Evidence
Forensic Basic/tool
Email/Mobile
Storage/Recovery
Security
Courtroom
100

Why should evidence media be write-protected?

To make sure data is not altered.

100

Which tool is commonly used to create forensic disk images?

FTK imager 

100

What files does Microsoft Outlook use to store email?

pst / .ost

100

What is unallocated space?

Deleted-data space/Unused storage 

  • Deleted files leave empty space behind
  • New drive setup may have unused capacity
  • Partition changes can create free gaps
100

What affects brute-force cracking most?

Password length

100

What should a report explain besides findings?

Significance

200

What is chain of custody?

A documented record of who handled evidence, when, where, and why.

200

Name one forensic tool that can process evidence and reveal artifacts such as emails, internet history, and file activity.

Magnet AXIOM (also acceptable: Autopsy)

200

What is a Faraday bag used for?

Block signals/ Isolate from network/Prevent Remote Wiping 

200

What verifies evidence integrity?

Hashing

200

Least secure cloud model?

Public cloud

200

The most reliable way to ensure that jurors recall testimony  

Present evidence combining oral testimony and graphics that support the testimony.

300

Why create two forensic images instead of one?

To ensure one good backup copy exists if the other becomes damaged or corrupted.

300

 What is the primary goal of digital forensics?

To collect, preserve, analyze, and present digital evidence.

300

What can remote wipe do?

Delete data/Factory Reset

1. Removing account information

2. Returning the phone to the original factory settings

3. Deleting contacts


300

Name two hashing algorithms.

MD5 / SHA-1

300

Why use strong passwords?

Harder to crack

300

what do you mean by Voir dire 

The process of qualifying a witness as an expert

400

What is the purpose of hashing in digital forensics?

To validate integrity and prove evidence has not changed.

400

What does “forensically sound” mean?

Evidence is collected in a way that preserves integrity and is defensible.

400

Why isolate a seized phone?

Prevent remote access/wiping

400

What can duplicate image files of different sizes indicate?

Steganography

400

What attack guesses many passwords?

Brute force


400

When using graphics while testifying, which of the following guidelines applies?

Make sure the jury can see your graphics.

Your exhibits must be clear and easy to understand.

Practice using charts for courtroom testimony.


500

Investigator accidentally changes file metadata during analysis. Why is this serious?

Evidence integrity is compromised, making findings less reliable or inadmissible.

500

What happens if evidence handling cannot be documented?

Evidence credibility may be challenged in court.

500

First action when phone is ON?

Isolate from network

500

What signs on a suspect drive might suggest hidden data inside image files?

  1. Steganography programs in the suspect's All Programs list

  2. Graphics files with the same name but different file sizes

  3. Multiple copies of a graphics file




500

What is the best password practice for user

Long passphrase

500

If new technology or evidence changes your understanding, what should an expert witness do?

Update or revise their opinion based on new evidence.

600

What is one major limitation of a virtual machine running on a host computer?

Virtual machines are limited to the host computer's peripheral configurations, such as mouse, keyboard, CD/DVD drives, and other devices.

600

This is considered the most critical aspect of digital evidence because it proves the data has not changed.

VALIDATION 

600

What forensic tools can isolate a mobile phone from network signals and prevent remote access?

Faraday bags and shielded containers (such as paint cans)

600

What is the difference between data recovery and digital forensics?

Data recovery retrieves lost files; digital forensics investigates and interprets digital evidence

600

This security practice keeps forensic workstations isolated from outside networks during examinations.

No direct Internet connection / network isolation

600

What are the key responsibilities of a digital forensics lab manager?

knowing the lab objectives 

Making necessary changes in lab procedures and software

Ensuring that staff members have enough training to do the job

M
e
n
u