- Other Question (76q)
- Q1. What is a bit-stream copy?
- Q2. The ARP table of a router comes in handy for Investigating network attacks, as the table c...
- Q3. Which of the following commands shows you the username and IP address used to access the s...
- Q4. International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the m...
- Q5. MAC filtering is a security access control methodology, where a ___________ is assigned to...
- Q6. Under no circumstances should anyone, with the exception of qualified computer forensics p...
- Q7. According to US federal rules, to present a testimony in a court of law, an expert witness...
- Q8. The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to r...
- Q9. Hard disk data addressing is a method of allotting addresses to each ___________of data on...
- Q10. File deletion is a way of removing a file from a computer's file system. What happens when...
- Q11. Which of the following is not a part of data acquisition forensics Investigation?...
- Q12. Data acquisition system is a combination of tools or processes used to gather, analyze and...
- Q13. Which device in a wireless local area network (WLAN) determines the next network point to ...
- Q14. Volatile information can be easily modified or lost when the system is shut down or reboot...
- Q15. Router log files provide detailed Information about the network traffic on the Internet. I...
- Q16. Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications...
- Q17. What is the goal of forensic science?
- Q18. Identify the attack from following sequence of actions? Step 1: A user logs in to a truste...
- Q19. Which one of the following is not a consideration in a forensic readiness planning checkli...
- Q20. Computer security logs contain information about the events occurring within an organizati...
- Q21. Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11 standar...
- Q22. A steganographic file system is a method to store the files in a way that encrypts and hid...
- Q23. Which of the following statements is incorrect related to acquiring electronic evidence at...
- Q24. Task list command displays a list of applications and services with their Process ID (PID)...
- Q25. Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. H...
- Q26. Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, "X...
- Q27. Digital evidence is not fragile in nature.
- Q28. Consistency in the investigative report is more important than the exact format in the rep...
- Q29. Depending upon the Jurisdictional areas, different laws apply to different incidents. Whic...
- Q30. Which of the following would you consider an aspect of organizational security, especially...
- Q31. Which of the following statements does not support the case assessment?...
- Q32. Computer security logs contain information about the events occurring within an organizati...
- Q33. Physical security recommendations: There should be only one entrance to a forensics lab...
- Q34. Log management includes all the processes and techniques used to collect, aggregate, and a...
- Q35. Injection flaws are web application vulnerabilities that allow untrusted data to be Interp...
- Q36. Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in...
- Q37. JPEG is a commonly used method of compressing photographic Images. It uses a compression a...
- Q38. Which of the following attacks allows attacker to acquire access to the communication chan...
- Q39. The Apache server saves diagnostic information and error messages that it encounters while...
- Q40. During the seizure of digital evidence, the suspect can be allowed touch the computer syst...
- Q41. Why is it Important to consider health and safety factors in the work carried out at all s...
- Q42. File signature analysis involves collecting information from the __________ of a file to d...
- Q43. What is a SCSI (Small Computer System Interface)?...
- Q44. When collecting electronic evidence at the crime scene, the collection should proceed from...
- Q45. When collecting evidence from the RAM, where do you look for data?...
- Q46. A computer forensic report is a report which provides detailed information on the complete...
- Q47. When dealing with the powered-off computers at the crime scene, if the computer is switche...
- Q48. SIM is a removable component that contains essential information about the subscriber. It ...
- Q49. Quality of a raster Image is determined by the _________________and the amount of informat...
- Q50. Which table is used to convert huge word lists (i .e. dictionary files and brute-force lis...
- Q51. Mobile phone forensics is the science of recovering digital evidence from a mobile phone u...
- Q52. In an echo data hiding technique, the secret message is embedded into a __________as an ec...
- Q53. Which of the following is not correct when documenting an electronic crime scene?...
- Q54. Digital photography helps in correcting the perspective of the Image which Is used In taki...
- Q55. The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS...
- Q56. Dumpster Diving refers to:
- Q57. What is a chain of custody?
- Q58. Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the cent...
- Q59. Attacker uses vulnerabilities in the authentication or session management functions such a...
- Q60. In what circumstances would you conduct searches without a warrant?...
- Q61. Ever-changing advancement or mobile devices increases the complexity of mobile device exam...
- Q62. LBA (Logical Block Address) addresses data by allotting a ___________to each sector of the...
- Q63. What is the first step that needs to be carried out to investigate wireless attacks?...
- Q64. Steganography is a technique of hiding a secret message within an ordinary message and ext...
- Q65. Which of the following steganography types hides the secret message in a specifically desi...
- Q66. When the operating system marks cluster as used, but does not allocate them to any file, s...
- Q67. Which of the following log injection attacks uses white space padding to create unusual lo...
- Q68. The disk in the disk drive rotates at high speed, and heads in the disk drive are used onl...
- Q69. At the time of evidence transfer, both sender and receiver need to give the information ab...
- Q70. SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates sou...
- Q71. An attack vector is a path or means by which an attacker can gain access to computer or ne...
- Q72. Centralized logging is defined as gathering the computer system logs for a group of system...
- Q73. Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a has...
- Q74. First responder is a person who arrives first at the crime scene and accesses the victim's...
- Q75. Subscriber Identity Module (SIM) is a removable component that contains essential informat...
- Q76. The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a m...
