Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Due

Jan 31 at 12:59pm
Points
100
Questions
20
Time Limit
None
Allowed Attempts
2

Instructions
Module 3

Quiz
Chapters 3 & 4

Before the end of the module week, take the module quiz.
The purpose of the quiz is to assess your mastery of the
knowledge and skills presented in your assigned textbook
readings.

There is no time limit for this quiz. You will have two
attempts to take the quiz. The highest score will be entered
into the grade book. 

Grading: The quiz contains 20 multiple-choice and true-


false questions. Each question is worth five points. You will
see scores for the questions right away. Your score will be
reflected immediately in your Grades area. Please contact
your instructor if you have any questions.

 This activity supports Module Objectives 1, 2, and 3 and Learning Outcomes 1 and 2.

Take the Quiz Again

Attempt History
Attempt Time Score
LATEST Attempt 1
11 minutes 100 out of 100

Score for this attempt:


100 out of 100
Submitted Jan 30 at 8:18pm
This attempt took 11 minutes.
Question 1 5
/ 5 pts

To achieve American Society of Crime Laboratory Directors (ASCLD)


accreditation, a lab must meet about 40 criteria.

Correct!  
False

 
True

Question 2 5
/ 5 pts

__________ is a free utility that comes as a graphical user interface for


use with Windows operating systems. When you first launch the utility, it
presents you with a cluster-by-cluster view of your hard drive in
hexadecimal form.

 
OSForensics

Correct!  
Disk Investigator

 
Kali Linux

 
EnCase

Question 3 5
/ 5 pts

Storage servers in a forensics lab should be backed up at least once a


month.

Correct!  
False

 
True

Question 4 5
/ 5 pts

From the perspective of digital forensics, changing the time or date


stamp on a file does not alter the file.

 
True

Correct!  
False

Question 5 5
/ 5 pts

You can make a bit-level copy of a computer hard drive using basic
Linux commands.

Correct!  
True

 
False

Question 6 5
/ 5 pts

How you will gather evidence and which tools are most appropriate for a
specific investigation are part of ___________.

 
a curriculum vitae

 
the rules of evidence

 
the expert report

Correct!  
a forensic analysis plan

Question 7 5
/ 5 pts

Forensic investigators who collect data as evidence must understand


the __________ of information, which refers to how long it is valid.

 
slack space

 
volatility

Correct!  
life span

 
bit-level

Question 8 5
/ 5 pts

__________ is information at the level of 1s and 0s stored in computer


memory or on a storage device.

 
A segment

Correct!  
Bit-level information

 
File slack

 
A cluster

Question 9 5
/ 5 pts

Residual information in file slack is always overwritten when a new file is


created.

 
True

Correct!  
False

Question 10 5
/ 5 pts

File slack and slack space are the same thing.

 
False

Correct!  
True

Question 11 5
/ 5 pts

What are attributes of a solid-state drive (SSD)?

 
Microchips and magnetic storage

 
Tape storage and a read-only mode switch

 
Reflective pits and flash memory

Correct!  
Flash memory and microchips

Question 12 5
/ 5 pts

What term describes analysis performed on an evidence disk or a


forensic duplicate using the native operating system?

 
Steganalysis

 
Physical analysis

Correct!  
Logical analysis

 
Network analysis

Question 13 5
/ 5 pts

__________ is offline analysis conducted on an evidence disk or


forensic duplicate after booting from a CD or another system.

 
Steganography

Correct!  
Physical analysis

 
Encryption

 
Logical analysis

Question 14 5
/ 5 pts

People try to thwart investigators by using encryption to scramble


information or _________ to hide information, or both together.

 
running processes

Correct!  
steganography

 
sweepers

 
scrubbers

Question 15 5
/ 5 pts

The term scrubber refers to software that cleans unallocated drive


space.
 
False

Correct!  
True

Question 16 5
/ 5 pts

Many USB drives come with a switch to put them in read-only mode.

Correct!  
True

 
False

Question 17 5
/ 5 pts

Solid-state drives (SSDs) are often used in tablets and in some laptops.

 
False

Correct!  
True

Question 18 5
/ 5 pts

A swap file is an example of persistent data.

 
True

Correct!  
False

Question 19 5
/ 5 pts

SHA1 and SHA2 are currently the most widely used hashing algorithms.

Correct!  
True

 
False

Question 20 5
/ 5 pts

What was designed as an area where computer vendors could store


data that is shielded from user activities and operating system utilities,
such as delete and format?

Correct!  
Host protected area (HPA)

 
Master boot record (MBR)

 
File slack

 
Volume slack

Quiz Score:
100 out of 100

You might also like