Rule of evidence is called as ………….
a. Digital Evidence
b. Law of Evidence
c. Hidden Evidence
d. Electronic Evidence

1 Answer

Answer :

b. Law of Evidence

Related questions

Description : Digital evidences are also called as : a. Digital proof b. Evidence c. Hidden Truth d. Electronic Evidence

Last Answer : d. Electronic Evidence

Description : Rule of evidence is also called as a) Law of evidence b) Documented evidence c) Electronic evidence d) Illustrative evidence

Last Answer : a) Law of evidence

Description : Best Evidence Rule states that a. It states that multiple copies of electronic files may be a part of the original or equivalent to the original. b. It states that copy of evidence may be ... that multiple copies of electronic files may be a part of the original or same as original.

Last Answer : It states that multiple copies of electronic files may be a part of the “original” or equivalent to the “original.”

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : The evidence or proof that can be obtained from the electronic source is called the ……… a. Digital evidence b. Demonstrative evidence c. Explainable evidence d. Substantial evidence

Last Answer : a. Digital evidence

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : Digital Evidence must follow the requirement of the A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned

Last Answer : D)All of the mentioned

Description : Digital Evidence must follow the requirement of the A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned

Last Answer : D)All of the mentioned

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the abov

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Digital Evidence is only useful in court of law a. True b. False

Last Answer : b. False

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital Evidences d. None of the above.

Last Answer : c. Private networks contain a higher concentration of digital Evidences

Description : Digital evidence is only useful in a court of law. a. True b. False

Last Answer : b. False

Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Private network can be a richear sorce of digital evidence than they internet (a) They retain data for longer period of time (b) Owener of private network more cooprative with law enforcement (c) Private network contain higher concentration of digital evidence (d) None of these

Last Answer : c) Private network contain higher concentration of digital evidence

Description : Private networks can be a richer source of evidence than the Internet because: A. They retain data for longer periods of time. B. Owners of private networks are more cooperative with law enforcement. C. Private networks contain a higher concentration of digital evidence. D. All the above.

Last Answer : C. Private networks contain a higher concentration of digital evidence.

Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Which of following is not a rule of digital forensics? A. An examination should be performed on the original data B. A copy is made onto forensically sterile media. New media should always be used ... D. The examination must be conducted in such a way as to prevent any modification of the evidence.

Last Answer : A. An examination should be performed on the original data 

Description : What are the Form of Electronic Evidence: A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : What are the Form of Electronic Evidence: A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : Which one is not a 103 rule of evidence a. Maintaining a claim of error b. Aim of an offer of proof c. Plain error taken d. Destroying data

Last Answer : d. Destroying data

Description : . Which one is not a 103 rule of evidence a. Maintaining a claim of error b. Aim of an offer of proof c. Plain error taken d. Destroying data

Last Answer : d. Destroying data

Description : Digital evidence is only useful in a court of law a) True b) False

Last Answer : b) False

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : The evidences of proof that can be obtained from the electricity source is called the (a) Digital evidence (b) Demonstrative evidence (c) Explainable evidence (d) Substantial evidence

Last Answer : (a) Digital evidence

Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii

Description : The first electronic general purpose digital computer built by Eckert and Mauchly called ENIAC did not work on the stored program concept. How many numbers could it store in its internal memory? A) 100 B) 20 C) 40 D) 80

Last Answer : Answer : B

Description : Video Surveillance can be form of Digital evidence a. True b. False

Last Answer : a. True

Description : In term of Digital evidence, the internet is an example of a. Open computer System b. Communication System c. Embedded Computer System d. None of the above

Last Answer : b. Communication System

Description : 3. In term of Digital evidence, a mobile telephone is an example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : c. Embedded Computer System

Description : In term of Digital evidence, a hard drive is example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : a. Open Computer System

Description : . A Valid Definition of Digital Evidence is a. Data Stored or transmitted using a computer b. Information of Probative value c. Digital dada of probative Value d. Any digital evidence on compute

Last Answer : c. Digital dada of probative Value

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : b. Communication systems

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : . In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : 3. In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : a. Open computer systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : . A valid definition of digital evidence is: a. Data stored or transmitted using a computer b. Information of probative value c. Digital data of probative value d. Any digital evidence on a computer

Last Answer : c. Digital data of probative value

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : 1 Digital Evidence in the form of the: A)Office File B)E-mail Messages C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Which of the following is not the form of digital evidence: a. Text messages b. Emails c. Pictures d. Paper

Last Answer : d. Paper

Description : Digital evidence must follow the requirements of the …….. a. Ideal evidence b. Best evidence c. Exchange evidence d. All of the mentioned

Last Answer : b. Best evidence

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence