UGRD-CYBS6375 Information Assurance and Security 5
UGRD-CYBS6375 Information Assurance and Security 5
Security 5
1. Home
2. My courses
3. UGRD-CYBS6375-2133T
4. WEEK 13 Ethical Issues for Computer Forensics
5. Final Quiz 1
Flag question
Question text
As with any investigative field there comes a time when ethical issues will arise, here we look at
some of the ethical issues associated with computer forensics.
Select one:
True
False
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The digital world has its own view of the term ethics, Ethics in computer forensics is a set of
moral principles that regulate the use of computers; some common issues of computer forensics
include IPR, Privacy Concerns and how computers affect society.”
Select one:
True
False
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Honesty is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Goodwill is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
These issues are not published but they form an integral part of professional life. Like every
other profession, computer forensic investigations must also be conducted under an ethical
framework.
Select one:
True
False
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Ethics in general is considered as “Behaviour of an individual with relation to something”.
Select one:
True
False
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The process of computer forensics is thus quite simple and involves various activities.
Select one:
True
False
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Proficiency is NOT Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Digital Forensics is defined as the process of preservation, identification, extraction, and
documentation of computer evidence which can be used by the court of law.
Select one:
True
False
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Fairness is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Digital Forensics is a science of finding evidence from digital media like a computer, mobile
phone, server, or network.
Select one:
True
False
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
To counter this problem the forensic investigator must follow the basic guidelines and rules
suggested by ACPO and / or NIST.
Select one:
True
False
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The role of the investigator is therefore crucial and any mistake on their part may put the whole
investigation in jeopardy.
Select one:
True
False
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Consistency is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The rules and guidelines provided by ACPO and NIST address the legal and technical issues for
Ethical and Moral issues.
Select one:
True
False
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Diligence is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Computer forensics is an integral part of the widely increasing field of digital forensics.
Select one:
True
False
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Computer forensics is the art of collecting, analysing, preserving and presenting digital evidence
collected from a computer in a legally acceptable manner.
Select one:
True
False
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A sense of community is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Good reputation is NOT the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Marks 19.00/20.00
Question 1
Correct
Flag question
Question text
When a file is deleted on a computer, it is placed in the hard disk.
Select one:
True
False
Question 2
Correct
Flag question
Question text
As with any investigative field there comes a time when ethical issues will arise, here we look at
some of the ethical issues associated with computer forensics.
Select one:
True
False
Question 3
Correct
Flag question
Question text
Fairness is not Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 4
Correct
Flag question
Question text
These issues are not published but they form an integral part of professional life. Like every
other profession, computer forensic investigations must also be conducted under an ethical
framework.
Select one:
True
False
Question 5
Correct
Flag question
Question text
The rules and guidelines provided by ACPO and NIST address the legal and technical issues but
not the Ethical and Moral issues.
Select one:
True
False
Question 6
Correct
Question text
Diligence is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 7
Correct
Flag question
Question text
The process of computer forensics is thus quite complex and involves various activities.
Select one:
True
False
Question 8
Correct
Question text
Timestamp data cannot be modified. As such, a conclusion should not be drawn based on this
evidence alone.
Select one:
True
False
Question 9
Incorrect
Flag question
Question text
Consistency is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 10
Correct
Question text
Good reputation is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 11
Correct
Flag question
Question text
The application and file analysis is performed to examine applications and files on a computer
system to determine the perpetrator's knowledge of and intent and capabilities to commit
cybercrime
Select one:
True
False
Question 12
Correct
Question text
Proficiency is not one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 13
Correct
Flag question
Question text
Honesty is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 14
Correct
Question text
Computer forensics is the art of collecting, analyzing, preserving and presenting digital evidence
collected from a computer in a legally acceptable manner.
Select one:
True
False
Question 15
Correct
Flag question
Question text
Goodwill is not Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
To counter problems the forensic investigator must not follow the basic guidelines and rules
suggested by ACPO and / or NIST.
Select one:
True
False
Question 17
Correct
Flag question
Question text
A sense of community is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 18
Correct
Flag question
Question text
The role of the investigator is therefore crucial and any mistake on their part may put the whole
investigation in jeopardy.
Select one:
True
False
Question 19
Correct
Flag question
Question text
The digital world has its own view of the term ethics, Ethics in computer forensics is a set of
moral principles that regulate the use of computers; some common issues of computer forensics
include IPR, Privacy Concerns and how computers affect society.”
Select one:
True
False
Question 20
Correct
Flag question
Question text
Ethics in general is considered as “Behavior of an individual with relation to something”.
Select one:
True
False
State Finished
Question 1
Correct
Flag question
Question text
A logical extraction involves the acquisition of data from active and deleted files, file systems,
unallocated and unused space, and compressed, encrypted, and password protected data
Select one:
True
False
Question 2
Correct
Flag question
Question text
Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to
extract the evidence and validate them.
Select one:
True
False
Question 3
Correct
Flag question
Question text
This documentation should include when the evidence was obtained, where it was obtained, why
it was obtained, what evidence was obtained, and for what reason it was obtained
Select one:
True
False
Question 4
Correct
Flag question
Question text
This documentation should include the manner in which the evidence was acquired (i.e., how it was
obtained).
