What is Digital Forensic?
(A) Process of using scientific knowledge in analysis and presentation of  evidence in court
(B) The application of computer science and investigative procedures  for a legal purpose involving the analysis of digital evidence after  proper search authority, chain of custody, validation with  mathematics, use of validated tools, repeatability, reporting, and  possible expert presentation
(C) process where we develop and test hypotheses that answer  questions about digital events
(D) Use of science or technology in the investigation and establishment  of the facts or evidence in a court of law

1 Answer

Answer :

(B) The application of computer science and investigative procedures  for a legal purpose involving the analysis of digital evidence after  proper search authority, chain of custody, validation with  mathematics, use of validated tools, repeatability, reporting, and  possible expert presentation

Related questions

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : ___________ includes the identification, recovery, investigation, validation and presentation of facts regarding digital evidence found on computer and similar storage media devices. a. Analog forensic b. Digital forensic c. Cyber forensic

Last Answer : b. Digital forensic

Description : _______phase includes putting the pieces of a digital puzzle together and developing investigative hypotheses A. Preservation phase B. Survey phase C. Documentation phase D. Reconstruction phase E. Presentation phase

Last Answer : D. Reconstruction phase

Description : _______phase includes putting the pieces of a digital puzzle together and developing investigative hypotheses A. Preservation phase B. Survey phase C. Documentation phase D. Reconstruction phase E. Presentation phase 

Last Answer : D. Reconstruction phase 

Description : Which of the following is FALSE A. The digital forensic investigator must maintain absolute objectivity B. It is the investigator's job to determine someone's guilt or innocence. C. It is the ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : B. It is the investigator’s job to determine someone’s guilt or innocence.

Description : Which of the following is FALSE? a. The digital forensic investigator must maintain absolute objectivity b. It is the investigator's job to determine someone's guilt or innocence. c. It is ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : b. It is the investigator’s job to determine someone’s guilt or innocence.

Description : In which testing strategy requirements established during requirements analysis are validated against developed software? (A) Validation testing (B) Integration testing (C) Regression testing (D) System testing

Last Answer : (A) Validation testing

Description : The process of documenting the seizure of digital evidence and, in particular, when that Evidence changes hands, is known as: a. Chain of custody b. Field notes c. Interim report d. None of the above

Last Answer : a. Chain of custody

Description : Which of the following is FALSE? A. The digital forensic investigator must maintain absolute objectivity B. It is the investigator's job to determine someone's guilt or innocence. C. It is ... must maintain strict confidentiality, discussing the results of an investigation on only a need to know

Last Answer : B. It is the investigator’s job to determine someone’s guilt or innocence. 

Description : Ethical Issues in Digital Forensic means : a. Set of moral principals that regulate the use of computers b. Related to ethical hacking c. Honesty towards investigation d. Compliance with law

Last Answer : a. Set of moral principals that regulate the use of computers

Description :  _______can makes or breaks investigation. A. Crime B. Security C: Digital Forensic D: Evidence

Last Answer : D: Evidence 

Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms

Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic

Last Answer : b. Digital forensic

Description : What is the full form of EEDIP a. End to End Digital Investigation Program b. End to End Digital Investigation Process c. End to End Digital Forensic Investigation d. End to End Digital Forensic Investment

Last Answer : b. End to End Digital Investigation Process

Description : The meaning of the Historical method of research is Options: A) To employ scientific method in order to study the historical problems B) To establish relationship between historical facts and current events C) To make specific investigation of the past events D) All the above

Last Answer : D) All the above 

Description : The most glamorous form of journalism is known as: a) Court Reporting b) Police Reporting c) Forest Reporting d) Investigative Reporting

Last Answer : d) Investigative Reporting

Description : The national agency mandated to control, analyse and disseminate Suspicious Transaction Reports(STR), Cash Transaction Reports and counterfeit currency reports to various investigative agencies of the country after ... (IB) D. Central Bureau of Investigation(CBI) E. Central Intelligence Unit(CIU)

Last Answer : B. Financial Intelligence Unit(FIU) Explanation: The FIU is the national agency mandated to collect, analyse and disseminate Suspicious Transaction Reports (STRs), Cash Transaction Reports ... country after receiving it from banks and other financial intermediaries under a stipulated mechanism.

Description : Coverage based analysis is best described as: A. A metric used to show the logic covered during a test session providing insight to the extent of testing. B. A tool for documenting the unique ... their status through to resolution. D. The most traditional means for analyzing a system or a program

Last Answer : A. A metric used to show the logic covered during a test session providing insight to the extent of testing.

Description : What is the Long form of DFI A)Digital Forensic Investigation B)Digital Fraud Industry C)Defining Form In D)None

Last Answer : A)Digital Forensic Investigation

Description : The full form of DFI is : e. Digital Forensic Investigation f. Digitalized Forensic Investigation g. Digital Foreign Investment h. Direct Forensic Investigation

Last Answer : e. Digital Forensic Investigation

Description : What is the Long form of DFI A)Digital Forensic Investigation B)Digital Fraud Industry C)Defining Form In D)None

Last Answer : A)Digital Forensic Investigation

Description : .If specific information comes to an auditor's attention that implies the existence of possible illegal acts that could have a material, but indirect effect on-the financial statements, the auditor ... d. Discuss the evidence with the client's audit committee, or others with equivalent authority.

