
Day 2 : FOR500 Quiz
Quiz by Gaurav Sharma
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
55 questions
Show answers
- Q1What is a primary purpose of Windows Event Logs in forensic investigations?To manage system updatesTo maintain backup copies of filesTo store user password hashesTo provide timestamps of system events30s
- Q2Which Windows feature allows forensic investigators to access previous versions of files?Disk CleanupPrevious VersionsSystem RestoreFile History30s
- Q3What file system artifact is essential for analyzing recently accessed files in Windows?Prefetch folderRecycle BinPagefileUser Assist registry key30s
- Q4Which tool is commonly used for analyzing memory dumps in Windows forensics?EnCaseVolatilityWiresharkFTK Imager30s
- Q5What is the significance of the Windows Pagefile in forensic investigations?It manages device driversIt stores user preferencesIt holds installation filesIt can contain remnants of deleted data30s
- Q6Which of the following artifacts can be analyzed to determine the last shutdown time of a Windows system?Windows registryPrefetch filesSystem event logRecovery partition30s
- Q7What is the primary function of the Windows Prefetch feature?To speed up application launch timesTo backup system filesTo clean temporary filesTo monitor user activity30s
- Q8Which of the following tools is specifically designed for analyzing NTFS file systems in a forensic context?Resource HackerWindows Event ViewerFTK ImagerProcess Explorer30s
- Q9In Windows forensics, what does the term 'Artifacts' refer to?Support files for applicationsPhysical hardware componentsBackup disk imagesResidual data left by user activity30s
- Q10What role does the Windows Registry play in digital forensics?Creates system backupsManages application installationsStores configuration settings and user preferencesMaintains a file index30s
- Q11Which Windows artifact provides information about user folder navigation and opened directories?$MFTShellbags$UsnJrnlPrefetch30s
- Q12What registry key provides evidence of USB devices connected to a Windows system?HKEY_LOCAL_MACHINE\SYSTEM\MountedDevicesHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTORHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Shell30s
- Q13Which event ID should be reviewed to confirm the creation of a new user account in the Security log?462447204670110230s
- Q14Which command would you use to list all available Volume Shadow Copies on a suspect system?wmic volume get shadowcopyidsc query vssvssadmin list shadowsnet share30s
- Q15What is the primary purpose of the Amcache.hve file in forensic analysis?To log user loginsTo track application execution data, including file metadata and execution countsTo record system errorsTo store browser history30s