Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates
Last Answer : (a) Hashing algorithms
Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.
Last Answer : Acquisition.
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing
Last Answer : B. Steganography.
Last Answer : A. Acquisition.
Description : You must have both ____ and ____ to validate your evidence. a. Proof and victim b. Power and skill c. Power and proof d. Proof and skill
Last Answer : b. Power and skill
Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing
Last Answer : B.Steganogrhy.
Description : 1. Having a member of the search team trained to handle digital evidence: a. Can reduce the number of people who handle the evidence b. Can serve to streamline the presentation of the case ... the opportunity for opposing counsel to impugn the integrity of the Evidence d. All of the above
Last Answer : d. All of the above
Description : . An important aim of a post-project review is to: a. validate overall progress to date against the budget and schedule. b. capture learning and document it for future usage. c. ... of all permanent documentation, signed by the sponsor. d. establish that project benefits have been identified.
Last Answer : b. capture learning and document it for future usage.
Description : An important aim of a post-project review is to: a. validate overall progress to date against the budget and schedule. b. capture learning and document it for future usage. c. ... of all permanent documentation, signed by the sponsor. d. establish that project benefits have been identified
Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii)must be hardware implementable (iii) two different messages should not give the same hashed message (iv) ... signature a. i and ii b. ii and iii c. i and iii d. iii and iv
Last Answer : c. i and iii
Description : When one chooses a stance or takes a position don’t they always manage to find evidence to validate it?
Last Answer : Yes. Not all “evidence” is equal, though.
Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These
Description : Which security provision is used to ensure data integrity and authentication? -Technology
Last Answer : A digital signature helps the user to ensure data integrity and authentication.
Description : What Blank Integrity refers to a set of Access rules that govern data entry and helps to ensure data accuracy?
Last Answer : Data integrity.
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control
Last Answer : C) Data Control
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Last Answer : d. All the above
Description : Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints? (A) An ... ) and (B) are true; (C) false. (4) (A), (B) and (C) are false.
Last Answer : Answer: 3
Description : Surplus stock of certificates should never be held in HOs and SOs and should be returned to the supplying office. An invoice in form NC-13 shall be prepared in _____ by the S.O. ... H.O a) Duplicate, triplicate b) Triplicate, duplicate c) Quadruplicate, triplicate) d) Triplicate, quadruplicate
Last Answer : d) Triplicate, quadruplicate
Description : The fortnightly consolidated list of certificates issued to POs should, be sent by _____to the ____ a) Circle Stamp Depots, Circle postal accounts office b) Head offices , Postal account office c) Circle office , DG Post d) Circle office, Circle account office
Last Answer : a) Circle Stamp Depots, Circle postal accounts office
Description : Documentary drafts require various shipping documents such as ____. A. bills of lading B. insurance certificates C. commercial invoices D. A and B E. A, B, and C
Last Answer : E. A, B, and C
Description : One Reserve Bank of India introduced certificates of deposit in ____. A. 1964. B. 1989. C. 1986. D. 1990
Last Answer : B. 1989.
Description : Which of the following best describes the primary purpose of audit procedures? a. To detect errors or fraud b. To comply with generally accounting principles c. To gather sufficient, appropriate evidence d. To verify the accuracy of account balances
Last Answer : To gather sufficient, appropriate evidence
Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it
Last Answer : c. scrambling it to preserve its security
Description : Which of the following statements is correct? a. Sufficiency refers to the quality of evidence, while appropriateness refers to the quantity of evidence. b. The reliability of evidence is ... are honest and have integrity relieves the auditor of the need to maintain professional scepticism.
Last Answer : The performance of consulting services for audit clients does not, in and of itself, impair the auditor’s independence
Description : The hash function used in double hashing is of the form: (A) h(k, i)=(h1(k)+h2(k)+i)mod m (B) h(k, i)=(h1(k)+h2(k)-i)mod m (C) h(k, i)=(h1(k)+ih2(k))mod m (D) h(k, i)=(h1(k)-ih2(k))mod m
Last Answer : Answer: C
Description : The practitioner makes a critical assessment of validity of audit evidence, with a questioning mind and being alert to conditions which may indicate possible misstatement due to error or ... integrity b. Professional skepticism c. Independence is mental attitude d. Sufficient appropriate evidence
Last Answer : Professional skepticism
Description : What are some good books about basic steganography techniques?
Last Answer : I can recommend a good new novel that involves steganography—“Daemon” by Daniel Suarez. About the best tech thriller I’ve ever read.
Description : Which of these exemplifies social steganography?
Last Answer : Sending a hidden message to invite certain people to a party
Description : What is Steganography
Last Answer : Invisible ink writing
Description : When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a. technical/scientific. c. lay witness b. expert d. deposition
Last Answer : a. technical/scientific
Description : When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a. technical/scientific b. expert c. lay witness d. deposition
Last Answer : a.
Description : In the past, the method for expressing an opinion has been to frame a ____ question based on available factual evidence. (A) Hypothetical (B) Nested (C) Challenging (D) Contradictory
Last Answer : (A) Hypothetical
Description : In the past, the method for expressing an opinion has been to frame a ____ question based on available factual evidence. A. Hypothetical B. Nested C. Challenging D. Contradictory
Last Answer : A. Hypothetical
Description : Which of the following is incorrect? Algorithms can be represented: a) as pseudo codes b) as syntax c) as programs d) as flowcharts
Last Answer : Answer: b Explanation: Representation of algorithms: -As programs -As flowcharts -As pseudo codes
Description : Which of the following is not true? A : For robotics, you should have a knowledge of different sensors B : For robotics, you must be able to write different planning algorithms C : For robotics, you may have to use actuators D : For robotics, you do not require help of computer engineers, mechanical
Last Answer : D : For robotics, you do not require help of computer engineers, mechanical
Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above
Last Answer : d) All of the Above
Description : A computer program consists of: a) System Flowchart b) Program Flowchart c) Algorithm's written in any computer language d) None of The Above
Last Answer : c) Algorithm's written in any computer language
Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These
Description : What conversion/ripping tools should I avoid to ensure that I don't inadvertently violate YouTube copyrights/anti-piracy measures?
Last Answer : Try http://www.flv2mp3.com/ – it was working for me as of a few days ago.
Description : In National Savings Certificates, investment up to ________ per annum qualifies for IT Rebate under section 80C of Income Tax Act. A. Rs.10 lakh B. Rs.2 lakh C. Rs.5 lakh D. Rs.1 lakh
Last Answer : D. Rs.1 lakh Explanation: There is no maximum limit for investment. Certificates can be kept as collateral security to get loan from banks. Investment up to INR 1,00,000/- per annum qualifies for ... Tax Act. Trust and HUF cannot invest. Rate of interest effective from 1st April 2016 is 8.10%