#1
What is virtualization?
A process of simulating hardware or software to run multiple operating systems
ExplanationSimulating hardware or software to run multiple OSs.
#2
Which of the following is NOT a type of virtualization?
Physical Virtualization
ExplanationPhysical virtualization is not a valid type.
#3
What is the primary goal of computer forensics?
To investigate digital evidence for legal purposes
ExplanationInvestigating digital evidence for legal purposes.
#4
Which of the following is NOT a characteristic of virtualization?
Increased hardware dependency
ExplanationIncreased hardware dependency is not a characteristic.
#5
Which of the following is a benefit of using virtualization?
Reduced energy consumption
ExplanationVirtualization leads to reduced energy consumption.
#6
In computer forensics, what does RAM stand for?
Random Access Memory
ExplanationRAM stands for Random Access Memory.
#7
Which of the following is NOT a step in the computer forensics process?
System Shutdown
ExplanationSystem Shutdown is not a part of the process.
#8
Which of the following virtualization software is open-source?
Xen
ExplanationXen is an open-source virtualization software.
#9
Which of the following file systems is commonly used in computer forensics?
NTFS
ExplanationNTFS is commonly used in computer forensics.
#10
What is a hypervisor in the context of virtualization?
A software program that manages virtual machines
ExplanationSoftware managing virtual machines.
#11
What is steganography in the context of computer forensics?
A method of hiding data within other data
ExplanationHiding data within other data.
#12
What is the purpose of a write blocker in computer forensics?
To prevent accidental modification of evidence
ExplanationPreventing accidental modification of evidence.
#13
What does the term 'chain of custody' refer to in computer forensics?
The documentation of everyone who has had possession of the evidence
ExplanationDocumentation of evidence possession.
#14
Which of the following is an example of volatile data in computer forensics?
System logs
ExplanationExample: System logs.
#15
What is the purpose of volatile data analysis in computer forensics?
To investigate data stored in RAM
ExplanationInvestigating RAM-stored data.