Last Answer : Apply audit procedures specifically directed to ascertaining whether an illegal act has occurred

Description : 1. Having a member of the search team trained to handle digital evidence: a. Can reduce the number of people who handle the evidence b. Can serve to streamline the presentation of the case ... the opportunity for opposing counsel to impugn the integrity of the Evidence d. All of the above

Last Answer : d. All of the above

Description : Which model of Investigation proposed by Carrier and Safford? A. Extended Model of Cybercrime Investigation (EMCI) B. Integrated Digital Investigation Process(IDIP) C. Road Map for Digital Forensic Research (RMDFR) D. Abstract Digital Forensic Model (ADFM)

Last Answer : B. Integrated Digital Investigation Process(IDIP) 

Description : If, while searching a computer for evidence of a specific crime, evidence of a new, Unrelated crime is discovered, the best course of action is: a. Abandon the original search, and ... a warrant that addresses the new inquiry d. Continue with the original search, ignoring the new information

Last Answer : c. Stop the search and obtain a warrant that addresses the new inquiry

Description : Qualitative research is often exploratory and has all of the following characteristics except: a. It is typically used when a great deal is already known about the topic of interest b. It ... hypotheses and develop theory about phenomena in the world d. It uses the inductive scientific method

Last Answer : a. It is typically used when a great deal is already known about the topic of interest

Description : Digital forensic applied both ……………. ? a. Analysis and response action b. Computer crime and civil action c. Criminal and civil action d. Regional and forensic action

Last Answer : c. Criminal and civil action

Description : Which of the following factors most likely would heighten an auditor's concern about the risk of fraudulent financial reporting? a. Large amounts of liquid assets that are easily ... of accounting principles. d. An overly complex organizational structure involving unusual lines of authority.

Last Answer : An overly complex organizational structure involving unusual lines of authority.

Description : An argument for including computer forensic training computer security specialists is: a. It provides an additional credential. b. It provides them with the tools to conduct their own investigations. c. It teaches them when it is time to call in law enforcement. d. None of the above.

Last Answer : c. It teaches them when it is time to call in law enforcement.

Description : Auditing includes both a(an) a. Evaluation process and a reporting process. b. Investigative process and a reporting process. c. Documentation process and an evaluation process. d. Documentation process and a reporting process

Last Answer : Investigative process and a reporting process.

Description : Management's assertions in the financial statements are relevant to the audit process because: a. They provide evidence that auditors have prepared financial statements in accordance with GAAP b ... with the applicable reporting criteria d. They relate to regulator's expectations about audit results

Last Answer : They include representations of financial statements in accordance with the applicable reporting criteria

Description : Management's assertions in the financial statements are relevant to the audit process because: a. They provide evidence that auditors have prepared financial statements in accordance with GAAP b ... with the applicable reporting criteria d. They relate to regulator's expectations about audit results

Last Answer : They include representations of financial statements in accordance with the applicable reporting criteria

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : What do you know about Forensic Science and Crime Scene Investigation?

Last Answer : Introduction Forensic Pathology

Description : All of forensic examination should be perform on a original digital evidence (a) True (b) False

Last Answer : (a) True

Description : Which of the following represents the step of scientific methodI- Develop hypothesis based on evidenceII- Calculate hash value of evidenceIII- Test the hypothesis to look for additional evidence IV-make an imaging of the original evidence A. All above B. I and III C. II and IV D. II, III and IV

Last Answer : B. I and III

Description : Which of the following represents the step of scientific method? I- Develop hypothesis based on evidence II- Calculate hash value of evidence III- Test the hypothesis to look for additional evidence IV-make an imaging of the ... a. I and IV b. I and II c. II, III and IV d. All of above

Last Answer : b. I and II

Description : The proper definition of a modern digital computer is A) An electronic automated machine that can solve problems involving words and numbers B) A more sophistic and modified electronic pocket calculator C) Any machine that can perform mathematical operations D) A machine that works on binary code

Last Answer : Answer : A

Description : When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a. technical/scientific. c. lay witness b. expert d. deposition

Last Answer : a. technical/scientific

Description : When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a. technical/scientific b. expert c. lay witness d. deposition

Last Answer : a.

Description : An audit of financial statements is conducted to determine if the a. Organization is operating efficiently and effectively b. Client's internal control is functioning as intended. c. ... d. Overall financial statements are stated in accordance with an identified financial reporting framework

Last Answer : Overall financial statements are stated in accordance with an identified financial reporting framework

Description : Which of the following is NOT focus of digital forensic analysis? A. Authenticity B. Comparison C. Proving D. Enhancement

Last Answer : C. Proving

Description : What is the full form of ADFM a. Abstract defining forensic model b. Abstract digital forensic model c. Abstract digital forensic media d. Analysis digital forensic mode

Last Answer : b. Abstract digital forensic model

Description : . Which of the following is NOT focus of digital forensic analysis? a. Authenticity b. Comparison c. Proving d. Enhancement

Last Answer : c. Proving

Description : Which is the process of gathering evidence supporting inferences based test scores? a. Validation b. Validity c. Reliability d. Prediction

Last Answer : a. Validation