1
2
3
100

What is the definition of digital forensics? 

The process of uncovering digital evidence from electronic devices. 

100

What is the name of the internet browser that allows users to mask their browsing activity?

Tor

100

What will happen to the field of digital forensics as technology continues to evolve?

Digital forensics will also evolve with new tools and techniques

200

What is metadata?

Information about the information itself. 

200

List two types of files that forensic analysts can retrieve.

Emails, text messages, photos, documents, and other files that may have been intentionally or accidentally deleted. 

200

How can investigators and detectives access encrypted files? 

They must be unencrypted/cracked.

300

List two advantages to the use of digital forensics. 

Allows law enforcement to track and use evidence against criminals, can help individuals retrieve their personal information, can help prevent crimes such as cyberbullying, terrorism, and fraud, and can protect companies and entities from data breaches. 

300

List two disadvantages to the use of digital forensics. 

The equipment required is expensive and requires expertise, it can be time-consuming, it can be unreliable and inaccurate, it can invade someone's privacy, etc. 

300

In which kinds of court cases can digital forensics be used?

Criminal and civil

400

List three examples of evidence that may be used against a suspect in court. 

Internet browsing history, encrypted files, deleted files, etc. 

400

What is a common argument against the use of digital forensics? 

The right to privacy, the possibility of punishing an innocent person due to error, etc. 

400

List two examples of criminal cases in which digital forensics is commonly used.

Terrorism, fraud, cyberbullying, identity theft, intellectual property theft. 

500

Provide an example of a situation in which error by detectives leads an innocent person to go to prison?

Answers may vary. 

500

List two examples of software which may be used in data security or digital forensics?

Answers may vary. 

500

What part of an enterprise system may be vulnerable to criminal activity?

Any parts: network, applications, operating systems, storage media, etc.