Digital Forensics in Cybersecurity Pre-Assessment
Questions & Answers
1. The chief news deputy of an bookkeeping firm trusts impressionable dossier is being unprot
ected on the local network.
Which form should the IT stick use to draw mathematical evidence about this freedom exposu
re ANS : Sniffer
2. A lawman prosecutor fact-finding a warning traces the beginning to a building. The
couple at delegation of
representatives shows the agent the only calculating the offspring acknowledge, which is in the
ir offspring's cubicle. The couple states that their offspring is soon in class at a local junior
high.
How endure the informer constitutionally attain to the calculating ANS : Obtain con-
shipped to search from the persons
3. How concede
possibility a legal physicist acquire the network configuration from a Windows PC before takin
g it from a misdemeanor setting ANS :
By utilizing the ipconfig command from a command prompt on the calculating
4. The workforce executive of a limited bookkeeping firm trusts he concede
possibility have happened a martyr of a phishing swindle. The boss clicked on a link in an elect
ronic
mail message that requested him to validate the logon attestations for the firm's connected to
the internet savings account.
, Which mathematical evidence bear a legal analyst accumulate to inspect this occurrence ANS
Browser cache
5. After a association's distinct-purpose, hard-working to
foreshadow server is hack by a cybercriminal, a forensics expert is contracted to scrutinize the
felony and accumulate evidence.
Which mathematical evidence bear be composed ANS : Firewall logs
6. Thomas taken an electronic
mail asserting that he wanted to trail a link and validate welcome checking
account information to guarantee it was secure. Shortly subsequently following the directions,
Thomas seen services was absent from welcome report.
Which mathematical evidence bear be thought-out to decide by what
method Thomas' report news was compromised ANS : Email ideas
7. The chief executive (CEO) of a limited calculating party has iden-
tified a potential hack attack from an outside rival.
Which type of evidence bear a forensics auditor use to label the beginning of the taxicab ANS :
Network undertaking logs
8. A judicial chemist enters at a crime setting to start accumulating evidence.
What is the before anything else the legal chemist concede possibility do ANS :
Photograph all evi- dence in allure original place
9. Which means of imitating mathematical evidence guarantees decent evidence col- lection
ANS : Make the copy at the part-level
10. A calculating complicated in a crime is contaminated accompanying malware. The calculati
ng act and related to the guest's network. The judicial researcher appears at the setting.