Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
What statement best describes a physical unit of equipment that contains a computer or microcontroller known as a digital device?
Correct
Digital devices are devices that process data in the form of numbers (digits). Digital devices can be used to communicate with others, create documents, access and enter data online, and store information.
Incorrect
Digital devices are devices that process data in the form of numbers (digits). Digital devices can be used to communicate with others, create documents, access and enter data online, and store information.
-
Question 2 of 30
2. Question
What term is used to refer to an investigation that involves relevant digital data processed or stored by digital devices?
Correct
Investigations that involve relevant digital data processed or stored by digital devices are known as digital investigations.
Incorrect
Investigations that involve relevant digital data processed or stored by digital devices are known as digital investigations.
-
Question 3 of 30
3. Question
What term is used to refer to the process of preservation, identification, extraction, recovery, documentation, and investigation of material found in digital devices?
Correct
Digital forensics encompasses the preservation, identification, extraction, recovery, documentation and investigation of material found in digital devices. Digital forensic experts specialize in digital forensics.
Incorrect
Digital forensics encompasses the preservation, identification, extraction, recovery, documentation and investigation of material found in digital devices. Digital forensic experts specialize in digital forensics.
-
Question 4 of 30
4. Question
Digital forensic experts can recover data from deleted files, both those that have been purposefully deleted and those that were accidentally deleted. When will a deleted file no longer be recoverable from a computer’s hard drive?
Correct
Deleted files are recoverable until they are overwritten because data is not erased from a computer’s hard drive until it is overwritten. A deleted file will remain present on a hard drive until the operating system overwrites all or some part of the file. So, deleted files are generally no longer recoverable when they have been overwritten.
Incorrect
Deleted files are recoverable until they are overwritten because data is not erased from a computer’s hard drive until it is overwritten. A deleted file will remain present on a hard drive until the operating system overwrites all or some part of the file. So, deleted files are generally no longer recoverable when they have been overwritten.
-
Question 5 of 30
5. Question
Which of the following types of data is a digital forensic expert least likely to be able to recover from a computer’s hard drive when conducting an investigation involving computers?
Correct
A digital forensic expert would not be able to recover a deleted file that has been overwritten by the operating system. A digital forensic expert can recover, among other things, the following types of information from computer systems:
– Deleted files and other data that have not been overwritten (e.g., deleted documents, images, links or shortcut files, and email messages).
– Files deleted through computer-automated processes.
– Temporary auto-save files.
– Print-spool files.
– Websites visited, even where the browser history and cache have been deleted.
– Communications sent via chat or instant messenger.
– Financial-based internet transactions.
– Documents, letters, and images created, modified, or accessed, even if the data was not saved on the computer in some situations.
– Data that has been copied, corrupted or moved.Incorrect
A digital forensic expert would not be able to recover a deleted file that has been overwritten by the operating system. A digital forensic expert can recover, among other things, the following types of information from computer systems:
– Deleted files and other data that have not been overwritten (e.g., deleted documents, images, links or shortcut files, and email messages).
– Files deleted through computer-automated processes.
– Temporary auto-save files.
– Print-spool files.
– Websites visited, even where the browser history and cache have been deleted.
– Communications sent via chat or instant messenger.
– Financial-based internet transactions.
– Documents, letters, and images created, modified, or accessed, even if the data was not saved on the computer in some situations.
– Data that has been copied, corrupted or moved. -
Question 6 of 30
6. Question
Within the digital forensics field, there are several different types of special experts. Which of the following is least likely to be an expert in the digital forensics field?
Correct
Within the digital forensics field, there are several different types of special experts. These special experts include:
– Operating and file system experts
– Data recovery experts
– Forensic accounting experts
– Recording and archival extraction experts
– Intrusion and malicious code expertsIncorrect
Within the digital forensics field, there are several different types of special experts. These special experts include:
– Operating and file system experts
– Data recovery experts
– Forensic accounting experts
– Recording and archival extraction experts
– Intrusion and malicious code experts -
Question 7 of 30
7. Question
Which of the following types of digital forensic experts are proficient in certain operating systems (e.g., Windows Vista, Windows 7, Windows 10, Linux) and the various file systems they employ?
