

MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Technical MCQs knowledge and support exam preparation. Choose a topic below to get started.
1. |
Deleted files is a common technique used in computer forensics is the recovery of deleted files. |
A. | TRUE |
B. | FALSE |
C. | Can be true or false |
D. | Can not say |
E. | |
Answer» B. FALSE | |
2. |
Volatile data resides in ? |
A. | registries |
B. | cache |
C. | RAM |
D. | All of the above |
Answer» E. | |
3. |
Physical Forensics Discipline include which of the following? |
A. | Bloodstain |
B. | Eating |
C. | Searching |
D. | Watching |
Answer» B. Eating | |
4. |
You are suppose to maintain three types of records. Which answer is not a record? |
A. | Chain of custody |
B. | Documentation of the crime scene |
C. | Searching the crime scene |
D. | Document your actions |
Answer» D. Document your actions | |
5. |
How many c's in computer forensics? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» D. 4 | |
6. |
CCFP stands for? |
A. | Cyber Certified Forensics Professional |
B. | Certified Cyber Forensics Professional |
C. | Certified Cyber Forensics Program |
D. | Certified Cyber Forensics Product |
Answer» C. Certified Cyber Forensics Program | |
7. |
Which of the following techniques are used during computer forensics investigations? |
A. | Cross-drive analysis |
B. | Live analysis |
C. | Deleted files |
D. | All of the above |
Answer» E. | |
8. |
computer forensics also be used in civil proceedings. |
A. | Yes |
B. | No |
C. | Can be yes or no |
D. | Can not say |
Answer» B. No | |
9. |
Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts? |
A. | Steganography |
B. | Stochastic forensics |
C. | Both A and B |
D. | None of the above |
Answer» C. Both A and B | |
10. |
Computer forensics also known as? |
A. | digital forensic science |
B. | computer crime |
C. | computer forensic science |
D. | computer forensics investigations |
Answer» D. computer forensics investigations | |