Description : 5. What is the Primary Objectives of Digital Forensic for Business and Industry A. Availability of service B. Continuity of operation C. Prosecution D. Security
Last Answer : A. Availability of service
Description : What is the Long form of DFI A)Digital Forensic Investigation B)Digital Fraud Industry C)Defining Form In D)None
Last Answer : A)Digital Forensic Investigation
Description : _______can makes or breaks investigation. A. Crime B. Security C: Digital Forensic D: Evidence
Last Answer : D: Evidence
Description : An argument for including computer forensic training computer security specialists is: a. It provides an additional credential. b. It provides them with the tools to conduct their own investigations. c. It teaches them when it is time to call in law enforcement. d. None of the above.
Last Answer : c. It teaches them when it is time to call in law enforcement.
Description : . What are the important parts of the mobile device which used in Digital forensic? A. SIM B. RAM C. ROM. D.EMMC chip
Last Answer : D.EMMC chip
Description : Which of the following is FALSE A. The digital forensic investigator must maintain absolute objectivity B. It is the investigator's job to determine someone's guilt or innocence. C. It is the ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba
Last Answer : B. It is the investigator’s job to determine someone’s guilt or innocence.
Description : Which of the following is NOT focus of digital forensic analysis? A. Authenticity B. Comparison C. Proving D. Enhancement
Last Answer : C. Proving
Description : . Does database forensic include in Digital Forensic application A. True B. False
Last Answer : A. True
Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : How Many Rules in Digital forensic A)12 B)19 C)10 D)6
Last Answer : D)6
Description : Who proposed the UML Modelling of Digital Forensic Process Model a. Kohn, Eloff and Oliver b. Response Team c. Only (a) d. None of the above
Last Answer : a. Kohn, Eloff and Oliver
Description : Ethical Issues in Digital Forensic means : a. Set of moral principals that regulate the use of computers b. Related to ethical hacking c. Honesty towards investigation d. Compliance with law
Last Answer : a. Set of moral principals that regulate the use of computers
Description : What is the full form of EEDIP a. End to End Digital Investigation Program b. End to End Digital Investigation Process c. End to End Digital Forensic Investigation d. End to End Digital Forensic Investment
Last Answer : b. End to End Digital Investigation Process
Description : The full form of DFI is : e. Digital Forensic Investigation f. Digitalized Forensic Investigation g. Digital Foreign Investment h. Direct Forensic Investigation
Last Answer : e. Digital Forensic Investigation
Description : Which of the following sciences pay vital role in criminal justice systems ? a. Digital Forensics b. Forensic Science c. PC Forensics d. INTERPOL Forensic
Last Answer : b. Forensic Science
Description : Digital forensic is all of them except: a. Extraction of computer data b. Preservation of computer data c. Interpretation of computer data d. Manipulation of computer data
Last Answer : b. Preservation of computer data
Description : The whole process is trigged by ………….. a. Investigator b. Society c. Digital forensic d. Criminal activity
Last Answer : d. Criminal activity
Description : What is the full form of ADFM a. Abstract defining forensic model b. Abstract digital forensic model c. Abstract digital forensic media d. Analysis digital forensic mode
Last Answer : b. Abstract digital forensic model
Description : Digital forensic applied both ……………. ? a. Analysis and response action b. Computer crime and civil action c. Criminal and civil action d. Regional and forensic action
Last Answer : c. Criminal and civil action
Description : Which of the following is FALSE? a. The digital forensic investigator must maintain absolute objectivity b. It is the investigator's job to determine someone's guilt or innocence. c. It is ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba
Last Answer : b. It is the investigator’s job to determine someone’s guilt or innocence.