Correct
Operating and file system experts are proficient in certain operating systems (e.g., Windows Vista, Windows 7, Windows 10, Linux) and the various file systems they employ (e.g., Joliet, NTFS, FAT, VFS, Ext2). Operating and file systems experts also have the ability to convey operational characteristics and observe artifacts.
Incorrect
Operating and file system experts are proficient in certain operating systems (e.g., Windows Vista, Windows 7, Windows 10, Linux) and the various file systems they employ (e.g., Joliet, NTFS, FAT, VFS, Ext2). Operating and file systems experts also have the ability to convey operational characteristics and observe artifacts.
-
Question 8 of 30
8. Question
Which of the following types of digital forensic experts specialize in investigating computer network intrusions by attack vectors and analyze what happened during the intrusions?
Correct
Intrusion and malicious code experts specialize in investigating computer network intrusions. These experts can determine attack vectors, the tools employed, what occurred during access, and what, if anything, was taken.
Incorrect
Intrusion and malicious code experts specialize in investigating computer network intrusions. These experts can determine attack vectors, the tools employed, what occurred during access, and what, if anything, was taken.
-
Question 9 of 30
9. Question
Which of the following types of digital forensic experts specialize in extracting information from damaged media sources with the use of special tools and equipment for subsequent examination?
Correct
Data recovery experts operate clean rooms designed to magnetically extract information from a damaged media source. With the use of special tools and equipment, data recovery experts can disassemble a hard disk, separate the platters, and extract and reassemble the information for subsequent examination.
Incorrect
Data recovery experts operate clean rooms designed to magnetically extract information from a damaged media source. With the use of special tools and equipment, data recovery experts can disassemble a hard disk, separate the platters, and extract and reassemble the information for subsequent examination.
-
Question 10 of 30
10. Question
Which of the following experts specialize in the use of professional accounting skills in matters involving potential or actual civil or criminal litigation?
Correct
Forensic accounting experts specialize in the use of professional accounting skills in matters involving potential or actual civil or criminal litigation. A forensic accountant can provide various services, including audits, accountant performance reviews, and examinations of financial documents for fraud, misconduct, or industry-standard violations.
Incorrect
Forensic accounting experts specialize in the use of professional accounting skills in matters involving potential or actual civil or criminal litigation. A forensic accountant can provide various services, including audits, accountant performance reviews, and examinations of financial documents for fraud, misconduct, or industry-standard violations.
-
Question 11 of 30
11. Question
Which of the following types of digital forensic experts specialize in extracting information from tapes, digital media, or other system backups?
Correct
Recording and archival extraction experts are experts in extracting information from tapes, digital media, or other system backups. Backup solutions archive data in proprietary formats, making extraction very cumbersome.
Incorrect
Recording and archival extraction experts are experts in extracting information from tapes, digital media, or other system backups. Backup solutions archive data in proprietary formats, making extraction very cumbersome.
-
Question 12 of 30
12. Question
The best way to hire an expert is to follow a few simple guidelines. Which of the following guidelines is a fraud examiner least likely to follow when he wants to hire a forensic expert?
Correct
A fraud examiner must be diligent when deciding to hire a forensic expert. The best way to hire an expert is to follow a few simple guidelines. These guidelines include:
– Ask colleagues for referrals.
– Make sure the expert is properly licensed (if required) and insured.
– Ask the experts if they have worked on the type of case that is at issue, and if so, what they were retained for and the outcome.
– Set up a budget for the investigation.
– Make sure there is a comfortable relationship and good communication between the client and the expert.
– Listen to the expert because he might have new, unique ideas and suggestions that were not previously considered.Incorrect
A fraud examiner must be diligent when deciding to hire a forensic expert. The best way to hire an expert is to follow a few simple guidelines. These guidelines include:
– Ask colleagues for referrals.
