Document
Document
D. Manipulation of computer
data. Ans:D
Ans: A
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
D. All of the
above Ans: D
5. In the past, the method for expressing an opinion has been to frame a question
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros
(the document opens
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
created? A.1979
B.1984
C.1995
D.1989
Ans:B
9. When the field of PC forensics
began? A.1960's
B.1970's
C.1980's
D.1990's
Ans: C
A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of
Evidence Ans: C
11. phase includes putting the pieces of a digital puzzle together and
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation
phase Ans: D
12. In phase investigator transfers the relevant data from a venue out of physical
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation
phase Ans:B
Ans: C
B. A copy is made onto forensically sterile media. New media should always be
used if available.
the evidence.
Ans: A
15. To collect and analyze the digital evidence that was obtained from the
physical investigation
D. Deployment
phase. Ans: B
which phase?
C. Review phase.
D. Deployment
phase. Ans: D
17. Which phase entails a review of the whole investigation and identifies
area of improvement?
C. Review phase.
D. Deployment
phase Ans: C
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C
19. is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B
(ADFM) Ans: B
A. Crime
B. Security
C: Digital
Forensic D:
Evidence
Ans: D
23. is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Ǫuick lauch
C. OneLogin
D. Centrify
Ans: A
D. All of above
E. None of
above Ans: D
D. All of above
E. None of
above Ans: D
26. Which of following is a not unethical norm for Digital Forensics Investigation?
others. Ans: D
27. What is called as the process of creation a duplicate of digital media for
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
28. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C.ROM.
D.EMMC chip
Ans: D
29. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
32. searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
33. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
D. Deleting
files. Ans: C