Validate your tools and verify your evidence with ____ to ensure its integrity
a. hashing algorithms c. steganography
b. watermarks d. digital certificates

1 Answer

Answer :

a. hashing algorithms

Related questions

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.

Last Answer : Acquisition.

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing. 

Last Answer : A. Acquisition. 

Description : You must have both ____ and ____ to validate your evidence. a. Proof and victim b. Power and skill c. Power and proof d. Proof and skill

Last Answer : b. Power and skill

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing

Last Answer : B.Steganogrhy.

Description : 1. Having a member of the search team trained to handle digital evidence: a. Can reduce the number of people who handle the evidence b. Can serve to streamline the presentation of the case ... the opportunity for opposing counsel to impugn the integrity of the Evidence d. All of the above

Last Answer : d. All of the above

Description : . An important aim of a post-project review is to: a. validate overall progress to date against the budget and schedule. b. capture learning and document it for future usage. c. ... of all permanent documentation, signed by the sponsor. d. establish that project benefits have been identified.

Last Answer : b. capture learning and document it for future usage.

Description : An important aim of a post-project review is to:  a. validate overall progress to date against the budget and schedule.  b. capture learning and document it for future usage.  c. ... of all permanent documentation, signed by the sponsor.  d. establish that project benefits have been identified

Last Answer : b. capture learning and document it for future usage.

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii)must be hardware implementable (iii) two different messages should not give the same hashed message (iv) ... signature a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : When one chooses a stance or takes a position don’t they always manage to find evidence to validate it?

Last Answer : Yes. Not all “evidence” is equal, though.

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : What Blank Integrity refers to a set of Access rules that govern data entry and helps to ensure data accuracy?

Last Answer : Data integrity.

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Surplus stock of certificates should never be held in HOs and SOs and should be returned to the supplying office. An invoice in form NC-13 shall be prepared in _____ by the S.O. ... H.O a) Duplicate, triplicate b) Triplicate, duplicate c) Quadruplicate, triplicate) d) Triplicate, quadruplicate

Last Answer : d) Triplicate, quadruplicate

Description : The fortnightly consolidated list of certificates issued to POs should, be sent by _____to the ____ a) Circle Stamp Depots, Circle postal accounts office b) Head offices , Postal account office c) Circle office , DG Post d) Circle office, Circle account office

Last Answer : a) Circle Stamp Depots, Circle postal accounts office

Description : Documentary drafts require various shipping documents such as ____. A. bills of lading B. insurance certificates C. commercial invoices D. A and B E. A, B, and C

Last Answer : E. A, B, and C

Description : One Reserve Bank of India introduced certificates of deposit in ____. A. 1964. B. 1989. C. 1986. D. 1990

Last Answer : B. 1989.

Description : Which of the following best describes the primary purpose of audit procedures? a. To detect errors or fraud b. To comply with generally accounting principles c. To gather sufficient, appropriate evidence d. To verify the accuracy of account balances

Last Answer : To gather sufficient, appropriate evidence

Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it

Last Answer : c. scrambling it to preserve its security 

Description : Which of the following statements is correct? a. Sufficiency refers to the quality of evidence, while appropriateness refers to the quantity of evidence. b. The reliability of evidence is ... are honest and have integrity relieves the auditor of the need to maintain professional scepticism.

Last Answer : The performance of consulting services for audit clients does not, in and of itself, impair the auditor’s independence

Description : The hash function used in double hashing is of the form: (A) h(k, i)=(h1(k)+h2(k)+i)mod m (B) h(k, i)=(h1(k)+h2(k)-i)mod m (C) h(k, i)=(h1(k)+ih2(k))mod m (D) h(k, i)=(h1(k)-ih2(k))mod m

Last Answer : Answer: C

Description : The practitioner makes a critical assessment of validity of audit evidence, with a questioning mind and being alert to conditions which may indicate possible misstatement due to error or ... integrity b. Professional skepticism c. Independence is mental attitude d. Sufficient appropriate evidence

Last Answer : Professional skepticism

Description : What are some good books about basic steganography techniques?

Last Answer : I can recommend a good new novel that involves steganography—“Daemon” by Daniel Suarez. About the best tech thriller I’ve ever read.

Description : Which of these exemplifies social steganography?

Last Answer : Sending a hidden message to invite certain people to a party

Description : What is Steganography

Last Answer : Invisible ink writing 

Description : When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a. technical/scientific. c. lay witness b. expert d. deposition

Last Answer : a. technical/scientific

Description : When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a. technical/scientific b. expert c. lay witness d. deposition

Last Answer : a.

Description : In the past, the method for expressing an opinion has been to frame a ____ question based on available factual evidence. (A) Hypothetical (B) Nested (C) Challenging (D) Contradictory

Last Answer : (A) Hypothetical

Description : In the past, the method for expressing an opinion has been to frame a ____ question based on available factual evidence. A. Hypothetical B. Nested C. Challenging D. Contradictory

Last Answer : A. Hypothetical

Description : Which of the following is incorrect? Algorithms can be represented: a) as pseudo codes b) as syntax c) as programs d) as flowcharts

Last Answer : Answer: b Explanation: Representation of algorithms: -As programs -As flowcharts -As pseudo codes

Description : Which of the following is not true? A : For robotics, you should have a knowledge of different sensors B : For robotics, you must be able to write different planning algorithms C : For robotics, you may have to use actuators D : For robotics, you do not require help of computer engineers, mechanical

Last Answer : D : For robotics, you do not require help of computer engineers, mechanical

Description : Which of the following is not true? A : For robotics, you should have a knowledge of different sensors B : For robotics, you must be able to write different planning algorithms C : For robotics, you may have to use actuators D : For robotics, you do not require help of computer engineers, mechanical

Last Answer : D : For robotics, you do not require help of computer engineers, mechanical

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : A computer program consists of: a) System Flowchart b) Program Flowchart c) Algorithm's written in any computer language d) None of The Above

Last Answer : c) Algorithm's written in any computer language

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : What conversion/ripping tools should I avoid to ensure that I don't inadvertently violate YouTube copyrights/anti-piracy measures?

Last Answer : Try http://www.flv2mp3.com/ – it was working for me as of a few days ago.

Description : In National Savings Certificates, investment up to ________ per annum qualifies for IT Rebate under section 80C of Income Tax Act. A. Rs.10 lakh B. Rs.2 lakh C. Rs.5 lakh D. Rs.1 lakh

Last Answer : D. Rs.1 lakh Explanation: There is no maximum limit for investment. Certificates can be kept as collateral security to get loan from banks. Investment up to INR 1,00,000/- per annum qualifies for ... Tax Act. Trust and HUF cannot invest. Rate of interest effective from 1st April 2016 is 8.10%