Type Here to Get Search Results !

ETI 22618 mcq | Emerging Trend Diploma MSBTE mcq | TotalProgrammingCode

MSBTE Emerging Trend Diploma I Scheme MCQ

ETI 22618 mcq | Emerging Trend Diploma MSBTE mcq | TotalProgrammingCode

Q1.When the Federal Bureau of investigation was create ?.

A)1900                 

B)1980                 

C)19450              

D)1984


Q2.What is The Full form of CART

A)Computer Analysis and Response Team            

B) Cathode Analog Ray Tube

C)Computer Accessories Repairing team                

D)None


Q3 When IOCE is Formed

A)1992                 

B)1980                 

C)19490               

D)1995


Q4Full Form Of IOCE

A)International Organization on Computer Evidence       

B)Internet of Computer Education

C) Internet of Computer Evidence             

D)None


Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.

A)1992                 

B)1980                 

C)19490               

D)2000


Q6How Many Rules in Digital forensic

A)12                      

B)19                     

C)10      

D)6 


Q7. A valid definition of digital evidence is:


a.  Data stored or transmitted using a computer


b.  Information of probative value


c.  Digital data of probative value

d.  Any digital evidence on a computer 



Q8 How Many Phases in RDMDFR

A)12                      

B)19                     

C)10      

D)6


Q9 Investigator should satisfy the following point:

A)Contribute to the society and human being      

B)Avoid harm to others

C)honest and trustworthy                                          

D)All Of the Above


Q10 Who proposed Road Map Model

A)G. Gunsh                        

B)S. Ciardhuain                 

C)J. Korn              

D)G. Palmar



Q11 Which of the following is not type of volatile evidence:

A)Routing Tables              

B) Main Memory              

C)Log Files          

D) Cached Data


Q12 Digital Evidence must follow the  requirement of the

A)Ideal Evidence Rule      

B)Best Evidence Rule      

C)Exchange Rule         

D)All of the mentioned


Q13 White hat Hacker is known as the

A)Cracker            

B)Ethical             

C)Grey Hat          

D)Script Kiddies


Q14 What is an grey hat hacker

A)Black Hat Hacker          

B)White Hat Hacker   

C)Combination of White and black hat hackers 

D)None


Q15 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:

A)Phreaker         

B)Hacktivist        

C)Ethical hacker              

D)Grey Hat hacker 


Q16 Long Form of the VPN

A)Virtual Private Network           

B)Virtual Personal Network         

C)Both                 

D)None


Q17 Who are use their skill to identify security problem with computer network

A)Black Hat Hacker          

B)Ethical Hacker              

C)Grey Hat hacker           

D)Script Kiddies

 

Q18 To crack the password you need cracking tool such as:

A)LC4   

B)John The Ripper 

C)pwdump 

D)All of the above 


Q19 NMAP known as:

A)Network Mapper         

B)NetCat             

C)SuperScan                      

D)NetScan



20. An Artificial Intelligence system developed by Terry A. Winograd to permit an interactive dialogue about a domain he called blocks-world.

a.  SIMD

b.  STUDENT

c.  SHRDLU

d.  BACON


21. What is Artificial intelligence?

a.  Programming with your own intelligence

b.  Putting your intelligence into Computer

 c.Making a Machine intelligent

 d.Playing a Game

 

22. Who is the “father” of artificial intelligence?

a.John McCarthy

b.  Fisher Ada

c.  Allen Newell

 d.Alan Turning


23.Which of the following is a proposed means of testing the intelligence of the machine? Turing TestTurning TestTuning Test

a.Turing Test

b.Turning Test

c.Tuning Test

d.None


24.Which of the following is not a component of a production system?

a.Control System

b.Associative Memory

c.Primary Memory

d.Secondary Memory


25. Zero sum game has player…

a.  seven

b.  Two

c.three player

d. Multiplayer


26.Which one is used for compute the logical inference algorithm? a. Validity

b.Satisfiability

c. Logical equivalence

d.All of these

 

27.Single inference rule also called…

a.  Resolution

b. Reference

c.Reference

d.None of these 


28.Factoring means…

a.Removal of redundant literal

b.Removal of redundant variable

c.Addition of redundant variable

d.Addition of redundant literal 


29. Which of the following statements best describes a white-hat hacker?

     A. Security professional

     B. Former black hat

     C. Former grey hat

     D. Malicious hacker 

Answer 1. Option A.