– Make sure the expert is properly licensed (if required) and insured.
– Ask the experts if they have worked on the type of case that is at issue, and if so, what they were retained for and the outcome.
– Set up a budget for the investigation.
– Make sure there is a comfortable relationship and good communication between the client and the expert.
– Listen to the expert because he might have new, unique ideas and suggestions that were not previously considered. -
Question 13 of 30
13. Question
What is the term used to refer to information stored or transmitted in binary form (i.e., ones and zeroes) that can be used to prove something?
Correct
Digital evidence is information stored or transmitted in binary form (i.e., ones and zeroes) that can be used to prove something. Fraud examiners will gather some type of digital evidence in almost all fraud examinations.
Incorrect
Digital evidence is information stored or transmitted in binary form (i.e., ones and zeroes) that can be used to prove something. Fraud examiners will gather some type of digital evidence in almost all fraud examinations.
-
Question 14 of 30
14. Question
When digital data is collected in an investigation, it normally means that the facts at issue involve a computer. In which of the following ways is a computer involved in the facts surrounding an investigation?
Correct
Generally, when digital data is collected in an investigation, the facts at issue involved a computer, either as a target of a criminal act, an instrument of crime, or a repository of evidence associated with the crime.
Incorrect
Generally, when digital data is collected in an investigation, the facts at issue involved a computer, either as a target of a criminal act, an instrument of crime, or a repository of evidence associated with the crime.
-
Question 15 of 30
15. Question
Sometimes, crimes can be committed against computers themselves. Which of the following is least likely to be a crime committed against a computer?
Correct
Computers themselves can be the targets of crime. Computer and computer-component theft, system intrusions, denial of service, software piracy, and software theft are examples of crimes committed against computers.
Incorrect
Computers themselves can be the targets of crime. Computer and computer-component theft, system intrusions, denial of service, software piracy, and software theft are examples of crimes committed against computers.
-
Question 16 of 30
16. Question
Tangible information is less volatile than digital evidence. Which of the following is an accurate reason why digital evidence is more volatile than tangible information?
Correct
Digital evidence is more volatile than tangible information because digital data can be altered or destroyed more easily than tangible information.
Incorrect
Digital evidence is more volatile than tangible information because digital data can be altered or destroyed more easily than tangible information.
-
Question 17 of 30
17. Question
Digital evidence is more volatile than tangible information. Which of the following is not characteristic of digital data?
Correct
Digital evidence is more volatile than tangible information because data can be altered or destroyed more easily than tangible information. Digital data is, by design, fragile and short-lived in nature. It is easily manipulated, substituted, modified, and deleted.
Incorrect
Digital evidence is more volatile than tangible information because data can be altered or destroyed more easily than tangible information. Digital data is, by design, fragile and short-lived in nature. It is easily manipulated, substituted, modified, and deleted.
-
Question 18 of 30
18. Question
Digital information can be altered by seemingly harmless actions. Which is a likely way through which digital information can be altered?
Correct
Operating systems and programs frequently alter, delete, and modify digital data, and this might happen automatically. Digital information that is potentially relevant to an investigation can be altered by seemingly harmless actions, such as:
– Shutting down a running system.
– Starting up a system.
– Looking through files on a running computer.
– Using or interacting with a computer system.
– Visiting websites.
– Using software applications.
– Downloading or transferring files.
– Connecting a computer system to a network.Incorrect
Operating systems and programs frequently alter, delete, and modify digital data, and this might happen automatically. Digital information that is potentially relevant to an investigation can be altered by seemingly harmless actions, such as:
– Shutting down a running system.
– Starting up a system.
– Looking through files on a running computer.
– Using or interacting with a computer system.
– Visiting websites.
– Using software applications.
– Downloading or transferring files.
– Connecting a computer system to a network. -
Question 19 of 30
19. Question
What statement best describes the term “Spoliation” in the context of evidence?
Correct
Spoliation is broadly defined as the act of intentionally or negligently destroying documents relevant to litigation.
