Analysis of Digital Evidence Quiz Crafted By-
Geetam Shukla
Introduction to Analysis of Digital Evidence
Forensic digital analysis is the in-depth analysis and examination of electronically stored information (ESI), with the purpose of identifying information that may support or contest matters in a civil or criminal investigation and/or court proceeding. When the forensic analysis is the ultimate goal, it is imperative that the electronically stored evidence is treated with great care. The evidence must be preserved and nothing should be done that may alter the ESI during the analysis process. This is why the best legal result will be obtained by analyzing a forensic image or copy of the device as opposed to the original device or source. A source of digital evidence may be cloud-based as well.
Let's look at the questions and their answers.
Ques 1. A logon record tells us that, at a specific time:
a) An unknown person logged into the system using the account
b) The owner of a specific account logged into the system
c) The account was used to log into the system
d) None of the above
Answer-c) The account was used to log into the system
Ques 2. In terms of digital evidence, the Internet is an example of:
a) Open computer systems
b) Communication systems
c) Embedded computer systems
d) d. None of the above
Answer- b) Communication systems
Ques 3. The process of documenting the seizure of digital evidence and, in particular, when that evidence changes hands, is known as:
a) Chain of custody
b) Field notes
c) Interim report
d) None of the above
Answer- a) Chain of custody
Ques 4. When assessing the reliability of digital evidence, the investigator is concerned with whether the computer that generated the evidence was functioning normally, and:
a) Whether chain of custody was maintained
b) Whether there are indications that the actual digital evidence was tampered with
c) Whether the evidence was properly secured in transit
d) Whether the evidence media was compatible with forensic machines
Answer- b) Whether there are indications that the actual digital evidence was tampered with
Ques 5. Having a member of the search team trained to handle digital evidence:
a) Can reduce the number of people who handle the evidence
b) Can serve to streamline the presentation of the case
c) Can reduce the opportunity for opposing counsel to impugn the integrity of the evidence
d) All of the above
Answer- d) All of the above
Ques 6. Direct evidence establishes a:
a) Fact
b) Assumption
c) Error
d) Line of inquiry
Answer- a) Fact
Ques 7. According to the text, the most common mistake that prevents evidence seized from being admitted is:
a) Uninformed consent
b) Forcible entry
c) Obtained without authorization
d) None of the above
Answer- c) Obtained without authorization
Ques 8. A digital investigator pursuing a line of investigation in a case because that line of investigation proved successful in two previous cases is an example of:
a) Logical reasoning
b) Common sense
c) Preconceived theory
d) Investigator’s intuition
Answer- c) Preconceived theory
Ques 9. What are the three general categories of computer systems that can contain digital evidence?
a) Desktop, laptop, server
b) Personal computer, Internet, mobile telephone
c) Hardware, software, networks
d) Open computer systems, communication systems, embedded systems
Answer- d) Open computer systems, communication systems, embedded systems
Ques 10. A valid definition of digital evidence is:
a) Data stored or transmitted using a computer
b) Information of probative value
c) Digital data of probative value
d) Any digital evidence on a computer
Answer- c) Digital data of probative value