30. A security audit performed on the internal network of an organization by the network administration is also known as ___________.

     A. Grey-box testing

     B. Black-box testing

     C. White-box testing

     D. Active testing

     E. Passive testing

Answer 2. Option C..

31. What is the first phase of hacking?

     A. Attack

     B. Maintaining access

    C. Gaining access

     D. Reconnaissance

     E. Scanning

Answer 3. Option D.

32. What type of ethical hack tests access to the physical infrastructure?

     A. Internal network

     B. Remote network

     C. External network

     D. Physical access

Answer 4. Option D

33. The security, functionality, and ease of use triangle illustrates which concept?

     A. As security increases, functionality and ease of use increase.

     B. As security decreases, functionality and ease of use increase.

     C. As security decreases, functionality and ease of use decrease.

     D. Security does not affect functionality and ease of use.

Answer 5. Option B.

 

34. Which type of hacker represents the highest risk to your network?

     A. Disgruntled employees

     B. Black-hat hackers

     C. Grey-hat hackers

     D. Script kiddies

Answer 6. Option A.

35. What are the three phases of a security evaluation plan? (Choose three answers.)

     A. Conduct Security Evaluation

     B. Preparation

     C. Conclusion

     D. Final

     E. Reconnaissance     

    F. Design Security

     G. Vulnerability Assessment 

Answer 7. Options A, B, C.

36. Hacking for a cause is called __________________.

     A. Active hacking

     B. Hacktivism

     C. Activism

     D. Black-hat hacking

Answer 8. Option B.

37. Which federal law is most commonly used to prosecute hackers?

     A. Title 12

     B. Title 18

     C. Title 20

     D. Title 2 Answer 9. Option B.

38. When a hacker attempts to attack a host via the Internet it is known as what type of attack?

     A. Remote attack

     B. Physical access

     C. Local access

     D. Internal attack

Answer 10. Option A. 


39. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ 

a) Black Hat hackers

b)  White Hat Hackers

c)  Grey Hat Hackers

d)  Red Hat Hackers

Answer: b

 

40. Which is the legal form of hacking based on which jobs are provided in IT industries and firms?

a)  Cracking

b)  Non ethical Hacking

c)  Ethical hacking

d)  Hactivism


Answer: c

 

41. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? 

a) Gray Hat Hackers

b)  White Hat Hackers

c)  Hactivists

d)  Black Hat Hackers

Answer: d

 

42. ________ are the combination of both white as well as black hat hackers.

a) Grey Hat hackers

b)  Green Hat hackers

c)  Blue Hat Hackers

d)  Red Hat Hackers

Answer: a

 

 

43. The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ 

a) Sponsored Hackers

b)  Hactivists

c)  Script Kiddies

d)  Whistle Blowers

Answer: c

 

44. Suicide Hackers are those _________

a)               who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

b)               individuals with no knowledge of codes but an expert in using hacking tools

c)               who know the consequences of their hacking activities and hence try to prevent them by erasing their digital footprints

d)               who are employed in an organization to do malicious activities on other firms

Answer: a

 

45. Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ 

a) State sponsored hackers

b)  Blue Hat Hackers

c)  Cyber Terrorists

d)  Red Hat Hackers

Answer: c

 

46. One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________ 

a) Sponsored hackers

b)  Crackers

c)  Hactivist

d)  Whistleblowers

Answer: d

 

47. These types of hackers are the most skilled hackers in the hackers’ community. Who are

“they” referred to?

a)  White hat Hackers

b)  Elite Hackers

c)  Licensed Penetration Testers

d)  Red Hat Hackers

Answer: b

 

48. _________ are those individuals who maintain and handles IT security in any firm or organization.

