Q1: What branch of forensics investigates cybercrime?
Q2: What is any information stored on a computer system used as evidence called?
Q3: What type of forensics involves analyzing data from computers?
Q4: What forensics focuses on investigating network traffic?
Q5: Which rule requires digital evidence to meet certain standards for court?
Q6: What must digital evidence be proven to be?
Q7: What record is kept for handling and preserving evidence?
Q8: What is the first step in collecting digital evidence?
Q9: What is the process of obtaining evidence without altering it called?
Q10: What should be done with digital evidence during analysis?
Q11: What process involves examining data for crime indicators?
Q12: Which challenge involves the risk of evidence being deleted?
Q13: What makes it harder to access data in cyberforensics?
Q14: Where do cybercriminals hide their activities?
Q15: What type of cyberattack encrypts data to demand payment?
Q16: What crime involves stealing sensitive information for political gain?
Q17: What role of cyberforensics helps in gathering evidence?
Q18: What role helps in identifying the perpetrators?
Q19: What helps understand the timeline of events in a cybercrime?
Q20: What is the key takeaway of cyberforensics?