CT2
CT2
Forensics?
(a)
(c)
(a)
(b)
(c)
(d)
(c)
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(a)
(c)
(c)
(a)
(c)
(a)
(c)
(a)
(c)
(a)
(c)
(b)
(c)
(d)
______ is the Rule of Digital
15
Forensics.
(a)
(b)
(c)
(d)
What is the Major goal of Digital
16
Forensics?
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(b)
(c)
(d)
The Digital Forensic investigation
20 process must be able to handle the
below obstacles ______.
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(a)
(c)
How many phases are in RMDFR
23
framework?
(a)
(c)
(a)
(c)
(a)
(c)
______ consists of finding and
26 collecting digital information that may
be relevant to the investigation.
(a)
(c)
(a)
(c)
(a)
(b)
(c)
(d)
The aim of ______ stage is to “draw
29
conclusions based on evidence found”.
(a)
(c)
(a)
(c)
(a)
(c)
32 IDIP stands for______.
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
What are the important parts of the
34 mobile device which used in Digital
forensic?
(a)
(c)
(a)
(b)
(c)
(d)
(a)
(c)
______ it involves the isolation,
37 securing and preserving the state of
physical and digital evidence.
(a)
(c)
(a)
(c)
(a)
(c)
(a)
(c)
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
______ the goal of these phases is to
collect and analyse the physical
44
evidence and reconstruct the actions
that took place during the incident.
(a)
(b)
(c)
(d)
(a)
(c)
(b)
(c)
(d)
(a)
(c)
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(a)
(c)
The ability to recover and read deleted
or damaged files from a criminal’s
51
computer is an example of a law
enforcement specialty called ______.
(a)
(c)
(a)
(c)
______ phase includes putting the
53 pieces of a digital puzzle together and
developing investigative hypotheses
(a)
(c)
(a)
(b)
(c)
(d)
(b)
(c)
(d)
(a)
(c)
(a)
(c)
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
Which of the following is the ethical
60 norms that should be satisfied by an
Investigator?
(a)
(b)
(c)
(d)
(e)
(f)
(c)
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(a)
(c)
(a)
(b)
(c)
(d)
Michael Anderson (b) John McCarthy
An examination should be
performed on the original data.
Storing data
Deleting files
An examination should never be
performed on the original media.
All of above.
To duplicate original data and
preserve original evidence and then
performing the series of
investigation by collecting,
identifying and validating digital
information for the purpose of
restructuring past events.
All of above.
Data may be stored in damaged
device, but the investigator searches
the data in working devices.
All of above.
Log files
Times-stamps
Preserving Evidence
Seizing Evidence
Admissibility of Evidence
Discovery of Evidence
SIM (b) RAM
Both a and b
None of above
Both a and b
None of above
Investigation Digital Crime
Review
Deployment
Stephenson
All of above
Running processes