a)  IT Security Engineer

b)  Cyber Security Interns

c)  Software Security Specialist

d)  Security Auditor

Answer: a

 

49. Role of security auditor is to ____________

a)  secure the network

b)  probe for safety and security of organization’s security components and systems

c)  detects and prevents cyber attacks and threats to organization

d)  does penetration testing on different web applications

Answer: b


50. Having a member of the search team trained to handle digital evidence:

 

a.   Can reduce the number of people who handle the evidence

b.   Can serve to streamline the presentation of the case

c.   Can reduce the opportunity for opposing counsel to impugn the integrity of the

          Evidence

d.   All of the above


 

51.  An attorney asking a digital investigator to find evidence supporting a particular line of        Inquiry is an example of:

 

a.  Influencing the examiner

b.  Due diligence

c.  Quid pro quo

d.  Voir dire


52.  A digital investigator pursuing a line of investigation in a case because that line of      Investigation proved successful in two previous cases is an example of:

 

a.        Logical reasoning

b.       Common sense

c.        Preconceived theory

d.       Investigator’s intuition


53.  A scientific truth attempts to identify roles that are universally true. Legal judgment, on     The other hand, has a standard of proof in criminal prosecutions of:

 

a.        Balance of probabilities

b.       Beyond a reasonable doubt

c.        Acquittal

d.       None of the above


54.  Regarding the admissibility of evidence, which of the following is not a consideration:

 

a.        Relevance

b.       Authenticity

c.        Best evidence

d.       Nominally prejudicial


55.  According to the text, the most common mistake that prevents evidence seized from      Being admitted is:

 

a.        Uninformed consen

b.       Forcible entry

c.        Obtained without authorization

d.       None of the above

 

 

56.  In obtaining a warrant, an investigator must convince the judge on all of the following       Points except:

 

a.        Evidence of a crime is in existence

b.       A crime has been committed

c.        The owner or resident of the place to be searched is likely to have committed

         The crime

d.       The evidence is likely to exist at the place to be searched


57.  If, while searching a computer for evidence of a specific crime, evidence of a new,        Unrelated crime is discovered, the best course of action is:

 

a.        Abandon the original search, and pursue the new line of investigation

b.       Continue with the original search but also pursue the new inquiry

c.        Stop the search and obtain a warrant that addresses the new inquiry

d.       Continue with the original search, ignoring the new information


58.  The process of documenting the seizure of digital evidence and, in particular, when that      Evidence changes hands, is known as:

 

a.        Chain of custody

b.       Field notes

c.        Interim report

d.       None of the above


59.    Evidence contained in a document provided to prove that statements made in court are  True is referred to as:

  

a.        Inadmissible evidence

b.       Illegally obtained evidence

c.        Hearsay evidence

d.       Direct evidence


 60. Digital forensics is all of the except:  

A. Extraction of computer data.

B.  Preservation of computer data. 

C.  Interpretation of computer data. 

D.  Manipulation of computer data.

 Ans:D 


61. IDIP stands for 

A.  Integrated Digital Investigation Process.

B.  Integrated Data Investigator Process. 

C.  Integrated Digital Investigator Process. 

D.  Independent Digital Investigator Process.

 Ans: A

 

 62. Who proposed Road Map for Digital Forensic Research (RMDFR)  A. G.Gunsh.

B.  S.Ciardhuain 

C.  J.Korn. 

D.  G.Palmar 

Ans: D


 63. Investigator should satisfy following points:  A. Contribute to society and human being. 

B.  Avoid harm to others. 

C.  Honest and trustworthy. 

D.  All of the above 

Ans: D 

 

64. In the past, the method for expressing an opinion has been to frame a ____ question based on available factual evidence. 

