Digital Forensics — MCQs

On this page

11 questions
12 chapters
Q1

A physician is accused of death threats via anonymous email. Investigation reveals the email was sent through multiple proxy servers and TOR network from a public WiFi location. The suspect's home computer shows no direct evidence. Evaluate which combination of digital artifacts would MOST conclusively link the suspect to the anonymous communication?

Q2

A hospital's electronic medical records system was allegedly tampered with to alter a patient's medication history before a medico-legal case. The accused claims system errors caused the changes. Multiple users have access. How would you BEST establish intentional tampering versus system malfunction?

Q3

An autopsy surgeon receives a laptop allegedly containing child pornography. Initial examination shows no illegal images in accessible folders, but forensic tools detect suspicious encrypted container files. Anti-forensic timestamp manipulation is suspected. Which analytical approach would provide the MOST legally defensible evidence?

Q4

A medical professional is accused of leaking confidential patient data via USB drive. Forensic examination reveals no files on the USB, but Registry analysis shows recent USB activity. File carving recovers deleted patient records. Which combination of artifacts would BEST establish the accused's intent and timeline?

Q5

During investigation of a cyberstalking case, a victim's smartphone was found formatted. Which technique would be MOST effective for recovering deleted WhatsApp conversations?

Q6

A 35-year-old male is accused of circulating morphed obscene images of a female colleague via email. The suspect's laptop was seized 10 days after the alleged incident. Which forensic approach would be MOST appropriate to establish the timeline of image creation?

Q7

How does steganography differ from encryption in the context of digital evidence concealment?

Q8

What is the principle behind slack space analysis in digital forensics?

Q9

Which hash algorithm is most commonly used for ensuring integrity of digital evidence in forensic investigations?

Q10

What is the primary purpose of write-blocking devices in digital forensics?

Want unlimited practice?

Get full access to all questions, explanations, and performance tracking.

Start For Free