Digital forensics is all of them except:
a. Extraction of computer data.
b. Preservation of computer data.
c. Interpretation of computer data.
d. Manipulation of computer data.

1 Answer

Answer :

d. Manipulation of computer data.

Related questions

Description : Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data.

Last Answer : (D) Manipulation of computer data.

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data.

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data. 

Description : Digital forensic is all of them except: a. Extraction of computer data b. Preservation of computer data c. Interpretation of computer data d. Manipulation of computer data

Last Answer : b. Preservation of computer data

Description : Computer forensics do not involve_____activity. A. Preservation of computer data. B. Exraction of computer data. C. Manipulation of computer data. D. Interpretation of computer data.

Last Answer : C. Manipulation of computer data. 

Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Description : The basic role of promotion is A)information. B)manipulation. C)communication. D)interpretation.

Last Answer : C)communication.

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing

Last Answer : B.Steganogrhy.

Description : Fill in the blanks. Digital Forensics is a series of steps to _________ and _________ electronic data through ________ method. a. Solve, analyses, Intelligent b. Uncover, analyses, scientific c. Uncover, analyses, electronic d. Solve, analyses, electronic

Last Answer : b. Uncover, analyses, scientific

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6

Last Answer : d. 6

Description : Which of the following sciences pay vital role in criminal justice systems ? a. Digital Forensics b. Forensic Science c. PC Forensics d. INTERPOL Forensic

Last Answer : b. Forensic Science

Description : . How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6

Last Answer : d. 6

Description : There are hoe many phases in RMDFR model of digital forensics? a. Four b. Six c. Eight d. Ten

Last Answer : b. Six

Description : Which of the following is not a model of digital forensics? a. RMDFR b. DFI c. IDIP d. UMDFPM

Last Answer : b. DFI

Description : There are how many models of digital forensics? a. 4 b. 5 c. 6 d. 8

Last Answer : c. 6

Description : How many Rules are there of Digital Forensics? a. 5 b. 6 c. 7 d. 4

Last Answer : b. 6

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : Which of following is not a rule of digital forensics? A. An examination should be performed on the original data B. A copy is made onto forensically sterile media. New media should always be used ... D. The examination must be conducted in such a way as to prevent any modification of the evidence.

Last Answer : A. An examination should be performed on the original data 

Description : _______phase includes putting the pieces of a digital puzzle together and developing investigative hypotheses A. Preservation phase B. Survey phase C. Documentation phase D. Reconstruction phase E. Presentation phase

Last Answer : D. Reconstruction phase

Description : A modern electronic computer is a machine that is meant for A) Doing quick mathematical calculations B) Input, storage, manipulation and outputting of data C) Electronic data processing D) Performing repetitive tasks accurately

Last Answer : Answer : B

Description : Errors in computer results could be due to 1) encoding of data 2) transmission of data 3) manipulation of data 4) all of the above

Last Answer : 4) all of the above

Description : Who is the father of Computer Forensics? a. Anderson b. Palmer c. Ciardhuain d. Korn

Last Answer : a. Anderson

Description : which is following father of computer forensics a. M. Anderson b. G. Gunsh c. S. Ciardhuain d. G. Palmar

Last Answer : a. M. Anderson

Description : Forensics is the systematic trucking of incoming and outgoing ruffic on your network (a) Network (b) Computer (c) Criminal (d) Server

Last Answer : d) Server

Description : There are three c's in computer forensics. Which is one of the three? (A) Control (B) Chance (C) Chains (D) Core

Last Answer : A) Control

Description : There are three c's in computer forensics. Which is one of the three? A. Control B. Chance C. Chains D. Core

Last Answer : A. Control

Description : Masters in Cyber security and digital forensics vs security certifications like CISSP,OHCP?

Last Answer : answer:

Description : what training is required for a digital forensics job?

Last Answer : The required training for a digital forensics job would include Computer Forensics Core Competencies, Windows Forensics Essentials, as well as Computer Forensics Fundamentals.

