Icon New game New game
Get Academic Plan
Get Academic Plan
Get Academic Plan

Computer Forensics Revision 01

Crossword Puzzle

(2)
For September 2022 semester.

Download the paper version to play

Recommended age: 18 years old
16 times made

Created by

Malaysia

Top 10 results

  1. 1
    05:25
    time
    100
    score
  2. 2
    15:00
    time
    40
    score
  3. 3
    ddd
    ddd
    02:08
    time
    16
    score
Do you want to stay in the Top 10 of this game? to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Crossword Puzzle

Computer Forensics Revision 01Online version

For September 2022 semester.

by Aidora Abdullah
1

Cyber forensics activities include the __________ of computer-based information to courts of law.

2

A __________ incident team structure is a distributed team, whereby the central team provides guidance and advice, but does not have authority over the teams.

3

The characteristic of digital evidence known as __________ refers to the point that evidence must be related to the fact being proved.

4

Corporate _________ is the selling sensitive or proprietary company information to a competitor.

5

________ network vulnerabilities occur due to the over-extension of bandwidth and bottlenecks.

6

On a Windows machine, the index.dat file is used by the Internet Explorer web browser as an active __________, which runs as long as a user is logged on Windows.

7

A search __________ is a legal document authorizing a police officer or other official to enter and search premises.

8

Email _________ is the act of sending huge volumes of emails to an address in an attempt to overflow the mailbox where the email address is hosted to cause a denial of service attack.

9

With regards to image files forensics, __________ graphics use geometrical primitives such as points, lines and curves; which are all based upon mathematical equations to represent images in the computer.

10

__________ passwords can present a significant barrier when digital investigators need to boot a computer from a floppy disk to collect evidence from a computer.

5
6
7
8
2
3
1
10
9
educaplay suscripción