Chapter 2 MCQ PDF

Title Chapter 2 MCQ
Author jasen clark
Course Digital Forensics
Institution Charles Sturt University
Pages 11
File Size 348.2 KB
File Type PDF
Total Downloads 18
Total Views 167

Summary

Chapter 2 MCQ...


Description

Review Test Submission: Chapter 2 MCQ



Question 1 1 out of 1 points Candidates who complete the IACIS test successfully are designated as a _______. Selected Answer:

Answers:

b. Certified Forensic Computer Examiner (CFCE)

a. Certified Investigative Examiner (CIE)

b. Certified Forensic Computer Examiner (CFCE)

c. Certified Investigative Forensics Examiner (CIFE)

d. Certified Forensics Investigator (CFI)



Question 2 1 out of 1 points What certification program, sponsored by ISC , requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations? 2

Selected Answer:

a. Certified Cyber Forensics Professional

Answers:

a. Certified Cyber Forensics Professional

b. Certified Forensic Computer Examiner

c.

Certified Computer Crime Investigator

d. EnCase Certified Examiner



Question 3 1 out of 1 points How long are computing components designed to last in a normal business environment? Selected Answer:

a. 18 to 36 months

Answers:

a. 18 to 36 months

b. 14 to 26 months

c. 12 to 16 months

d. 36 to 90 months



Question 4 1 out of 1 points Which of the following scenarios should be covered in a disaster recovery plan? Selected Answer:

Answers:

d. all of the above

a. damage caused by lightning strikes

b. damage caused by flood

c.

damage caused by a virus contamination

d. all of the above



Question 5 1 out of 1 points Which operating system listed below is not a distribution of the Linux OS?

Selected Answer:

c. Minix

Answers:

a. Fedora

b. Debian

c. Minix

d. Slackware



Question 6 1 out of 1 points _______ describes the characteristics of a safe storage container.

Selected Answer:

Answers:

d. NISPOM

a. ISO2960

b. STORSEC

c.

SSO 990

d. NISPOM



Question 7 1 out of 1 points In order to qualify for the Certified Computer Forensic Technician, Basic Level certification, how many hours of computer forensics training are required? Selected Answer:

a . 40

Answers:

a . 40

b. 30

c. 20

d. 10



Question 8 1 out of 1 points Which file system below is utilized by the Xbox gaming system?

Selected Answer:

a. FATX

Answers:

a. FATX

b.

ReFS

c. EXT

d. NTFS



Question 9 1 out of 1 points Which ISO standard below is followed by the ASCLD?

Selected Answer:

a. 17025:2005

Answers:

a. 17025:2005

b. 17026:2007

c. 12076:2005

d. 12075:2007



Question 10 1 out of 1 points _______ is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence. Selected Answer:

d. The lab manager

Answers:

a. The lab investigator

b. The lab steward

c. The lab secretary

d. The lab manager



Question 11 1 out of 1 points What percentage of consumers utilize Intel and AMD PCs?

Selected Answer:

a . 90

Answers:

a . 90

b. 70

c. 80

d. 60



Question 12 1 out of 1 points _______ can be used to restore backup files directly to a workstation.

Selected Answer:

d. Norton Ghost

Answers:

a.

Photorec

b. Belarc Advisor

c. ProDiscover

d. Norton Ghost



Question 13 1 out of 1 points How often should hardware be replaced within a forensics lab?

Selected Answer:

d. Every 12 to 18 months

Answers:

a. Every 18 to 24 months

b. Every 24 to 30 months

c. Every 6 to 12 months

d. Every 12 to 18 months



Question 14 1 out of 1 points A TEMPEST facility is designed to accomplish which of the following goals?

Selected Answer:

b. Shield sensitive computing systems and prevent electronic eavesdropping of computer emissions.

Answers:

a. Protect the integrity of data.

b. Shield sensitive computing systems and prevent electronic eavesdropping of computer emissions.

c. Prevent data loss by maintaining consistent backups.

d. Ensure network security from the Internet using comprehensive security software.



Question 15 1 out of 1 points In order to qualify for the Advanced Certified Computer Forensic Technician certification, a candidate must have _______ years of hands-on experience in computer forensics investigations. Selected Answer:

d. five

Answers:

a. three

b. six

c. two

d. five



Question 16 1 out of 1 points

In order to qualify for the Certified Computer Crime Investigator, Basic Level certification, candidates must provide documentation of at least _______ cases in which they participated.

Selected Answer:

a . 10

Answers:

a . 10

b. 5

c. 20

d. 15



Question 17 1 out of 1 points Which tool below is not recommended for use in a forensics lab?

Selected Answer:

a. Degausser

Answers:

a. Degausser

b. FireWire and USB adapters

c. SCSI cards

d.

2.5-inch adapters for drives



Question 18 1 out of 1 points Which option below is not a recommendation for securing storage containers? Selected Answer:

a. Rooms with evidence containers should have a secured wireless network.

Answers:

a. Rooms with evidence containers should have a secured wireless network.

b. Only authorized access should be allowed, and it should be kept to a minimum.

c. The container should be located in a restricted area.

d. Evidence containers should remain locked when they aren't under direct supervision.



Question 19 1 out of 1 points Which option below is not one of the recommended practices for maintaining a keyed padlock? Selected Answer:

c. Use a master key.

Answers:

a. Appoint a key custodian.

b. Change locks and keys annually.

c. Use a master key.

d. Take inventory of all keys when the custodian changes.



Question 20 1 out of 1 points _______ is a specialized viewer software program.

Selected Answer:

a. IrfanView

Answers:

a. IrfanView

b. FastView

c. ThumbsLoader

d. ABSee...


Similar Free PDFs