Select one:
True
False
Question 5
Correct
Flag question
Question text
This documentation should include detailed information about the digital devices from which
evidence was extracted, the hardware and software used to acquire the evidence
Select one:
True
False
Question 6
Correct
Flag question
Question text
The documentation should include the name and details of the investigators
Select one:
True
False
Question 7
Correct
Flag question
Question text
A logical extraction of files may result in a loss of metadata
Select one:
True
False
Question 8
Correct
Flag question
Question text
Helps you to identify the evidence quickly, and also allows you to estimate the potential impact of the
malicious activity on the victim.
Select one:
True
False
Question 9
Correct
Question text
A logical extraction of files may result in a loss of everything
Select one:
True
False
Question 10
Correct
Flag question
Question text
This documentation should include detailed information about the digital devices from which
evidence was extracted, the hardware and software used to acquire the evidence
Select one:
True
False
Question 11
Correct
Question text
Only little acquisition process should be documented.
Select one:
True
False
Question 12
Correct
Flag question
Question text
Digital Forensics provides the forensic team with the best techniques and tools to solve
complicated digital-related cases.
Select one:
True
False
Question 13
Correct
Question text
Extraction involves the acquisition of data from inactive and deleted files and file systems.
Select one:
True
False
Question 14
Correct
Flag question
Question text
The time-frame analysis seeks to create a timeline or time sequence of actions using time stamps
(date and time) that led to an event or to determine the time and date a user performed some
action.
Select one:
True
False
Question 15
Correct
Question text
Digital Forensics helps to postulate the motive behind the crime and identity of the main culprit.
Select one:
True
False
Question 16
Correct
Flag question
Question text
Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the digital
evidence residing on various types of electronic devices.
Select one:
True
False
Question 17
Correct
Question text
Digital Forensics helps to recover, analyze, and preserve computer and related materials in such a
manner that it helps the investigation agency to present them as evidence in a court of law.
Select one:
True
False
Question 18
Correct
Flag question
Question text
Producing a computer forensic report which offers a complete report on the investigation process.
Select one:
True
False
Question 19
Correct
Question text
The entire acquisition should not process should be documented.
Select one:
True
False
Question 20
Correct
Flag question
Question text
Designing procedures at a suspected crime scene which helps you to ensure that the digital evidence
obtained is corrupted.
Select one:
True
False
State Finished
Marks 20.00/20.00
Question 1
Correct
Flag question
Question text
If the Recycle Bin or Trash of trash is emptied (i.e., by the deletion of content), the files that were
deleted are removed from the file allocation table,
Select one:
True
False
Question 2
Correct
Question text
Computer forensics is an integral part of the widely increasing field of digital forensics.
Select one:
True
False
Question 3
Correct
Flag question
Question text
Political opinions s a not a sensitive data?
Select one:
True
False
Question 4
Correct
Flag question
Question text
No need to consider carefully what personal details you provide in your profile
Select one:
True
False
Question 5
Correct
Flag question
Question text
Digital Forensics provides the forensic team with the best techniques and tools to solve
complicated digital-related cases.
Select one:
True
False
Question 6
Correct
Flag question
Question text
Upon signing up for a social media site, most users willingly give their name, gender, date of
birth, and email address. Some social media sites don’t stop at that. Social media goes on to
collect other information like an IP address or the types of things you have liked, shared, or
commented on.
Select one:
True
False
Question 7
Correct
Flag question
Question text
This documentation should include detailed information about the digital devices from which
evidence was extracted, the hardware and software used to acquire the evidence
Select one:
True
False
Question 8
Correct
Flag question
Question text
During the analysis phase, the investigator needs to address the data-hiding techniques that
perpetrators could have used to conceal their identities and activities.
Select one:
True
False
Question 9
Correct
Flag question
Question text
When a file is deleted on a computer, it is placed in the Hard drive.
Select one:
True
False
Question 10
Correct
Flag question
Question text
Hidden data can reveal "knowledge [of a crime], ownership [of content], or intent [to commit a
crime]"
Select one:
True
False
Question 11
Correct
Flag question
Question text
Any data that relates to an identified or identifiable living individual is known as personal data.
Select one:
True
False
Question 12
Correct
Flag question
Question text
Certain categories under personal data require extra protection, have special processing
requirements, and are termed as sensitive personal data.
Select one:
True
False
Question 13
Correct
Flag question
Question text
Criminals use several data-hiding techniques to conceal their illicit activities and identifying
information, such as using encryption
Select one:
True
False
Question 14
Correct
Flag question
Question text
Knowing what types of personal data social media sites store and share is an important
aspect of privacy.
Select one:
True
False
Question 15
Correct
Question text
Social media and networking sites may ask for additional information when you sign in. You can
often include your hometown, schools you’ve attended and when, your current and former
workplace, political affiliations, and general interests. All this information can be stored and
tracked.
Select one:
True
False
Question 16
Correct
Flag question
Question text
Honesty is one of the Ethical issues confronting digital forensics practitioners
Select one:
True
False
Question 17
Correct
Flag question
Question text
Avoid social media site posting regrets
Select one:
True
False
Question 18
Correct
Flag question
Question text
The digital world has its own view of the term ethics, Ethics in computer forensics is a set of
moral principles that regulate the use of computers; some common issues of computer forensics
include IPR, Privacy Concerns and how computers affect society.”
Select one:
True
False
Question 19
Correct
Flag question
Question text
Racial or ethnic origin is not a sensitive data?
Select one:
True
False
Question 20
Correct
Flag question
Question text
Data hiding analysis can also be performed. As the name implies, data hiding analysis searches
for hidden data on a system.
Select one:
True
False