A.  Hypothetical

B.  Nested 

C.  Challenging

D.  Contradictory

 Ans: A


 65. More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email 

A.  The purpose of copyright 

B.  Danger of macro viruses

C.  Derivative works

D.  computer-specific crime 

Ans: B


 66. There are three c's in computer forensics. Which is one of the three? 

A.  Control

B.  Chance

C.  Chains

D.  Core

 Ans: A


67.  When Federal Bureau Investigation program was created? 

A.1979 

B.1984 

C.1995

 D.1989 

Ans: B 


68.  When the field of PC forensics began?


 A.1960's 

B.1970's 

C.1980's 

D.1990's 

Ans: C


69.     _______phase includes putting the pieces of a digital puzzle together and developing investigative hypotheses 

A.  Preservation phase

B.  Survey phase 

C.  Documentation phase

D.  Reconstruction phase 

E.   Presentation phase

Ans: D


70. What is Artificial intelligence?

(A)       Putting your intelligence into Computer

(B)       Programming with your own intelligence

(C)       Making a Machine intelligent

(D)      Playing a Game

Ans: C


 

71. Which is not the commonly used programming language for AI?

(A)     PROLOG            

(B)     Java                  

(C)      LISP                  

(D)     Perl      

Ans: D

 

72. What is state space?

(A)      The whole problem

(B)       Your Definition to a problem

(C)       Problem you design

(ÄŽ)   Representing your problem with variable and parameter

Ans: D

 

73. A production rule consists of

(A)  A set of Rule               (B)  A sequence of steps


(C)  Both (a) and (b)          (D)  Arbitrary representation to problem

Ans: C

 

74. Which search method takes less memory?

(A)  Depth-First Search                         (B)  Breadth-First search

(C)  Both (A) and (B)                                (D)  Linear Search.

Ans: A

 

75.A heuristic is a way of trying

(A)       To discover something or an idea embedded in a program

(B)       To search and measure how far a node in a search tree seems to be from a goal

(C)        To compare two nodes in a search tree to see if one is better than the other

(D)       Only (a), (b) and (c).

Ans: D

 

76. A* algorithm is based on

(A)  Breadth-First-Search                         (B)  Depth-First –Search


(C)  Best-First-Search                               (D)  Hill climbing.

Ans: C

 

77. Which is the best way to go for Game playing problem?

(A)  Linear approach                                

(B)  Heuristic approach

(C)  Random approach    

(D)  Optimal approach

Ans: B


78. How do you represent “All dogs have tails”.

(A)   Û·x: dog(x)àhastail(x)                      

 (B)  Û·x: dog(x)àhastail(y)

(C)  Û·x: dog(y)àhastail(x)                        

(D)  Û·x: dog(x)àhasàtail(x)

Ans: A

 

79. Which is not a property of representation of knowledge?

(A)  Representational Verification          

 (B)  Representational Adequacy 

(C)  Inferential Adequacy                          

(D)  Inferential Efficiency

Ans: A


80. Embedded systems are_____ 

A. General purpose 

B. Special purpose 

Ans: B 

 

81. Embedded system is______ 

A. An electronic system 

B. A pure mechanical system 

C. An electro-mechanical system 

D. (A) or (C) 

Ans: D 

 

82. Which of the following is not true about embedded systems? 

A. Built around specialized hardware 

B. Always contain an operating system 

C. Execution behavior may be deterministic 

D. None of these 

Ans: D 

 

83. Which of the following is not an example of a “small-scale embedded system”? 

A. Electronic Barbie doll 

B. Simple calculator 

C. Cell phone 

D. Electronic toy car 

Ans: C 

 

84. The first recognized modern embedded system is  

A. Apple computer 

B. Apollo Guidance Computer (AGC) 

C. Calculator 

D. Radio navigation system 

Ans: B 

 

85. The first mass produced embedded system is  

A. Minuteman-I 

B. Minuteman-II 

C. Autonetics D-17 

D. Apollo Guidance Computer (AGC)  

Ans: C 

 

86. Which of the following is an (are) an intended purpose(s) of embedded systems? 

A. Data collection 

B. Data processing 

C. Data communication 

D. All of these 

Ans: D 

 

87. Which of the following is (are) example(s) of embedded system for data communication? 

A. Network router 

B. Digital camera 

C. Music player 

D. All of these 

Ans: B 

 

88. What are the essential tight constraint/s related to the design metrics of an embedded system? 

A. Ability to fit on a single chip 

B. Low power consumption 

C. Fast data processing for real-time operations 

D .All of the above 

Ans: D 

 

89. A digital multi meter is an example of an embedded system for 

A. Data communication 

B. Monitoring 

C. Control 

D. All of these 

Ans: B 

 

90. Digital forensics is all of them except: 

(A) Extraction of computer data. 

