The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

1 Answer

Answer :

A)Digital Evidence

Related questions

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : The evidence or proof that can be obtained from the electronic source is called the ……… a. Digital evidence b. Demonstrative evidence c. Explainable evidence d. Substantial evidence

Last Answer : a. Digital evidence

Description : The evidences of proof that can be obtained from the electricity source is called the (a) Digital evidence (b) Demonstrative evidence (c) Explainable evidence (d) Substantial evidence

Last Answer : (a) Digital evidence

Description : Digital evidences are also called as : a. Digital proof b. Evidence c. Hidden Truth d. Electronic Evidence

Last Answer : d. Electronic Evidence

Description : Physical evidence is also called as. a. Illustrative evidence b. Explainable evidence c. Substantial evidence d. Real evidence

Last Answer : c. Substantial evidence

Description : What are the Form of Electronic Evidence: A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : What are the Form of Electronic Evidence: A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : 1 Digital Evidence in the form of the: A)Office File B)E-mail Messages C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : Proof of electronic signature defined in_____of evidence act a) Section 65 A,& 65 B b) Section 64 A,& 64 B c) Section 65 d) Section 67A

Last Answer : d) Section 67A

Description : Rule of evidence is called as …………. a. Digital Evidence b. Law of Evidence c. Hidden Evidence d. Electronic Evidence

Last Answer : b. Law of Evidence

Description : An audit program provides proof that a. Sufficient appropriate evidence was obtained. b. The work was adequately planned. c. There was a proper study and evaluation of internal control. d. There was compliance with generally accepted standards of reporting

Last Answer : The work was adequately planned.

Description : You must have both ____ and ____ to validate your evidence. a. Proof and victim b. Power and skill c. Power and proof d. Proof and skill

Last Answer : b. Power and skill

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the abov

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital Evidences d. None of the above.

Last Answer : c. Private networks contain a higher concentration of digital Evidences

Description : Private networks can be a richer source of evidence than the Internet because: A. They retain data for longer periods of time. B. Owners of private networks are more cooperative with law enforcement. C. Private networks contain a higher concentration of digital evidence. D. All the above.

Last Answer : C. Private networks contain a higher concentration of digital evidence.

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Which one is not a 103 rule of evidence a. Maintaining a claim of error b. Aim of an offer of proof c. Plain error taken d. Destroying data

Last Answer : d. Destroying data

Description : . Which one is not a 103 rule of evidence a. Maintaining a claim of error b. Aim of an offer of proof c. Plain error taken d. Destroying data

Last Answer : d. Destroying data

Description : To collect and analyze the digital evidence that was obtained from the physical investigation phase, is the goal of which phase? A. Physical crime investigation B. Digital crime investigation. C. Review phase. D. Deployment phase.

Last Answer : B. Digital crime investigation. 

Description : Evidence in the form of the: A)Office File B)E-mail Messages C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : What is an E - mail: a) An electronic mail that established person to person connectivity b) It enables us to communicate at any time of the day or night from any location c) Both (a) and (b) d) Either (a) or (b) e) Only (b) f) Neither (a) nor (b) g) Only (a)

Last Answer : c) Both (a) and (b)

Description : Best Evidence Rule states that a. It states that multiple copies of electronic files may be a part of the original or equivalent to the original. b. It states that copy of evidence may be ... that multiple copies of electronic files may be a part of the original or same as original.

Last Answer : It states that multiple copies of electronic files may be a part of the “original” or equivalent to the “original.”

Description : When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a. technical/scientific. c. lay witness b. expert d. deposition

Last Answer : a. technical/scientific

Description : When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a. technical/scientific b. expert c. lay witness d. deposition

Last Answer : a.

Description : Evidence contained in a document provided to prove that statements made in court are True is referred to as: a. Inadmissible evidence b. Illegally obtained evidence c. Hearsay evidence d. Direct evidence

Last Answer : c. Hearsay evidence

Description : According to the text, the most common mistake that prevents evidence seized from Being admitted is: a. Uninformed consen b. Forcible entry c. Obtained without authorization d. None of the above

Last Answer : c. Obtained without authorization

Description : Power for the electronic digital multimeter is normally supplied by what internal power source?

Last Answer : Rechargeable batteries.

Description : The instruments by which the court is convinced of a fact is called a) Document b) Evidence c) Proof d) Witness

Last Answer : b) Evidence

Description : Is a fine-tuned universe evidence of intelligent design and therefore proof of Gods existence?

Last Answer : Not according to Stephen Hawking. It is a result if imperfections and randomness.

Description : What proof or evidence is there for evolution?

Last Answer : I confess that I am ignorant of proof for evolution. Please enlighten me.

Description : Proof of signature and handwriting defined in ____of evidence act. a) Section 65 A,& 65 B b) Section 64 A,& 64 B c) Section 65 d) Section 67

Last Answer : d) Section 67

Description : Proof of documents by primary evidence defined in sec ____of Evidence Act a) 62 b) 63 c) 64 d) 65

Last Answer : c) 64

Description : Section 60 of Indian Evidence Act is a) Proof of facts by oral evidence b) Secondary evidence c) Oral evidence must be direct d) Proof of contents of documents

Last Answer : c) Oral evidence must be direct

Description : Section 59 of Indian Evidence Act is- a) Proof of facts by oral evidence b) Secondary evidence b) Oral evidence must be direct d) Proof of contents of documents

Last Answer : a) Proof of facts by oral evidence

Description : When one fact is declared by this Act to be conclusive proof of another, the Court  shall, on proof of the one fact, regard the other as proved, and shall not allow evidence to  be given for the purpose of disproving it a) May presume b) Conclusive proof c) Shall presume d) None of these

Last Answer : b) Conclusive proof

Description : Mark the correct option a) All statements which the court permits or requires to be made before it by  witnesses, in relation to matters of fact under inquiry such statements are called  oral evidence b) ... documentary evidence c) Both the A and B are correct d) Neither A nor B are correct.

Last Answer : c) Both the A and B are correct

Description : The first electronic general purpose digital computer built by Eckert and Mauchly called ENIAC did not work on the stored program concept. How many numbers could it store in its internal memory? A) 100 B) 20 C) 40 D) 80

Last Answer : Answer : B

Description : Video Surveillance can be form of Digital evidence a. True b. False

Last Answer : a. True

Description : Digital Evidence is only useful in court of law a. True b. False

Last Answer : b. False

Description : In term of Digital evidence, the internet is an example of a. Open computer System b. Communication System c. Embedded Computer System d. None of the above

Last Answer : b. Communication System

Description : 3. In term of Digital evidence, a mobile telephone is an example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : c. Embedded Computer System

Description : In term of Digital evidence, a hard drive is example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : a. Open Computer System

Description : . A Valid Definition of Digital Evidence is a. Data Stored or transmitted using a computer b. Information of Probative value c. Digital dada of probative Value d. Any digital evidence on compute

Last Answer : c. Digital dada of probative Value

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems