Digital forensic is all of them except:
a. Extraction of computer data
b. Preservation of computer data
c. Interpretation of computer data
d. Manipulation of computer data

1 Answer

Answer :

b. Preservation of computer data

Related questions

Description : Digital forensics is all of them except: a. Extraction of computer data. b. Preservation of computer data. c. Interpretation of computer data. d. Manipulation of computer data.

Last Answer : d. Manipulation of computer data.

Description : Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data.

Last Answer : (D) Manipulation of computer data.

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data.

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data. 

Description : Computer forensics do not involve_____activity. A. Preservation of computer data. B. Exraction of computer data. C. Manipulation of computer data. D. Interpretation of computer data.

Last Answer : C. Manipulation of computer data. 

Description : The basic role of promotion is A)information. B)manipulation. C)communication. D)interpretation.

Last Answer : C)communication.

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Digital forensic applied both ……………. ? a. Analysis and response action b. Computer crime and civil action c. Criminal and civil action d. Regional and forensic action

Last Answer : c. Criminal and civil action

Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : _______phase includes putting the pieces of a digital puzzle together and developing investigative hypotheses A. Preservation phase B. Survey phase C. Documentation phase D. Reconstruction phase E. Presentation phase

Last Answer : D. Reconstruction phase

Description : A modern electronic computer is a machine that is meant for A) Doing quick mathematical calculations B) Input, storage, manipulation and outputting of data C) Electronic data processing D) Performing repetitive tasks accurately

Last Answer : Answer : B

Description : Errors in computer results could be due to 1) encoding of data 2) transmission of data 3) manipulation of data 4) all of the above

Last Answer : 4) all of the above

Description : . What are the important parts of the mobile device which used in Digital forensic? A. SIM B. RAM C. ROM. D.EMMC chip

Last Answer : D.EMMC chip

Description : Which of the following is FALSE A. The digital forensic investigator must maintain absolute objectivity B. It is the investigator's job to determine someone's guilt or innocence. C. It is the ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : B. It is the investigator’s job to determine someone’s guilt or innocence.

Description : 5. What is the Primary Objectives of Digital Forensic for Business and Industry A. Availability of service B. Continuity of operation C. Prosecution D. Security

Last Answer : A. Availability of service

Description : Which of the following is NOT focus of digital forensic analysis? A. Authenticity B. Comparison C. Proving D. Enhancement

Last Answer : C. Proving

Description : . Does database forensic include in Digital Forensic application A. True B. False

Last Answer : A. True

Description : What is the Long form of DFI A)Digital Forensic Investigation B)Digital Fraud Industry C)Defining Form In D)None

Last Answer : A)Digital Forensic Investigation

Description : How Many Rules in Digital forensic A)12 B)19 C)10 D)6

Last Answer : D)6

Description : Who proposed the UML Modelling of Digital Forensic Process Model a. Kohn, Eloff and Oliver b. Response Team c. Only (a) d. None of the above

Last Answer : a. Kohn, Eloff and Oliver

Description : Ethical Issues in Digital Forensic means : a. Set of moral principals that regulate the use of computers b. Related to ethical hacking c. Honesty towards investigation d. Compliance with law

Last Answer : a. Set of moral principals that regulate the use of computers

Description : What is the full form of EEDIP a. End to End Digital Investigation Program b. End to End Digital Investigation Process c. End to End Digital Forensic Investigation d. End to End Digital Forensic Investment

Last Answer : b. End to End Digital Investigation Process

Description : The full form of DFI is : e. Digital Forensic Investigation f. Digitalized Forensic Investigation g. Digital Foreign Investment h. Direct Forensic Investigation

Last Answer : e. Digital Forensic Investigation

Description : Which of the following sciences pay vital role in criminal justice systems ? a. Digital Forensics b. Forensic Science c. PC Forensics d. INTERPOL Forensic

Last Answer : b. Forensic Science

Description : The whole process is trigged by ………….. a. Investigator b. Society c. Digital forensic d. Criminal activity

Last Answer : d. Criminal activity

Description : What is the full form of ADFM a. Abstract defining forensic model b. Abstract digital forensic model c. Abstract digital forensic media d. Analysis digital forensic mode

Last Answer : b. Abstract digital forensic model

Description : Which of the following is FALSE? a. The digital forensic investigator must maintain absolute objectivity b. It is the investigator's job to determine someone's guilt or innocence. c. It is ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : b. It is the investigator’s job to determine someone’s guilt or innocence.

Description : . What is the Primary Objectives of Digital Forensic for Business and Industry? a. Availability of service b. Prosecution c. Continuity of operation d. Security

Last Answer : a. Availability of service

Description : . Which of the following is NOT focus of digital forensic analysis? a. Authenticity b. Comparison c. Proving d. Enhancement

Last Answer : c. Proving

Description : All of forensic examination should be perform on a original digital evidence (a) True (b) False

Last Answer : (a) True

Description : Who proposed Road Map for Digital Forensic Research (RMDFR) (A) G.Gunsh. (B) S.Ciardhuain (C) J.Korn. (D) G.Palmar

Last Answer : (D) G.Palmar

Description : Who proposed Road Map for Digital Forensic Research (RMDFR) A. G.Gunsh. B. S.Ciardhuain C. J.Korn. D. G.Palmar

Last Answer : D. G.Palmar

Description : What is the Long form of DFI A)Digital Forensic Investigation B)Digital Fraud Industry C)Defining Form In D)None

Last Answer : A)Digital Forensic Investigation

Description : How Many Rules in Digital forensic A)12 B)19 C)10 D)6

Last Answer : D)6

Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Description : An argument for including computer forensic training computer security specialists is: a. It provides an additional credential. b. It provides them with the tools to conduct their own investigations. c. It teaches them when it is time to call in law enforcement. d. None of the above.

Last Answer : c. It teaches them when it is time to call in law enforcement.

Description : What are Computer Forensic Services? What are some popular Digital forensic tools?

Last Answer : Computer forensic services are the study and examination of digital media or material specifically for the use of litigation. One common tool used is Encase. Law enforcement uses it to ... com/computer-forensics-tools/#gref https://resources.infosecinstitute.com/7-best-computer-forensics-tools/#gref

Description : ___________ includes the identification, recovery, investigation, validation and presentation of facts regarding digital evidence found on computer and similar storage media devices. a. Analog forensic b. Digital forensic c. Cyber forensic

Last Answer : b. Digital forensic

Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic

Last Answer : b. Digital forensic

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is the interpretation of this dream ? I dreamed today that the administrator of Ans Bangla had blocked me and the administrator of Inles had sent a message in a private message that there would be a ... . Note that I have no interest in any other site except Ans Bangla to be active in them.

Last Answer : You have to explain the matter psychologically. Look , dreams are nothing , it's just a little bit of thinking all day long. As students dream in their sleep before the exam , most of them dream that "I ... I was able to explain to you today. But I believe , you have understood my words. Thank you!

Description : Mark correct option related to preservation period a) Nominal roll cum attendance & destruction of record register is permanent b) All records of registration and parcel dept except foreign article is 1 year c) All records ... 1 ½ year, IPO 42 months, Book of MO receipt is 2 years e) All the above

Last Answer : e) All the above

Description : Mark correct option related to preservation period a) All records of mail department except due mail & sorting list 1 year b) Book of post marks(MS 18) & Postman book (MS-27) 1 ½ year c) Enumeration returns (MS-6) 2 years d) All monthly statistical registers 3 years e) All of the above

Last Answer : e) All of the above

Description : If some information is available on paper but you want to transferred it to the hard disc of the computer for further manipulation, which device you will use: a) Photoshop b) Scanner c) Printer d) None of These

Last Answer : b) Scanner

Description : _______phase includes putting the pieces of a digital puzzle together and developing investigative hypotheses A. Preservation phase B. Survey phase C. Documentation phase D. Reconstruction phase E. Presentation phase 

Last Answer : D. Reconstruction phase 

Description : Computer based record keeping system is known as (a) Data Manipulation System -Technology

Last Answer : (d) DBMS is a collection of programs that enable the user to create and maintain the database. Also, it is a computer-based record keeping system.

Description : In data transfer manipulation designing as instruction set for a system isa complex_ a. Art b. System Cc. Computer d. None of these

Last Answer : a. Art

Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accuratel

Last Answer : Input, storage, manipulation and outputting of data

Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accurately

Last Answer : b. Input, storage, manipulation and outputting of data