(B) Preservation of computer data. 

(C) Interpretation of computer data. 

(D) Manipulation of computer data. 

Ans:D 

 

91. IDIP stands for 

(A) Integrated Digital Investigation Process. 

(B) Integrated Data Investigator Process. 

(C) Integrated Digital Investigator Process. 

(D)Independent Digital Investigator Process. 

Ans: A 

 

92. Who proposed Road Map for Digital Forensic Research (RMDFR) 

(A)  G.Gunsh. 

(B) S.Ciardhuain 

(C) J.Korn. 

(D) G.Palmar 

Ans: D 

 

93. Investigator should satisfy following points: 

(A) Contribute to society and human being. 

(B) Avoid harm to others. 

(C) Honest and trustworthy. 

(D) All of the above 

Ans: D 

 

94. In the past, the method for expressing an opinion has been to frame a ____ question based on available factual evidence.  

(A) Hypothetical  

(B) Nested 

(C) Challenging  

(D) Contradictory  

Ans: A 

 

95. More subtle because you are not aware that you are running these macros  

(A) The purpose of copyright 

(B) Danger of macro viruses 

(C) Derivative works 

(D) computer-specific crime 

Ans: B 

 

96. There are three c's in computer forensics. Which is one of the three? 

(A) Control 

(B) Chance 

(C) Chains 

(D) Core 

Ans: A 

 

97. When Federal Bureau Investigation program was created? 

(A) 1979 

(B) 1984 

(C) 1995 

(D) 1989 

Ans: B 

 

98. When the field of PC forensics began? 

(A) 1960's 

(B) 1970's 

(C) 1980's 

(D) 1990's 

Ans: C 

 

99. What is Digital Forensic? 

(A) Process of using scientific knowledge in analysis and presentation of evidence in court 

(B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation 

(C) process where we develop and test hypotheses that answer questions about digital events 

(D) Use of science or technology in the investigation and establishment of the facts or evidence in a court of law 

Ans: B 


100. A valid definition of digital evidence is:

A.   Data stored or transmitted using a computer

B.   Information of probative value

C.   Digital data of probative value

D.   Any digital evidence on a computer

Ans: C

 


101. What are the three general categories of computer systems that can contain digital evidence?

A.   Desktop, laptop, server

B.   Personal computer, Internet, mobile telephone

C.   Hardware, software, networks

D.  Open computer systems, communication systems, and embedded systems 

Ans: D

 

102. In terms of digital evidence, a hard drive is an example of:

A.   Open computer systems

B.   Communication systems

C.   Embedded computer systems

D.  None of the above

Ans: A

 

103. In terms of digital evidence, a mobile telephone is an example of:

A.   Open computer systems

B.   Communication systems

C.  Embedded computer systems

D.   None of the above

Ans: C

 

104. In terms of digital evidence, a Smart Card is an example of:

A.   Open computer systems

B.   Communication systems

C.   Embedded computer systems

D.   None of the above

Ans: C

 

 

105. In terms of digital evidence, the Internet is an example of:

A.   Open computer systems

B.   Communication systems

C.   Embedded computer systems

D.   None of the above

Ans: B

 

106. Computers can be involved in which of the following types of crime?

A.   Homicide and sexual assault

B.   Computer intrusions and intellectual property theft

C.   Civil disputes

D.   All the above

Ans: D

 

107. A logon record tells us that, at a specific time:

A.   An unknown person logged into the system using the account

B.   The owner of a specific account logged into the system

C.   The account was used to log into the system

D.   None of the above

Ans: C

 

108. Cyber trails are advantageous because:

A.   They are not connected to the physical world.

B.   Nobody can be harmed by crime on the Internet.

C.   They are easy to follow.

D.  Offenders who are unaware of them leave behind more clues than they otherwise  would have.

Ans: D

 

