#1
What is virtualization?
A process of simulating hardware or software to run multiple operating systems
ExplanationSimulating hardware or software to run multiple OSs.
#2
Which of the following is NOT a type of virtualization?
Physical Virtualization
ExplanationPhysical virtualization is not a valid type.
#3
What is the primary goal of computer forensics?
To investigate digital evidence for legal purposes
ExplanationInvestigating digital evidence for legal purposes.
#4
Which of the following is NOT a characteristic of virtualization?
Increased hardware dependency
ExplanationIncreased hardware dependency is not a characteristic.
#5
Which of the following is a benefit of using virtualization?
Reduced energy consumption
ExplanationVirtualization leads to reduced energy consumption.
#6
What is a snapshot in virtualization?
A copy of the virtual machine's current state
ExplanationSnapshot: Copy of current VM state.
#7
In computer forensics, what does RAM stand for?
Random Access Memory
ExplanationRAM stands for Random Access Memory.
#8
Which of the following is NOT a step in the computer forensics process?
System Shutdown
ExplanationSystem Shutdown is not a part of the process.
#9
Which of the following virtualization software is open-source?
Xen
ExplanationXen is an open-source virtualization software.
#10
Which of the following file systems is commonly used in computer forensics?
NTFS
ExplanationNTFS is commonly used in computer forensics.
#11
What is a hypervisor in the context of virtualization?
A software program that manages virtual machines
ExplanationSoftware managing virtual machines.
#12
What is the role of a forensic investigator in a criminal case?
To collect and analyze digital evidence
ExplanationCollecting and analyzing digital evidence.
#13
Which of the following is a challenge in computer forensics?
Lack of trained personnel
ExplanationChallenge: Lack of trained personnel.
#14
What is live forensics in computer forensics?
Collecting evidence from running systems without altering their state
ExplanationCollecting evidence without altering system state.
#15
Which of the following is a disadvantage of virtualization?
Potential performance overhead
ExplanationPotential performance overhead is a disadvantage.
#16
In computer forensics, what does the term 'hash value' refer to?
A numerical representation of a file's content
ExplanationNumeric representation of file content.
#17
What is containerization in virtualization?
A method of isolating applications and their dependencies
ExplanationIsolating apps and dependencies.
#18
What is the primary goal of volatile data collection in computer forensics?
To preserve data stored in RAM
ExplanationPreserving RAM-stored data.
#19
Which of the following is a common technique used to analyze disk images in computer forensics?
Imaging
ExplanationCommon technique: Imaging.
#20
What is steganography in the context of computer forensics?
A method of hiding data within other data
ExplanationHiding data within other data.
#21
What is the purpose of a write blocker in computer forensics?
To prevent accidental modification of evidence
ExplanationPreventing accidental modification of evidence.
#22
What does the term 'chain of custody' refer to in computer forensics?
The documentation of everyone who has had possession of the evidence
ExplanationDocumentation of evidence possession.
#23
Which of the following is an example of volatile data in computer forensics?
System logs
ExplanationExample: System logs.
#24
What is the purpose of volatile data analysis in computer forensics?
To investigate data stored in RAM
ExplanationInvestigating RAM-stored data.