rate this question:
SAM
AMS
Shadow file
Password.conf
Rate this question:
OpenGL/ES and SGL
Surface Manager
Media framework
WebKit
Rate this question:
Preserve volatile data
Fill forms
Crack passwords
Take photos
Rate this question:
ESH
5EH
H5E
E5H
Rate this question:
Netstat - r
Netstat - ano
Netstat - b
Netstat -s
Rate this question:
Justification
Authentication
Reiteration
Certification
Rate this question:
4
3
1
4
Rate this question:
Portable Document Format
MS-office Word Document
MS-office Word OneNote
MS-office Word PowerPoint
Rate this question:
WIN-ABCDE12345F.err
WIN-ABCDE12345F-bin.n
WIN-ABCDE12345F.pid
WIN-ABCDE12345F.log
Rate this question:
Add up the total size of all known partitions and compare it to the total size of the hard drive
Examine the FAT and identify hidden partitions by noting an H in the partition Type field
Examine the LILO and note an H in the partition Type field
It is not possible to have hidden partitions on a hard drive
Rate this question:
It is a doc file deleted in seventh sequential order
RIYG6VR.doc is the name of the doc file deleted from the system
It is file deleted from R drive
Lt is a deleted doc file
Rate this question:
Primary Operations Short Test
PowerOn Self Test
Pre Operational Situation Test
Primary Operating System Test
Rate this question:
Expert in criminal investigation
Subject matter specialist
Witness present at the crime scene
Expert law graduate appointed by attorney
Rate this question:
It can find deleted files even after they have been physically removed
It can find bad sectors on the hard drive
It can search slack space
It can find files hidden within ADS
Rate this question:
Volume Boot Record
Master Boot Record
GUID Partition Table
Master File Table
Rate this question:
AA55
OOAA
AAOO
A100
Rate this question:
OS/2
BSD Unix
Linux
Microsoft Windows
Rate this question:
Mcopy
Image
MD5
dd
Rate this question:
Digital attack
Denial of service
Physical attack
ARP redirect
Rate this question:
The 10th Amendment
The 5th Amendment
The 1st Amendment
The 4th Amendment
Rate this question:
Host.db
Sigstore.db
Config.db
Filecache.db
Rate this question:
Make two copies of each evidence item using a single imaging tool
Make a single copy of each evidence item using an approved imaging tool
Make two copies of each evidence item using different imaging tools
Only store the original evidence item
Rate this question:
FAT File System
ReFS
ExFAT
NTFS File System
Rate this question:
The year the evidence was taken
The sequence number for the parts of the same exhibit
The initials of the forensics analyst
The sequential number of the exhibits seized
Rate this question:
Mime-Version header
Content-Type header
Content-Transfer-Encoding header
Errors-To header
Rate this question:
Quiz Review Timeline (Updated): Mar 23, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.