109. Private networks can be a richer source of evidence than the Internet because:

A.   They retain data for longer periods of time.

B.   Owners of private networks are more cooperative with law enforcement.

C.   Private networks contain a higher concentration of digital evidence.

D.   All the above.

Ans: C

   

110. Ethical Hacking is also known as _____ 

A. Black Hat Hacking.

B.   White Hat Hacking.

C.   Encryption.

D.   None of these.

Ans. B

 

111. Tool(s) used by ethical hacker_____.

A.   Scanner

B.   Decoder

C.   Proxy

D.   All of these.

Ans. D

 

112. Vulnerability scanning in Ethical hacking finds_____.

A. Strengths.

B.   Weakness.

C.   A &B

D.  None of these.

Ans. B

 

113. Ethical hacking will allow to____ all the massive security breaches. 

A. Remove.

B.   Measure.

C.   Reject.

D.  None of these.

Ans. B

 

114. Sequential step hackers use are: _ _ _ _.

A. Maintaining Access.

B.  Reconnaissance

C.   Scanning.

D.   Gaining Access.

A.   B, C, D, A

B.   B, A, C, D

C.   A, B, C, D

D.  D, C, B, A

Ans. A

 

115. ______ is the art of exploiting the human elements to gain access to the authorized user.

A.   Social Engineering.

B.   IT Engineering.

C.   Ethical Hacking.

D.  None of the above.

Ans. A

 

116. Which hacker refers to ethical hacker? 

A. Black hat hacker.

B.   White hat hacker.

C.   Grey hat hacker.

D.  None of the above.

Ans. B

 

117. The term cracker refers to_____ A. Black hat hacker.

B.   White hat hacker.

C.   Grey hat hacker.

D.   None of the above.

Ans. A

 

118. Who described a dissertation on fundamentals of hacker’s attitude? 

A. G. Palma.

B.   Raymond.

C.   Either.

D.  Jhon Browman.

Ans. B

 

119.Computer Hackers have been in existence for more than a____. 

A. Decade.

B.   Year.

C.   Century

D.   Era.

Ans. C 


120. SNMP stands for_____

A.   Simple Network Messaging Protocol

B.   Simple Network Mailing Protocol

C.   Simple Network Management Protocol

D.   Simple Network Master Protocol

Ans: C

 

121. Which of the following tool is used for Network Testing and port


Scanning______

A.   NetCat

B.   SuperScan

C.   NetScan

D.   All of above

Ans: D


122. Banner grabbing is used for

A.   White Hat Hacking

B.   Black Hat Hacking

C.   Grey Hat Hacking

D.  Script Kiddies

Ans: A

 

123. An attacker can create an________attack by sending hundreds or thousands of e-mails a with  very large attachments.  

A. Connection Attack

B.   Auto responder Attack

C.   Attachment Overloading Attack

D.  All the above

Ans: B

 


124. Which of the following tool is used for Windows for network queries from DNS lookups to  trace routes?

A.   Sam Spade 

B.   SuperScan 

C.   NetScan 

D. Netcat

Ans: A

 

125. Which tool is used for ping sweeps and port scanning?

A.   Netcat

B.   SamSpade

C.   SuperScan

D.   All the above

Ans: C

 

126. Which of the following tool is used for security checks as port scanning and firewall testing?

A.   Netcat

B.   Nmap

C.   Data communication

D.  Netscan


Ans: A

 

127. What is the most important activity in system cracking?

A.   Information gathering

B.   Cracking password

C.   Escalating privileges

D.   Covering tracks

Ans: B

 

128. Which Nmap scan is does not completely open a TCP connection?

A.   SYN stealth scan

B.   TCP scan

C.   XMAS tree scan

D.  ACK scan

Ans: A

 

129.Key loggers are form of

A.   Spyware

B.   Shoulder surfing

C.   Trojan

D.  Social engineering

Ans: A 

 

130.is a branch of science which deals with helping machine find solution to complex to problem in a more human like a fashion. 