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others. 

Description : What is the interpretation of this dream ? I dreamed today that the administrator of Ans Bangla had blocked me and the administrator of Inles had sent a message in a private message that there would be a ... . Note that I have no interest in any other site except Ans Bangla to be active in them.

Last Answer : You have to explain the matter psychologically. Look , dreams are nothing , it's just a little bit of thinking all day long. As students dream in their sleep before the exam , most of them dream that "I ... I was able to explain to you today. But I believe , you have understood my words. Thank you!

Description : Mark correct option related to preservation period a) Nominal roll cum attendance & destruction of record register is permanent b) All records of registration and parcel dept except foreign article is 1 year c) All records ... 1 ½ year, IPO 42 months, Book of MO receipt is 2 years e) All the above

Last Answer : e) All the above

Description : Mark correct option related to preservation period a) All records of mail department except due mail & sorting list 1 year b) Book of post marks(MS 18) & Postman book (MS-27) 1 ½ year c) Enumeration returns (MS-6) 2 years d) All monthly statistical registers 3 years e) All of the above

Last Answer : e) All of the above

Description : If some information is available on paper but you want to transferred it to the hard disc of the computer for further manipulation, which device you will use: a) Photoshop b) Scanner c) Printer d) None of These

Last Answer : b) Scanner

Description : _______phase includes putting the pieces of a digital puzzle together and developing investigative hypotheses A. Preservation phase B. Survey phase C. Documentation phase D. Reconstruction phase E. Presentation phase 

Last Answer : D. Reconstruction phase 

Description : Computer based record keeping system is known as (a) Data Manipulation System -Technology

Last Answer : (d) DBMS is a collection of programs that enable the user to create and maintain the database. Also, it is a computer-based record keeping system.

Description : In data transfer manipulation designing as instruction set for a system isa complex_ a. Art b. System Cc. Computer d. None of these

Last Answer : a. Art

Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accuratel

Last Answer : Input, storage, manipulation and outputting of data

Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accurately

Last Answer : b. Input, storage, manipulation and outputting of data

Description : Field of PC forensics began in which year ? a. 1975 b. 1944 c. 1971 d. 1980

Last Answer : d. 1980

Description : Field of PC forensics began in which year ? a. 1975 b. 1944 c. 1971 d. 1980

Last Answer : d. 1980

Description : When cases go to trial, you as a forensics examiner can play one of ____ roles. a. 2 c. 4 b. 3 d.5

Last Answer : a. 2

Description : When was pc forensics began? a. 1980 b. 1984 c. 1995 d. 1997

Last Answer : a. 1980

Description : When cases go to trial forensics examiner can play one of role (a) 2 (b) 4 (c) 3 (d) 5

Last Answer : (b) 4

Description : When the field of PC forensics began? (A) 1960's (B) 1970's (C) 1980's (D) 1990's

Last Answer : (C) 1980's

Description : When the field of PC forensics began? A.1960's B.1970's C.1980's D.1990's

Last Answer : C.1980's

Description : Each of the following statements is true regarding the risk management plan except  for which one?  A. The risk management plan is an output of the Risk Management Planning process. B. The risk ... and budgets. D. The risk management plan is an input to all the remaining risk-planning processes.

Last Answer : B. The risk management plan includes a description of the responses to risks and  triggers.

Description : The steps of the Historical method of research are given in a jumbled state. Select them in a scientific order from the following options 1. Identification of the problem. 2.Criticism of data 3. Interpretation of data 4. Collection of data ... B) 1, 2, 3 and 4 C) 1, 3, 2 and 4 D) 4, 3, 2 and 1

Last Answer : A) 1, 4, 3 and 2 

Description : How many types of basically Data manipulation: 1 2 3 ap 4

Last Answer : 3

Description : Which is data manipulation types are. a. Arithmetic instruction b. Shift instruction c. Logical and bit manipulation instructions d. All of these

Last Answer : d. All of these