Forensics in Cybersecurity-
Questions with Correct Answers
(VERIFIED)
Malware forensics is also known as internet forensics.
A True
B False—ANSWER--B
The Privacy Protection Act (PPA) of 1980 protects journalists from being required to turn
over to law enforcement any work product or documentary material, including sources,
before it is disseminated to the public.
A True
B False—ANSWER--A
The term testimonial evidence refers to the process of examining malicious computer code.
,A True
B False—ANSWER--B
Evidence need not be locked if it is at a police station.
A True
B False—ANSWER--B
Real evidence means physical objects that can be touched, held, or directly observed, such
as a laptop with a suspect's fingerprints on it, or a handwritten note.
A True
B False—ANSWER--A
The FBI is the premier federal agency tasked with combating cybercrime.
A True
B False—ANSWER--B
When cataloging digital evidence, the primary goal is to do what?
A Make bitstream images of all hard drives.
B Keep the computer from being turned off.
© 2026 Copyright. All Rights Reserved. This document is
protected by copyright law, Copyrighted By Brittie Donald
, C Keep evidence from being removed from the scene.
D Preserve evidence integrity.—ANSWER--D
Your roommate can give consent to search your computer.
A True
B False—ANSWER--B
The Windows Registry is essentially a repository of all settings, software, and parameters for
Windows.
A True
B False—ANSWER--A
The term internet forensics refers to information that forensic specialists use to support or
interpret real or documentary evidence; for example, to demonstrate that the fingerprints
found on a keyboard are those of a specific individual.
A True
B False—ANSWER--B
PROM can be programmed only once. Data is not lost when power is removed.