(a) Artificial intelligence  

(b) Internet   of think  

(c) Embided system 

(d) Cyber security 

 

131. Is a message that consist relavat meaning , implication , or input for decision and or action. 

(a) Data  

(b) Information  

(c) Knowledge  

(d) Intelligence 

 

132. The goal is for the software to use what is it is was learned in one area to solve problem in other area. 

(a) Machine learning  

(b) Deep learning  

(c) Neural network  

(d) All of above 

 

133.  What is Digital Forensic?

a.     Process of using scientific knowledge in analysis and presentation of evidence in court

b.     The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

c.      A process where we develop and test hypotheses that answer questions about digital events

d.     Use of science or technology in the investigation and establishment of the facts or evidence in a court of law


134.  Digital forensics is all of them except:

a.    Extraction of computer data.

b.   Preservation of computer data.

c.    Interpretation of computer data.

d.   Manipulation of computer data.


 

135.  Which of the following is NOT focus of digital forensic analysis?

a.      Authenticity

b.    Comparison

c.      Proving

d.     Enhancement



136.  Which of the following represents the step of scientific method?

I-       Develop hypothesis based on evidence

II-    Calculate hash value of evidence

III-  Test the hypothesis to look for additional evidence

 IV-make an imaging of the original evidence

a.     I and IV

b.     I and II

c.      II, III and IV

d.     All of above


 

137  What is the Primary Objectives of Digital Forensic for Business and Industry?

a.     Availability of service

b.     Prosecution

c.      Continuity of operation

d.     Security

 

 

138.  Which of the following is FALSE?

a.      The digital forensic investigator must maintain absolute objectivity

b.     It is the investigator’s job to determine someone’s guilt or innocence.

c.      It is the investigator’s responsibility to accurately report the relevant facts of a case.

d.     The investigator must maintain strict confidentiality, discussing the results of an

investigation on only a “need to know” 


 

139.  which is following father of computer forensics

a.      M. Anderson

b.     G. Gunsh

c.      S. Ciardhuain

d.     G. Palmar


 

140.  Who proposed Road map model?

a.      G. Gunsh

b.     S. Ciardhuain

c.      J. Korn

d.     G. Palmar


 

141.  IDIP stands for

a.      Integrated Digital Investigation Process

b.     Integrated Data Investigation Process

c.      Integrated Digital Investigator Process

d.     Independent Digital Investigation Process


 

142.     When you give ____ testimony, you present this evidence and explain what it is and how it was obtained.

a.       technical/scientific   

b.       expert       

c.       lay witness

d.       deposition



143.      A valid definition of digital evidence is:

a.  Data stored or transmitted using a computer

b.  Information of probative value

c.  Digital data of probative value

d.  Any digital evidence on a computer


144.      What are the three general categories of computer systems that can contain digital evidence? 

            a. Desktop, laptop, server

b.  Personal computer, Internet, mobile telephone

c.   Hardware, software, networks

d.  Open computer systems, communication systems, embedded systems


145.      In terms of digital evidence, a hard drive is an example of:

a.  Open computer systems

b.  Communication systems             

c.  Embedded computer systems

d.  None of the above


146.      In terms of digital evidence, a mobile telephone is an example of:

a.  Open computer systems

b.  Communication systems

c.  Embedded computer systems

d. None of the above


147.      In terms of digital evidence, a Smart Card is an example of:

a.  Open computer systems

b.  Communication systems

c.  Embedded computer systems

d.  None of the above


148.      Digital evidence alone can be used to build a solid case.

a.   True

b.   False


149.      Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology.

a.   Criminal investigation

b.   Prosecution

c.   Defense work

d.   All of the above


150.      An argument for including computer forensic training computer security specialists is:

a.   It provides an additional credential.

b.  It provides them with the tools to conduct their own investigations.

c.   It teaches them when it is time to call in law enforcement.

d.  None of the above.

 

151.      Digital evidence is only useful in a court of law.

a.   True

b.   False


152.  In terms of digital evidence, the Internet is an example of:

a.   Open computer systems

b.  Communication systems

c.   Embedded computer systems

d.  None of the above

 

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Below Post Ad