Description : Which model of Investigation proposed by Carrier and Safford? A. Extended Model of Cybercrime Investigation (EMCI) B. Integrated Digital Investigation Process(IDIP) C. Road Map for Digital Forensic Research (RMDFR) D. Abstract Digital Forensic Model (ADFM)
Last Answer : B. Integrated Digital Investigation Process(IDIP)
Description : There are hoe many phases in RMDFR model of digital forensics? a. Four b. Six c. Eight d. Ten
Last Answer : b. Six
Description : RMDFR stands for_______ a. Roll map for digital forensic research. b. Road map for digital forensic research. c. Road model for digital forensic research.
Last Answer : b. Road map for digital forensic research.
Description : What is the Long form of DFI A)Digital Forensic Investigation B)Digital Fraud Industry C)Defining Form In D)None
Last Answer : A)Digital Forensic Investigation
Description : The full form of DFI is : e. Digital Forensic Investigation f. Digitalized Forensic Investigation g. Digital Foreign Investment h. Direct Forensic Investigation
Last Answer : e. Digital Forensic Investigation
Description : Who proposed Road Map for Digital Forensic Research (RMDFR) (A) G.Gunsh. (B) S.Ciardhuain (C) J.Korn. (D) G.Palmar
Last Answer : (D) G.Palmar
Description : Who proposed Road Map for Digital Forensic Research (RMDFR) A. G.Gunsh. B. S.Ciardhuain C. J.Korn. D. G.Palmar
Last Answer : D. G.Palmar
Description : . IDIP stand for a. Integrated digital investigation process b. Integrated data investigation process c. Integrated digital investigator process d. None of the above
Last Answer : a. Integrated digital investigation process
Description : IDIP stands for a. Integrated Digital Investigation Process b. Integrated Data Investigation Process c. Integrated Digital Investigator Process d. Independent Digital Investigation Process
Last Answer : a. Integrated Digital Investigation Process
Description : IDIP stands for (A) Integrated Digital Investigation Process. (B) Integrated Data Investigator Process. (C) Integrated Digital Investigator Process. (D)Independent Digital Investigator Process. Ans: A
Last Answer : (A) Integrated Digital Investigation Process.
Description : IDIP stands for A. Integrated Digital Investigation Process. B. Integrated Data Investigator Process. C. Integrated Digital Investigator Process. D. Independent Digital Investigator Process.
Last Answer : A. Integrated Digital Investigation Process.
Description : IDIP stands for a) Integrated Digital Investigation Process b) Integrrated Digital Investigator Process c) Integrated Digital Investigator Process d) Independent Digital Investigator Process
Last Answer : a) Integrated Digital Investigation Process
Description : IDIP stands for ______ a. Investigated digital Integration process b. Integrated digital investigation process c. Inherited digital investigation process
Last Answer : b. Integrated digital investigation process
Description : Which of the following is an apex financial institution for housing? A. AIFI B. NHB C. DFI D. Both (A) and (B) E. None of the Above
Last Answer : B. NHB Explanation: NHB is an apex financial institution for housing. NHB has been established with an objective to operate as a principal agency to promote housing finance institutions both at local and regional levels.
Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing
Last Answer : B.Steganogrhy.
Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.
Last Answer : D. To respect the privacy of others.
Description : How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6
Last Answer : d. 6
Description : Which of the following sciences pay vital role in criminal justice systems ? a. Digital Forensics b. Forensic Science c. PC Forensics d. INTERPOL Forensic
Last Answer : b. Forensic Science
Description : . How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6
Description : There are how many models of digital forensics? a. 4 b. 5 c. 6 d. 8
Last Answer : c. 6
Description : Fill in the blanks. Digital Forensics is a series of steps to _________ and _________ electronic data through ________ method. a. Solve, analyses, Intelligent b. Uncover, analyses, scientific c. Uncover, analyses, electronic d. Solve, analyses, electronic
Last Answer : b. Uncover, analyses, scientific
Description : How many Rules are there of Digital Forensics? a. 5 b. 6 c. 7 d. 4
Last Answer : b. 6
Description : Digital forensics is all of them except: a. Extraction of computer data. b. Preservation of computer data. c. Interpretation of computer data. d. Manipulation of computer data.
Last Answer : d. Manipulation of computer data.
Description : Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data.
Last Answer : (D) Manipulation of computer data.
Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.
Last Answer : D. Manipulation of computer data.
Description : What is the full form of DFI ?
Last Answer : DFI 's full development Financing Institution.
Description : Masters in Cyber security and digital forensics vs security certifications like CISSP,OHCP?
Last Answer : answer:
Description : what training is required for a digital forensics job?
Last Answer : The required training for a digital forensics job would include Computer Forensics Core Competencies, Windows Forensics Essentials, as well as Computer Forensics Fundamentals.
Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing
Last Answer : B. Steganography.
Description : Which of following is not a rule of digital forensics? A. An examination should be performed on the original data B. A copy is made onto forensically sterile media. New media should always be used ... D. The examination must be conducted in such a way as to prevent any modification of the evidence.
Last Answer : A. An examination should be performed on the original data
Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices
Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices
Description : Field of PC forensics began in which year ? a. 1975 b. 1944 c. 1971 d. 1980
Last Answer : d. 1980
Description : When cases go to trial, you as a forensics examiner can play one of ____ roles. a. 2 c. 4 b. 3 d.5
Last Answer : a. 2
Description : Who is the father of Computer Forensics? a. Anderson b. Palmer c. Ciardhuain d. Korn
Last Answer : a. Anderson
Description : When was pc forensics began? a. 1980 b. 1984 c. 1995 d. 1997
Last Answer : a. 1980
Description : which is following father of computer forensics a. M. Anderson b. G. Gunsh c. S. Ciardhuain d. G. Palmar
Last Answer : a. M. Anderson
Description : Forensics is the systematic trucking of incoming and outgoing ruffic on your network (a) Network (b) Computer (c) Criminal (d) Server
Last Answer : d) Server
Description : When cases go to trial forensics examiner can play one of role (a) 2 (b) 4 (c) 3 (d) 5
Last Answer : (b) 4
Description : When the field of PC forensics began? (A) 1960's (B) 1970's (C) 1980's (D) 1990's
Last Answer : (C) 1980's
Description : There are three c's in computer forensics. Which is one of the three? (A) Control (B) Chance (C) Chains (D) Core
Last Answer : A) Control
Description : When the field of PC forensics began? A.1960's B.1970's C.1980's D.1990's
Last Answer : C.1980's
Description : There are three c's in computer forensics. Which is one of the three? A. Control B. Chance C. Chains D. Core
Last Answer : A. Control
Description : Which of the following is a class of computers based on model? A) Digital Computer B) Hybrid Computers C) Analog Computers D) AT Computers
Last Answer : Answer : D