Digital Evidences
Digital Evidences
A) Any data stored or transmitted in digital form that can be used in court
B) Any handwritten document
C) Only images and videos collected from a crime scene
D) Only data found in computer hard drives
Answer: A) Any data stored or transmitted in digital form that can be used in court
A) Emails
B) Hard drive data
C) Handwritten notes
D) Network logs
A) It is difficult to store
B) It can be easily altered or tampered with
C) It is not considered reliable evidence
D) It is always encrypted
A) RAM data
B) Hard drive files
C) USB flash drive content
D) Cloud storage backups
A) RAM data
B) Browser cache
C) Hard drive data
D) Running processes
A) Browser history
B) RAM contents
C) External hard drive data
D) Server logs
A) Call logs
B) SMS messages
C) GPS location data
D) All of the above
17. What is the most common file system used in Windows computers for
storing digital evidence?
A) NTFS
B) ext4
C) HFS+
D) FAT16
Answer: A) NTFS
18. What is the first step when handling digital evidence?
A) Encryption of data
B) Data volatility
C) Physical degradation of paper records
D) Jurisdictional issues
A) Browser history
B) Firewall logs
C) Recycle bin data
D) USB file transfers
Answer: A) They provide details on when files were created, modified, or accessed
A) ISO 27037
B) GDPR
C) HIPAA
D) PCI DSS
Answer: C) It ensures the integrity of digital evidence by verifying that it has not been
altered
A) ISO 27001
B) ISO 9001
C) ISO 27037
D) ISO 14000
5. What does the Best Evidence Rule state regarding digital evidence?
A) Only original digital evidence or an exact copy should be used in court
B) Digital evidence is only admissible if printed
C) Handwritten notes are superior to digital evidence
D) Only encrypted evidence is allowed in court
Answer: A) Only original digital evidence or an exact copy should be used in court
Answer: B) The forensic method used must be scientifically tested and widely accepted
Answer: C) Stop and obtain legal authorization before using the evidence
Answer: C) Digital records must be authenticated and verified before being admitted in court
Answer: B) It creates an exact copy of the digital storage without altering the original
evidence
Answer: C) Some forms of it, like RAM data, disappear when power is lost
4. Why is the integrity of digital evidence crucial?
10. Digital evidence must be admissible in court. What are the key
requirements for admissibility?
A) RAM data
B) Hard drive files
C) USB drive contents
D) Cloud storage backups
A) Cache memory
B) Hard drive files
C) Running processes in RAM
D) Temporary browser history
A) Direct evidence
B) Indirect evidence
C) Embedded evidence
D) Volatile evidence
6. Which type of digital evidence includes emails, text messages, and chat
logs?
A) Active evidence
B) Network-based evidence
C) Communication-based evidence
D) Volatile evidence
7. Logs from firewalls and intrusion detection systems are classified as:
A) Hardware evidence
B) Software evidence
C) Network-based evidence
D) Cloud evidence
8. Deleted files that can be recovered using forensic tools are considered:
A) Browser history
B) Physical crime scene photos
C) GPS location data
D) System log files
Answer: B) The data format changes over time, making it hard to access
A) It cannot be duplicated
B) It disappears when the system is powered off
C) It does not require forensic analysis
D) Volatile evidence is always stored in hard drives