Description : . Which of the following is NOT focus of digital forensic analysis? a. Authenticity b. Comparison c. Proving d. Enhancement
Last Answer : c. Proving
Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : All of forensic examination should be perform on a original digital evidence (a) True (b) False
Last Answer : (a) True
Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : Who proposed Road Map for Digital Forensic Research (RMDFR) (A) G.Gunsh. (B) S.Ciardhuain (C) J.Korn. (D) G.Palmar
Last Answer : (D) G.Palmar
Description : Who proposed Road Map for Digital Forensic Research (RMDFR) A. G.Gunsh. B. S.Ciardhuain C. J.Korn. D. G.Palmar
Last Answer : D. G.Palmar
Description : Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology. a. Criminal investigation b. Prosecution c. Defense work d. All of the above
Last Answer : d. All of the above
Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above
Last Answer : (d) all the above
Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity
Last Answer : Data Integrity
Description : Which of the following are the objectives of Rashtriya Uchchatar Shiksha Abhiyan (RUSA)? (a) To improve the overall quality of state institutions. (b) To ensure adequate availability of quality faculty. (c) To create new institutions through ... (c) (C) (a), (c) and (d) (D) (a), (b) and (d)
Last Answer : Answer: B
Description : When the method of wound healing is one in which wound edges are not surgically approximated and integumentary continuity is restored by granulations, the wound healing is termed a) ... of wound edges is delayed and integumentary continuity is restored by bringing apposing granulations together.
Last Answer : a) second intention healing. When wounds dehisce, they will be allowed to heal by secondary intention.
Description : Which of the following defines the objectives of CERSAI? A. Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002. B. Companies Act, 1956 C. Banking Regulation Act, 1949 D. Both (A) and (B) E. None of these
Last Answer : A. Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002. Explanation: The object of the company is to maintain and operate a Registration System ... Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002. (SARFAESI Act).
Description : The auditor's understanding of the entity and its environment consists an understanding of the following aspects: a. Industry, regulatory and other external factors, including the applicable financial reporting ... may result in a material misstatement of the financial statements d. All of these.
Last Answer : All of these.
Description : PSA requires that the auditor should obtain an understanding of the entity's objectives and strategies, and the related business risks that may result in material misstatement of the financial statements. ... receivables. b. Contracting economy. c. New accounting requirements. d. Use of new IT
Last Answer : Contracting economy.
Description : Which of the following are essentially required to make a business case for content marketing? a. Industry best practices. b. Objectives and KPIs. c. Impacts and challenges. d. All of the above
Description : To make the business case for Content Marketing, you must present: A. Your objectives and KPIs. B. Your challenges and impact. C. Industry best practices. D. All of the above
Last Answer : D. All of the above
Description : What are Computer Forensic Services? What are some popular Digital forensic tools?
Last Answer : Computer forensic services are the study and examination of digital media or material specifically for the use of litigation. One common tool used is Encase. Law enforcement uses it to ... com/computer-forensics-tools/#gref https://resources.infosecinstitute.com/7-best-computer-forensics-tools/#gref
Description : Abstract Digital Forensic model in a) 2000 b) 2001 c) 2002 d) 2003
Last Answer : c) 2002
Description : Who proposed Abstract Digital Forensic Model a) G.Gunsh b) S.Ciardhuain c) Kohn , Eloff d) G.Palmar
Last Answer : d) G.Palmar
Last Answer : a) G.Gunsh
Description : Does database forensic include in Digital Forensic application a) True b) False
Last Answer : a) True
Description : ADFM stands for _________ a. Analog digital forensic model b. Abstract digital forensic model c. Analytical digital forensic model
Description : RMDFR stands for_______ a. Roll map for digital forensic research. b. Road map for digital forensic research. c. Road model for digital forensic research.
Last Answer : b. Road map for digital forensic research.
Description : ___________ includes the identification, recovery, investigation, validation and presentation of facts regarding digital evidence found on computer and similar storage media devices. a. Analog forensic b. Digital forensic c. Cyber forensic
Last Answer : b. Digital forensic
Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic
Description : What are the important parts of the mobile device which used in Digital forensic? A. SIM B. RAM C. ROM. D.EMMC chip
Description : Which model of Investigation proposed by Carrier and Safford? A. Extended Model of Cybercrime Investigation (EMCI) B. Integrated Digital Investigation Process(IDIP) C. Road Map for Digital Forensic Research (RMDFR) D. Abstract Digital Forensic Model (ADFM)
Last Answer : B. Integrated Digital Investigation Process(IDIP)