Question No : 1
Which outcome is expected from a well-conducted forensic investigation process?
정답:
Question No : 2
What is the primary purpose of computer forensics?
정답:
Question No : 3
What technique is commonly used to analyze embedded macros within suspicious Word documents for signs of malicious intent?
정답:
Question No : 4
Why is the examination of cache, cookies, and history important in Windows forensics?
정답:
Question No : 5
In the context of web server forensics, why is it important to analyze the user agent field in web logs?
정답:
Question No : 6
What is the primary goal of anti-forensics techniques?
정답:
Question No : 7
What is the primary purpose of network forensics?
정답:
Question No : 8
In modern macOS forensics, which file system is commonly encountered and what type of data does it manage?
정답:
Question No : 9
What is an essential step in maintaining the integrity of digital evidence during the investigation phase?
정답:
Question No : 10
Which phase in the computer forensics investigation process includes the analysis of digital evidence?
정답:
Question No : 11
What is the primary goal of network forensics?
정답:
Question No : 12
Which of the following can be used as a countermeasure against anti-forensics techniques?
정답:
Question No : 13
In Mac forensics, which file system is most commonly encountered in modern macOS installations?
정답:
Question No : 14
Which factors are critical to maintaining the integrity of acquired digital evidence? (Select two)
정답:
Question No : 15
What is a countermeasure against log tampering in Windows forensics?
정답: