You are on page 1of 8

CHAPTER 1 11.

These are people who were born before the


1. These are people who grew up into a world that was creation and widespread use of the internet and digital
already digital and spend a large amount of their lives technologies.
in cyberspace. b. Digital immigrants
d. Digital natives 12. It refers to any criminal activities which has been
2. The action of modifying technology, like alternation committed through the use of internet and/or computer.
of computer hardware or software, to allow to be used a. Digital crime
in innovative ways whether for legitimate or illegitimate 13. It is the continuous process of searching for
purposes. evidence and leads in cyberspace.
a. Crackers c. Cybercrime investigation
3. What law enacted the cybercrime prevention act of 14. The interactional environment created by linking
2012? computers together into a communication network.
d. RA 10175 a. Cyberspace
4. International cooperation to prevent and suppress 15. He is considered the creator of the 1st ramson ware
the proliferation of cybercrime needs mutual called the "AIDS Trojan in 1989.
assistance. What treaty is entered into by members of c. Joseph Popp
the Budapest Convention against 16. Computer data collected and examination by digital
b. Mutual Legal Assistance Treaty forensic investigators are called
5. They are considered the lowest life form of c. Digital evidence
cybercriminals because their 17. It is the science of locating, extracting, and
b. Use scripts authored by others to exploit analyzing different types of data from digital devices.
6. Of the following, which country is NOT a member of b. Computer forensics
the G8 nations? 18. The following are NOT the key elements computer
a. Australia forensics, EXCEPT:
7. A government agency designated as the central b. Ephemeral
authority in all matte that related to MLAT. 19. He who discovered that the whistle included in the
b. DOJ box of Cap'n Crunch can be used to hack the telephone
d. Ant-Cybercrime Group system of AT&T in the 1970s.
8. These are people who specialized in the c. John Draper
examination of computer datat prove the guilt of 20. It refers to code that causes damage to computer
suspected cybercriminals are appropriately called system.
c. Digital Forensic Analysts a. Virus
9. An attack attempts to prevent users for particular
service from effectivel using that service is called.
c. Denial of service
10. He is considered the creator of the 1st internet
worm in 1988.
a. Robert Morris Jr.
CHAPTER 2 8. A part of the computer that acts as the interface
between the device Motherboard
1. The correct answer is d. Bit. A bit is the smallest 9. The name"Juanito Dela Cruz" is equivalent to how
unit of data in a computer, and it can have only many bytes and bits 15 bytes or 120 bits
one of two values: 0 or 1. A bit is also called a 10. The piece of software that runs the specific
binary digit1. applications and provides an interface to the
2. The correct answer is b. File system. A file hardware components. .Operating system
system is the way in which data is organized and 11. It is considered as the basic language of
retrieved on a computer drive. It defines how files computers. Binary
are named, stored, and accessed, as well as the 12. The part of the computer where all other
structure and hierarchy of directories and computer components are connected.
folders2. Motherboard
3. The correct answer is a. Software blocker. A 13. A part of the computer responsible for all the
software blocker is an application that runs on the commands executed by the computer. Processor
operating system and implements a software 14. This is a storage device wherein there no moving
control to turn off the write capability of the parts and all data is save in computer chips. SSD
operating system. It is used to prevent any 15. This type of memory enables the CPU to
modification of the data on a storage device communicate with the hard disk and the
during forensic analysis3. input/output devices that are attached to the
4. The correct answer is a. Cloud computing. Cloud computer. BIOS
computing is an off-site third-party service that 16. For computers to be able to communication with
provides hosted applications or data storage for one another via the internet using the Network
an organization. It allows users to access Interface controller
computing resources over the internet, without 17. When powering a computer, the OS is loaded into
having to buy or maintain their own physical the_from the devices long-term memory Hard
servers or data centers4. drive
5. The correct answers are a. FAT system and d.
NTFS system. FAT and NTFS are two primary file
systems supported by Windows-based
computers. FAT stands for File Allocation Table, 18. The speed of the processor is determined by rate
and it is one of the oldest and simplest file of the: Hertz
systems, used by Microsoft operating systems 19. A memory that is an important part of the basic
since MS-DOS2. NTFS stands for New input/output system. Flash memory
Technology File System, and it is a newer and 20. This refers to the set of instructions written in a
more advanced file system, introduced by programming language Source code
Windows NT and used by all modern versions of
Windows
6. The character encoding standard for electronic
communication is ACSII
7. RAM contains volatile data because: he data are
temporarily kept for faster processing and needs
power to function properly.
CHAPTER 3 9. The number of months the integrity of traffic data assistance in the accomplishment of the CICC’s
1. The creator of the “I love your virus” was Onel De and subscriber information shall be kept, retained mandated tasks and functions3.
Guzman1. and preserved by a service provider from the date 20. The following are the powers and duties of law
2. For MLAT function in extraditing a fugitive from of the transaction is 6 months2. enforcement authorities where a search and
justice hiding in a country where the Philippines 10. The acquisition of a domain name over the seizure is properly issued by the competent
have a treaty is declared wanted by the court2. internet in bad faith to profit, mislead, destroy authority, EXCEPT: Confiscate all the computer
3. The intentional alteration, or reckless hindering or reputation, and deprive others from registering to be examined at the forensic computer
interference with the functioning of a computer or the same is called cybersquatting1. laboratory
computer network by inputting, transmitting, 11. The Philippines is the 56th member State of the
damaging, deleting, deteriorating, altering or Budapest Convention against cybercrimes1.
suppressing computer data or program is 12. Based on the DOJ advisory no.1, complaints
called system interference. involving violations of RA 10175 may be filed
4. The Budapest convention against cybercrime before the Prosecutor’s office for the conduct of
proposes that one of the ways to fight the requisite preliminary investigation pursuant to
cybercrimes is to develop skilled digital forensic Rule 112 of Revised Rules of Court2.
investigators, harmonized cybercrime laws of 13. If a crime defined and punished in the RPC was
members States, and provide consultancy on committed through the use of ICT, the penalty is 1
how to investigate cybercrime3. degree higher than provided in the RPC1.
5. The act of performing technical means without 14. Illegal access is considered the access to do
right of any non-public transmission of computer so. of the computer system without authority1.
data to, from, or within a computer system 15. The intentional acquisition, use, misuse, transfer,
including electromagnetic emissions from a possession, alteration or deletion of identifying
computer system carrying such computer data is information belonging to another, whether natural
called illegal interception1. or juridical, without right is called computer
6. A type of cybercrime warrant issued when a related identity theft
computer device or system is previously seized
by another lawful method, such as a warrantless 16. If the programmer of an ISP opened the account
arrest is called Warrant for Seizure and of a subscriber to correct its services. While
Examination of Computer Data (WSSECD)4. providing the necessary services discovered sex
7. The alteration or deletion of any computer data scandal and watched it, the programmer is liable
without right, resulting in inauthentic data, with for violation of privacy1.
the intent that it be considered or acted upon for 17. Using packet sniffing software and hardware to
legal purposes as if it were authentic, regardless monitor network traffic and intercept those
whether or not the data is directly readable and packets someone is interested in is considered
intelligible is called computer related forgery. as illegal interception2.
8. The cybercrime prevention act of 2012 was 18. A type of eavesdropping attack that occurs when
marred with petitions filed with the Supreme court a malicious actor inserts himself as a relay/proxy
to declare the said law unconstitutional on the into a communication session between people or
basis of its 21 questionable provision. However, systems is called man-in-the-middle2.
the Supreme Court ruled in favor of the law except 19. The following are NOT the powers and functions
for 2 sections1. of law enforcement authorities, EXCEPT: Call
upon any government agency to render
CHAPTER 4 11. The stage of a computer forensics investigation
in which an investigator explains and
1. The field that emerged due to the high documents the origin of the evidence and its
prevalence of crimes committed through the significance is d. Reporting.
internet and ICT is b. Digital forensics. 12. The option that is NOT a forensic application
2. To protect mobile devices from remote used in imaging and analyzing computer data
interference or command, one option is to b. is c. Graveyard snipper.
Use a faraday bag. 13. The process of making an exact copy (bit-by-
3. The best way to put marking like date, initials of bit) of the original drive onto a new digital
digital forensic analysts on the hard drives is storage device is b. Imaging.
using a b. Permanent marker. 14. The information that is NOT needed in
4. A write-blocker is a device that allows read-only requesting a cybercrime warrant is b. Names
access to all accessible data on a drive, as well of the investigator.
as preventing anything from being written to the 15. The term that is simply the location where an
original drive, which would alter or modify the incident took place or evidence is found with
original evidence. The correct answer is d. respect to digital evidence is a. Crime scene.
Write blocker. 16. When processing a live computer and there are
5. The process that refers to the interpretation and suspicious activities can be seen on the screen
reconstruction of the digital crime scene is b. that somehow files are being deleted, the digital
Analysis. forensic analysts should c. Disconnect the
6. The combination of written statements, reports, computer from the internet and cut the
and oral evidence documenting the power or hard shut down.
identification, lawful seizure, examination, and 17. The first “link” in the chain of custody in any
movement of evidence from the time of case is the c. Person collecting the digital
identification through presentation in court as evidence.
evidence is called b. Chain of custody. 18. The professionals who not only recover and
7. The sources that are rich in information of analyze evidence, but they also present and
evidentiary value that can assist practitioners in interpret its meaning to investigators, lawyers,
reconstructing transgressions are d. Computer and, ultimately, to the court are c. Forensic
and networks. analysts.
8. The programs that are also readily available for 19. The term that refers to where elements of the
private consumption, allowing users to offense occurred and may include the computer
sabotage their own system upon unauthorized network, local area network, metropolitan area
access are a. Self-destructive programs. network, wide area network, or cloud services
9. The plan that should include the availability of is d. Cyberspace
warrant to search, the depreservation request 20. After recording the search scene and force
to be given to internet service providers, seize shutting down the computer, the next procedure
and examine computer data to ensure its is to c. Bag and tag the digital evidence.
admissibility in court is b. Investigative plan.
10. A forensic model that is composed of three A’s
is d. acquisition, authenticate and analyze.
CHAPTER 5 are c. Interrogate the owner of the computer for commonly used in digital forensics to ensure that
the password and e. Force shutdown the the evidence is not tampered with or altered1.
computer. These are not recommended actions 10. To perform effective digital forensic analysis, the
1. The collection of nearly every incident response when dealing with a powered down computer, as forensic investigator must be familiar with all of
investigation to collect and preserve volatile they may compromise the integrity of the the above. The forensic investigator must have
evidence on a powered on computer is c. Live evidence or violate the rights of the owner. The knowledge and skills in various aspects of the
response. This is a type of computer forensics other options are valid considerations, such as digital forensic process, such as the examination
that involves capturing and analyzing data from a ensuring the computer device is off, removing process, the forensic applications, the cybercrime
running system without shutting it down or persons from the search scene, and refusing offer warrants, and the standard operating procedures
altering it1. of help from unauthorized persons2. of the office. These are all essential components
2. The option that is NOT one of the steps of incident 7. A computer system fundamentally has two of conducting a thorough and reliable digital
response is b. Image the monitor. This is not a sources of data that are of interest to a forensic forensic analysis4.
necessary or relevant step in the incident examiner (choose two answers). The correct 11. The step in the forensic examination where the
response process. The steps of incident answers are b. Volatile data and d. Nonvolatile digital forensic analyst explains and documents
response are usually: preparation, identification, data. Volatile data is the data that is stored in the the origin of the evidence and its significance is d.
containment, eradication, recovery, and lessons memory of the computer, such as RAM, cache, or Presentation step. This is the final step of the
learned2. registers. It is temporary and can be lost when the forensic examination, where the analyst prepares
3. Data remains in RAM as long as the computer power is off. Nonvolatile data is the data that is a report and presents the findings and
is d. Running. This is because RAM is a volatile stored in the permanent storage of the computer, conclusions to the relevant parties, such as the
memory that requires power to store data. Once such as hard disk, flash drive, or CD-ROM. It is investigators, the lawyers, or the court. The
the power is off, the data in RAM is lost3. persistent and can be retained even when the presentation step requires the analyst to
4. The term that describes a coordinated and power is off. Both types of data can contain communicate the evidence in a clear and
structured approach to go from incident detection valuable evidence for a forensic examiner3. understandable manner, and to support the
to resolution is d. Incident response. This is the 8. The contents of RAM may include artifacts of evidence with proper documentation and
process of managing and responding to security what is or has occurred on the system. This can references4.
incidents, breaches, and cyber threats in an include the following, EXCEPT: The correct 12. The first responders are responsible for the
effective and timely manner answer is c. Serial number of the computer. This acquisition step because this explores what
5. A hashing algorithm is a one-way cryptographic is not an artifact that is typically stored in the investigators should do when called to a scene to
function that accepts a message of any length as RAM, as it is a fixed identifier of the hardware of investigate a cybercrime. The correct answer is b.
input and returns as output a fixed- length digest the computer. The other options are possible First responder. The first responder is the person
value to be used for authenticating the original artifacts that can be found in the RAM, such as who arrives first at the scene of a cybercrime and
message. The correct answer is none of the typed commands, passwords, or encryption is responsible for securing and preserving the
above. All the options given are examples of keys. These can reveal information about the evidence. The acquisition step is the process of
hashing algorithms, but not the definition of a user’s actions, preferences, or credentials3. collecting and copying the digital evidence from
hashing algorithm. A hashing algorithm is a 9. The process of using a mathematical algorithm the scene, using proper tools and techniques. The
generic term that refers to any function that can against data to produce a numeric value that is first responder must follow the acquisition step to
produce a fixed-length output from a variable- representative of that data is b. Hashing. This is ensure that the evidence is not damaged, lost, or
length input, such as SHA-2, MD5, SHA-1, or the correct definition of hashing, which is a contaminated2.
MD61. technique used to verify the integrity and 13. The live response tool you choose should be
6. When dealing with a powered down computer, the authenticity of data. Hashing can produce a capable of collecting the following common live
following are the considerations, EXCEPT unique and fixed-length output, also known as a response data from a system, EXCEPT: The
(choose two answers): The correct answers hash or a digest, from any input data. Hashing is correct answer is a. The computer serial number.
This is not a common live response data that is 17. The tool that can make disk-to-image copies of
collected from a system, as it is not relevant to the evidence drives and enables you to acquire an
incident or the investigation. The other options evidence drive from a logical partition level or a
are examples of common live response data that physical drive level is d. FTK. FTK is one of the
can be collected from a system, such as the tools that can perform the task of data
operating system and version, the system time acquisition, which is the process of making an
and date, and the files and other open exact copy of the original evidence drive onto a
handles. These can provide useful information new digital storage device. FTK can acquire an
about the system’s configuration, state, and evidence drive from either a logical partition level,
activity1. which is a subdivision of a physical drive, or a
14. In incident response, after the RAM has been physical drive level, which is the entire drive4.
preserved, the next step is to c. Transport the 18. When a hard drive is hashed for verification
computer to the lab. This is the step where the purposes, the c. Hashing application looks at all
computer is carefully moved from the scene to of the data on the hard drive and creates a “digital
the forensic laboratory, where further analysis thumbprint” for it. A hashing application is a
can be performed. The computer must be software program that can perform the task of
transported in a safe and secure manner, hashing, which is the process of using a
following the chain of custody and the packaging mathematical algorithm against data to produce
guidelines. The other options are not the correct a numeric value that is representative of that
next steps, as they are either done before or after data. A hashing application can look at all of the
the transport step2. data on a hard drive and create a unique and
15. The incident responder can further minimize the fixed-length output, also known as a hash or a
risk to the computer data by using a sanitized d. digest, for it. This can be used to verify the
Storage device to introduce the incident integrity and authenticity of the data
response software. This is the step where the
incident responder uses a clean and trusted
storage device, such as a CD-ROM or a USB drive,
to load the incident response software onto the
system. The storage device must be sanitized,
meaning that it has been wiped and verified to
contain no malicious code or data. This can
prevent any contamination or infection of the
system or the evidence1.
16. FTK was developed by b. AccessData and is
intended to be a complete computer forensics
solution. FTK stands for Forensic Toolkit, and it is
a software application that can perform various
tasks related to digital forensics, such as data
acquisition, data analysis, data recovery, and data
reporting. FTK was developed by AccessData, a
company that specializes in digital forensics and
cybersecurity products and services4.
CHAPTER 6 8. The correct answer is b. File system. A file stands for SQL Server Analysis Services, a data
system is the way in which data is organized and analysis tool9. CaaS stands for Container as a
1. The correct answer is b. FAT system. FAT stands retrieved on a computer drive. It defines how files Service, a type of cloud service that provides
for File Allocation Table, and it is one of the oldest are named, stored, and accessed, as well as the container orchestration and management10. IAAC
and simplest file systems, used by Microsoft structure and hierarchy of directories and stands for Infrastructure as Code, a method of
operating systems since MS-DOS12. folders2. provisioning and managing IT infrastructure
2. The correct answer is a. PaaS. PaaS stands for 9. The correct answer is a. Software blocker. A through code11. The three basic cloud computing
Platform as a Service, and it is a type of cloud software blocker is an application that runs on the services are SaaS (Software as a Service), PaaS
service that provides a platform in the cloud with operating system and implements a software (Platform as a Service), and IaaS (Infrastructure
an operating system, development tools, and control to turn off the write capability of the as a Service)12.
middleware34. operating system. It is used to prevent any 14. The correct answer is b. Write-blocker. A write-
3. The correct answer is d. Disks. Hard disks are modification of the data on a storage device blocker is a tool that permits read-only access to
also called disks, and they are the most common during forensic analysis3. data storage devices without compromising the
type of magnetic storage device for computers56. 10. The correct answer is a. Cloud computing. Cloud integrity of the data. A write-blocker, when used
4. The correct answers are a. Platter and c. Head. A computing is an off-site third-party service that properly, can guarantee the protection of the data
hard disk consists of one or more platters, which provides hosted applications or data storage for chain of custody. It is a necessary component for
are circular disks coated with magnetic material, an organization. It allows users to access duplicating evidence from a computer hard drive
and one or more heads, which are devices that computing resources over the internet, without or other media storage device
read and write data to the platter surfaces having to buy or maintain their own physical
5. The correct answer is b. Cluster. A cluster is the servers or data centers4.
smallest unit of disk space allocation for a file 11. The correct answers are a. FAT system and d.
system. It consists of one or more contiguous NTFS system. FAT and NTFS are two primary file
sectors. A file system cannot save data in units systems supported by Windows-based
smaller than a cluster12. computers. FAT stands for File Allocation Table,
6. The correct answers are a. 2011 and e. 4096 and it is one of the oldest and simplest file
bytes. Advanced Format is a hard disk sector systems, used by Microsoft operating systems
format standard that exceeds 512 bytes per since MS-DOS2. NTFS stands for New
sector, frequently 4096 bytes (4 KB). It was Technology File System, and it is a newer and
introduced by the IDEMA Long Data Sector more advanced file system, introduced by
Committee in 2010, and the first hard drives using Windows NT and used by all modern versions of
it were shipped in 201134. Windows
7. The correct answer is c. Live forensics. Live 12. The correct answer is d. Bridges. Bridges, also
forensics is the examination of a powered on/live known as hardware write blockers, are devices
computer’s entire running system, including that allow read-only access to all accessible data
memory, disk, network, and processes. It can on a drive, as well as preventing anything from
capture volatile data that would be lost if the being written to the original drive, which would
system was shut down, and is useful for dealing alter or modify the original evidence. They are
with active network intrusions or malware56. The used to preserve the integrity and authenticity of
correct answer is d. Bit. A bit is the smallest unit digital evidence78.
of data in a computer, and it can have only one of 13. The correct answers are a. SSAS, e. CaaS, and c.
two values: 0 or 1. A bit is also called a binary IAAC. These are not cloud computing services,
digit1. but rather acronyms for other concepts. SSAS
CHAPTER 7 thought process as he searched for particular 16. The MRU list the last files opened by the
files. user. Answer: b. 65
1. This key tracks files that have been opened or saved o Answer: c. Windows searches 1. The MRU (Most Recently Used) list is a list of the
within a Windows shell dialog box a. MRU c. RecentDocs 6. The hive is the Security Accounts Manager and last 65 files that have been opened by the user in
b. OpenSavedPIDIMRU d. NTUSER.DAT contains login information about the users. Windows1.
o Answer: d. SAM 1.
Answer: b. OpenSavedPIDIMRU 7. The hive is the go-to hive for information related 17. Contains information about all the users who log
This key is also known as Open File Location History and to applications. on to computer, including both generic and user-
it stores the paths of files that have been recently opened o Answer: d. Software 1. specific information. Answer: c. HKEY USERS
or saved by the user1. The other keys are related to 8. It is a feature in windows wherein you can specify (HKU)
different aspects of the registry. search terms that start with certain letters, or that This key contains information about all the users who log
are phonetically like words you enter. on to the computer, including both generic and user-
2. A is typically stored in a single file on disk. a. Cluster o Answer: b. WordWheelQuery 1. specific information2. The other keys are related to
c. Registry b. Hive d. Sub-keys 9. A is a file that is not directly executed by the CPU different aspects of the registry.
and is created for a specific task.
Answer: c. Registry o Answer: d. Non-executable file 1. 18. The are an artifact associated with folders
A registry hive is a single file that contains one or more 10. The hive includes information on the hardware accessed by a user through the Windows Explorer
sub-keys and values1. A cluster is a group of sectors on a and system configuration. interface Answer: d. Shellbags
disk that can be accessed as a unit1. A hive can be stored o Answer: a. System 1. Shellbags are an artifact associated with folders
in different locations on the disk depending on its size 11. Describe file type, file extension and OLE accessed by a user through the Windows Explorer
and type1. A sub-key is a key within another root key1. information. interface3. They are used to store information about the
o Answer: a. HKEY CLASSES_ROOT folder’s view settings, such as the size and position of the
3. Contains user who is currently logged into windows (HKCR) 1. window, the sorting order, and the columns displayed3.
and their setting. a. HKEY_CLASSES_ROOT (HKCR) b. 12. It is a hierarchical database that stores The other options are not related to Windows Explorer.
HKEY CURRENT_USER (HKCU) c. HKEY information about users, installed application and
LOCAL_MACHINE (HKLM) d. HKEY the windows system itself. 19. Starting Windows 8, records a maximum of the
CURRENT_CONFIG (HKCC) o Answer: a. Windows registry 1. last applications. Answer: d. 4096
13. A are a relatively simple but valuable artifact for Starting from Windows 8, the operating system records a
Answer: b. HKEY CURRENT_USER (HKCU)
the forensics investigator. They are shortcut files maximum of the last 4096 applications that have been
This key contains information about the currently logged-
that link to an application or file commonly found launched by the user4. The other options are not related
in user, such as their profile name, password,
on a user’s desktop. to this feature.
environment variables, startup programs, and
o Answer: d. Lnk files 1.
preferences1. The other keys are related to different
14. The allow a user to quickly “jump” to or access
aspects of the system. 20. This key tracks the last directory a file is opened
files they recently or frequently used, usually by
or saved in for each application. Therefore, when
right clicking the application in the Windows
4. is the process of loading information from the hard you go to open a document, the MS Word dialog
taskbar.
drive into memory, before it is needed. a. Shellbags c. box opens the directory in which you last opened
o Answer: c. Jump list 1.
NTUSER.DAT d. User Assist b. prefetching or saved a word document. Answer: b.
15. The are lists of recently used programs or opened
OpenSavedPIDIMRU
Answer: d. User Assist b.prefetching files that the Windows operating system saves in
5. These are recorded in temporal order, an analyst the Windows Registry.
o Answer: c. RecentDocs 1.
can frequently see indications of the user’s

You might also like