Incorrect
Spoliation is broadly defined as the act of intentionally or negligently destroying documents relevant to litigation.
-
Question 20 of 30
20. Question
The failure to preserve the integrity of digital evidence could result in several adverse consequences. Which of the following is least likely to be a consequence of a failure to preserve the integrity of digital evidence?
Correct
Because digital evidence can be easily altered or destroyed, the integrity of digital evidence must be preserved. The failure to preserve the integrity of digital evidence could result in several adverse consequences. Consequences of not preserving the integrity of digital evidence include:
– The government’s questioning of the integrity of any evidence collected in a fraud investigation.
– Potential claims of spoliation of evidence.
– Evidence can be deemed inadmissible in a legal proceeding, or, even if admitted, it might not be given much weight because evidence of questionable authenticity does not provide reliable proof.Incorrect
Because digital evidence can be easily altered or destroyed, the integrity of digital evidence must be preserved. The failure to preserve the integrity of digital evidence could result in several adverse consequences. Consequences of not preserving the integrity of digital evidence include:
– The government’s questioning of the integrity of any evidence collected in a fraud investigation.
– Potential claims of spoliation of evidence.
– Evidence can be deemed inadmissible in a legal proceeding, or, even if admitted, it might not be given much weight because evidence of questionable authenticity does not provide reliable proof. -
Question 21 of 30
21. Question
User-created files are examples of files containing evidence stored in computer systems. They are digital files created under the user’s direction. Which of the following is least likely to be an example of a user-created file?
Correct
User-created files are digital files created under the user’s direction. User-created files include text-based documents, spreadsheets, databases, emails, address books, presentation slides, audio/video files, image files, and internet bookmarks.
Incorrect
User-created files are digital files created under the user’s direction. User-created files include text-based documents, spreadsheets, databases, emails, address books, presentation slides, audio/video files, image files, and internet bookmarks.
-
Question 22 of 30
22. Question
Computer-generated data are information generated by a computer’s operating system. In most cases, the user is not aware that this information is being written. Which is not an example of computer-generated data?
Correct
Evidence might also be found in information generated by a computer’s operating system. This type of information is important because it can identify that a certain activity has taken place, and in most cases, the user is not aware that this information is being written. Some common examples of computer-generated data available for examination include metadata, registry, event logs, internet activity, temporary files, and deleted data.
Incorrect
Evidence might also be found in information generated by a computer’s operating system. This type of information is important because it can identify that a certain activity has taken place, and in most cases, the user is not aware that this information is being written. Some common examples of computer-generated data available for examination include metadata, registry, event logs, internet activity, temporary files, and deleted data.
-
Question 23 of 30
23. Question
Users often hide files to prevent them from being found. There are a variety of techniques used in hiding files. Which of the following is not one of the most common techniques used to hide files?
Correct
Often, users hide files to prevent them from being found. There are a variety of techniques to hide files, but some of the most common methods include camouflaging, steganography, and encryption.
Incorrect
Often, users hide files to prevent them from being found. There are a variety of techniques to hide files, but some of the most common methods include camouflaging, steganography, and encryption.
-
Question 24 of 30
24. Question
When a user hides certain files under an innocent name or different file extension to prevent others from discovering them, what type of technique did he/she use in hiding those files?
Correct
Camouflaging is the process of hiding certain files under a different name or a different file extension to prevent others from discovering them. For example, a suspect might change a file name from “evidence.doc” to “install.exe” and place the file in a directory that stores program files.
Incorrect
Camouflaging is the process of hiding certain files under a different name or a different file extension to prevent others from discovering them. For example, a suspect might change a file name from “evidence.doc” to “install.exe” and place the file in a directory that stores program files.
-
Question 25 of 30
25. Question
What part of a computer file contains data identifying the file format?
Correct
The file header is a region at the beginning of each file where bookkeeping information is kept. It contains the first bits of data in a file which includes data identifying the file format. When fraud examiners want to determine if a file has been camouflaged, they would normally analyze a target’s hard drive to determine whether the file has been camouflaged. This is done by analyzing the file header.
