Eti Assign 2
Eti Assign 2
ASSIGNMENT NO 2
CHAPTER 3
Q3. Who proposed Road Map for Digital Forensic Research (RMDFR)
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Q5. In the past, the method for expressing an opinion has been to frame a ____ question based
on available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Q6. More subtle because you are not aware that you are running these macros (the document
opens and the application automatically runs); spread via email
C. Derivative works
D. computer-specific crime
Q7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
A.1979
B.1984
C.1995
D.1989
A.1960's
B.1970's
C.1980's
D.1990's
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or evidence
in a court of law
A. Accessing the system's directories viewing mode and navigating through the various systems
files and folders
D. The investigator must maintain strict confidentiality, discussing the results of an investigation
on only a “need to know”
A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Q14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Q15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Q17. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Q18. To collect and analyze the digital evidence that was obtained from the physical
investigation phase, is the goal of which phase?
C. Review phase.
D. Deployment phase.
Q19. . To provide mechanism to an incident to be detected and confirmed is purpose of which
phase?
C. Review phase.
D. Deployment phase.
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Q21. ________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Q23. . Which of this is not a computer crime?
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
A. Crime
B. Security
C: Digital Forensic
D: Evidence
CHAPTER 4
Q26. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of
himself/herself behind, is:
Q27. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
A. Eye witness
C. Paper work
Q29. The process of ensuring that providing or obtaining the data that you have collected is
similar to the data provided or presented in a court is known as___________
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Q30. .When cases got to trial your forensics examiner play one of ____ role.
A. 2
B. 4
C. 3
D. 5
Q31. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
A. Routing tables
B. Main memory
C. Log files
D. Cached data
Q34. The digital evidence are used to establish a credible link between____________
Q36. What are the three general categories of computer systems that can contain digital
evidence?
B. Communication systems
C. Civil disputes
D. Offenders who are unaware of them leave behind more clues than they otherwise would
have.
Q40. Private networks can be a richer source of evidence than the Internet because:
Q41. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are used
to allocate corporate and government spending on combating computer-related crime.
D. Computer security professionals develop loose evidence processing habits that can make it
more difficult for law enforcement personnel and attorneys to prosecute an offender.
Q42. An argument for including computer forensic training computer security specialists is:
Q43. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
A. Oath affidavit
B. DNA samples
C. Fingerprint
D. Dried blood
Q45. When an incident takes place, a criminal will leave a hint evidence at the scene and
remove a hint from the scene which is called as ____________
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Substantial evidence
Q47. The evidences or proof can be obtained from the electronic source is called the
___________
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Q48. From the two given statements 1 and 2, select the correct option from a-d.
A. Flash memory
C. Process table
D. Arp cache
Q50. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This is
an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic