Question 1: Chain of custody in digital forensics investigation is referred to as a _______.
Select one:
A. Payment slip for forensic investigator.
B. Formal letter to attend court trial.
C. Suspect and witness that involve in crime investigation.
D. Document to track the movement of evidence.
Solution: Document to track the movement of evidence.
Question 2: In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. If there are concerns that a departing employee has stolen proprietary data, which of the following is NOT the steps to be taken to preserve forensically a departing employee’s computer?
Select one:
A. Determine if an employee connected a device such as a removable USB storage device or if a CD was created which contained confidential data.
B. Find and document instances of an employee’s improper conduct.
C. Pass the former employee’s computer to another employee to improve their productivity.
D. Identify which data was deleted from the computer.
Solution: Pass the former employee’s computer to another employee to improve their productivity.
Question 3: When preparing a questionnaire for interviewing individuals of the crime scene which of the following should NOT be requested:
Select one:
A. Passwords
B. Encryption keys
C. Details on removable storage
D. Admission of guilt
Solution: Admission of guilt
Question 4: Which of the following are the factors of inadmissible evidence?
(i) Any evidence that diverts the jury's attention away from the central premise of the case.
(ii) Evidence that arose from a privileged informational source.
(iii) Any evidence that proves or disproves a fact of the case but not necessarily innocence of guilt.
(iv) The mentioning of prior crimes unrelated to the current case.
Select one:
A. (i), (ii) and (iv)
B. (i), (iii) and (iv)
C. (ii), (iii) and (iv)
D. (i), (ii) and (iii)
Solution: (i), (ii) and (iv)
Question 5: Which of the following is NOT an example of cyber crime?
Select one:
A. Sending misleading messages via email or other channels, that cause internet users to provide personal information, access malicious websites or download malicious payloads.
B. Fake scratch cards that promise some sort of prize, on the condition that the 'winner' pays a collection fee.
C. A network of computers that attackers infected with malware, compromised and connected them to a central command & control center.
D. Fraudulent sales through online auction or retail sites or through bogus websites.
Solution: Fake scratch cards that promise some sort of prize, on the condition that the 'winner' pays a collection fee.
Question 6: How can digital forensics help to save organization money and time? Explain.
Solution: As the modern day targets are increasing and with number of alarming attacks each that so it is possible for attack to happen in your organizations it will lead to loss of information like if someone breaks into your company and you loose a lot of information like trade secrets which the attackers would be able to steal the investigation will uncover which things were stolen and how they were stolen which can be used in court of law that the crime took place by which party and you could be compensated for the attack sometimes the files are deleted from the system and computer forensics could be used to recover such valuable information without having to pay and expose data to the third party.
No comments:
Post a Comment