Incorrect
The file header is a region at the beginning of each file where bookkeeping information is kept. It contains the first bits of data in a file which includes data identifying the file format. When fraud examiners want to determine if a file has been camouflaged, they would normally analyze a target’s hard drive to determine whether the file has been camouflaged. This is done by analyzing the file header.
-
Question 26 of 30
26. Question
A user might seek to protect files using steganography. What statement best describes the process of hiding files in a computer system known as steganography?
Correct
Steganography is the process of hiding one piece of information within an apparently innocent file. For example, a user can use the least significant bits of a bitmap image to hide a message. By hiding the message in the least significant bits of an image, there is almost no perceivable change in the bitmap image itself. It is practically impossible to tell that the image was altered without directly comparing the altered image to the original.
Incorrect
Steganography is the process of hiding one piece of information within an apparently innocent file. For example, a user can use the least significant bits of a bitmap image to hide a message. By hiding the message in the least significant bits of an image, there is almost no perceivable change in the bitmap image itself. It is practically impossible to tell that the image was altered without directly comparing the altered image to the original.
-
Question 27 of 30
27. Question
Investigators use different methods to detect the use of steganography. Which is least likely to be a method used by investigators to detect the use of steganography?
Correct
There are a number of tools that investigators can use to detect steganography. These tools use different methods to detect the use of steganography. The following are some common methods of detecting the use of steganography:
– Visual detection by looking for visual anomalies in jpeg, bmp, gif, and other image files.
– Audible detection by looking for audible anomalies in wav, mp3, mpeg, and other media files.
– Statistical detection by determining whether the statistical properties of files deviate from the expected norm.
– Structural detection by looking for structural oddities that suggest manipulation (e.g., size differences, date differences, time differences, or content modification).Incorrect
There are a number of tools that investigators can use to detect steganography. These tools use different methods to detect the use of steganography. The following are some common methods of detecting the use of steganography:
– Visual detection by looking for visual anomalies in jpeg, bmp, gif, and other image files.
– Audible detection by looking for audible anomalies in wav, mp3, mpeg, and other media files.
– Statistical detection by determining whether the statistical properties of files deviate from the expected norm.
– Structural detection by looking for structural oddities that suggest manipulation (e.g., size differences, date differences, time differences, or content modification). -
Question 28 of 30
28. Question
A user can convert information using an algorithm (called a cipher) that makes the information unreadable to anyone without the encryption key. What type of technique did the user use in hiding that information?
Correct
Encryption refers to procedures used to convert information using an algorithm (called a cipher) that makes the information unreadable to anyone without the encryption key. A user can protect files by encrypting them.
Incorrect
Encryption refers to procedures used to convert information using an algorithm (called a cipher) that makes the information unreadable to anyone without the encryption key. A user can protect files by encrypting them.
-
Question 29 of 30
29. Question
In addition to computer systems, evidence might also be stored on any form of technology that can be used to transmit or store data. What term is used to refer to an auxiliary device that is connected to, but not part of, a host computer?
Correct
A peripheral device is an auxiliary device that is connected to, but not part of, a host computer. Evidence might be stored on other forms of technology such as a peripheral device. As data moves to and from peripheral devices, it leaves evidence of its presence and sometimes leaves full copies of its contents.
Incorrect
A peripheral device is an auxiliary device that is connected to, but not part of, a host computer. Evidence might be stored on other forms of technology such as a peripheral device. As data moves to and from peripheral devices, it leaves evidence of its presence and sometimes leaves full copies of its contents.
-
Question 30 of 30
30. Question
Printers might contain valuable evidence. A memory buffer is normally found on printers. What statement best describes a memory buffer?
Correct
A memory buffer is a temporary storage area of jobs waiting to be printed, which might also contain important information. Information contained in a memory buffer, however, is generally limited to recently created and stored data.
Incorrect
A memory buffer is a temporary storage area of jobs waiting to be printed, which might also contain important information. Information contained in a memory buffer, however, is generally limited to recently created and stored data.