Digital evidences are also called as :
a. Digital proof
b. Evidence
c. Hidden Truth
d. Electronic Evidence

1 Answer

Answer :

d. Electronic Evidence

Related questions

Description : The evidences of proof that can be obtained from the electricity source is called the (a) Digital evidence (b) Demonstrative evidence (c) Explainable evidence (d) Substantial evidence

Last Answer : (a) Digital evidence

Description : Rule of evidence is called as …………. a. Digital Evidence b. Law of Evidence c. Hidden Evidence d. Electronic Evidence

Last Answer : b. Law of Evidence

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : The evidence or proof that can be obtained from the electronic source is called the ……… a. Digital evidence b. Demonstrative evidence c. Explainable evidence d. Substantial evidence

Last Answer : a. Digital evidence

Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Last Answer : A)Digital Evidence

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital Evidences d. None of the above.

Last Answer : c. Private networks contain a higher concentration of digital Evidences

Description : Which of the following is not a type of Evidences a) Electronic evidence b) Documented evidence c) Substantial Evidence d) Main memory

Last Answer : d) Main memory

Description : Proof of electronic signature defined in_____of evidence act a) Section 65 A,& 65 B b) Section 64 A,& 64 B c) Section 65 d) Section 67A

Last Answer : d) Section 67A

Description : A scientific truth attempts to identify roles that are universally true. Legal judgment, on The other hand, has a standard of proof in criminal prosecutions of: a. Balance of probabilities b. Beyond a reasonable doubt c. Acquittal d. None of the above

Last Answer : b. Beyond a reasonable doubt

Description : The digital evidences are used to establish a credible link between a) Attacker and victim and the crime scene b) Attacker and the crime scene c) Victim and the crime scene d) Attacker and Information

Last Answer : a) Attacker and victim and the crime scene

Description : Which one is not a 103 rule of evidence a. Maintaining a claim of error b. Aim of an offer of proof c. Plain error taken d. Destroying data

Last Answer : d. Destroying data

Description : . Which one is not a 103 rule of evidence a. Maintaining a claim of error b. Aim of an offer of proof c. Plain error taken d. Destroying data

Last Answer : d. Destroying data

Description : You must have both ____ and ____ to validate your evidence. a. Proof and victim b. Power and skill c. Power and proof d. Proof and skill

Last Answer : b. Power and skill

Description : It is easy for you to splurge when you have your mom's credit card, but remember after the feast comes the reckoning. (1) Trust is easy to break. (2) Truth can't be hidden forever. (3) Every action has a consequence. (4) Don't take your parents for granted

Last Answer : (3) Every action has a consequence.

Description : Will volatile evidences last forever a. No b. Not Sure c. Yes d. None of the above

Last Answer : a. No

Description : . Will volatile evidences last forever a. No b. Not Sure c. Yes d. None of the abovev

Last Answer : a. No

Description : Rule of evidence is also called as a) Law of evidence b) Documented evidence c) Electronic evidence d) Illustrative evidence

Last Answer : a) Law of evidence

Description : When you are able to unequivocally prove that something someone has sent you in an email is false, and you send that proof back in a reply, do you think the people send the truth backward, to the people who sent it to them, etc.?

Last Answer : It destroys what they want to believe. So they think it is bullshit and will think snopes is part of the liberal media. You can't argue with stupid. Snopes is actually run by conservatives. I would buy them ... are the ones I like. I bounce to sender when I get that shit. Barney Frank had it right

Description : What are the Form of Electronic Evidence: A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : Best Evidence Rule states that a. It states that multiple copies of electronic files may be a part of the original or equivalent to the original. b. It states that copy of evidence may be ... that multiple copies of electronic files may be a part of the original or same as original.

Last Answer : It states that multiple copies of electronic files may be a part of the “original” or equivalent to the “original.”

Description : What are the Form of Electronic Evidence: A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Last Answer : D)Both A and B

Description : The instruments by which the court is convinced of a fact is called a) Document b) Evidence c) Proof d) Witness

Last Answer : b) Evidence

Description : Is a fine-tuned universe evidence of intelligent design and therefore proof of Gods existence?

Last Answer : Not according to Stephen Hawking. It is a result if imperfections and randomness.

Description : What proof or evidence is there for evolution?

Last Answer : I confess that I am ignorant of proof for evolution. Please enlighten me.

Description : Proof of signature and handwriting defined in ____of evidence act. a) Section 65 A,& 65 B b) Section 64 A,& 64 B c) Section 65 d) Section 67

Last Answer : d) Section 67

Description : Proof of documents by primary evidence defined in sec ____of Evidence Act a) 62 b) 63 c) 64 d) 65

Last Answer : c) 64

Description : Section 60 of Indian Evidence Act is a) Proof of facts by oral evidence b) Secondary evidence c) Oral evidence must be direct d) Proof of contents of documents

Last Answer : c) Oral evidence must be direct

Description : Section 59 of Indian Evidence Act is- a) Proof of facts by oral evidence b) Secondary evidence b) Oral evidence must be direct d) Proof of contents of documents

Last Answer : a) Proof of facts by oral evidence

Description : When one fact is declared by this Act to be conclusive proof of another, the Court  shall, on proof of the one fact, regard the other as proved, and shall not allow evidence to  be given for the purpose of disproving it a) May presume b) Conclusive proof c) Shall presume d) None of these

Last Answer : b) Conclusive proof

Description : An audit program provides proof that a. Sufficient appropriate evidence was obtained. b. The work was adequately planned. c. There was a proper study and evaluation of internal control. d. There was compliance with generally accepted standards of reporting

Last Answer : The work was adequately planned.

Description : The overall objective of forensic auditing is to a. Attest to the efficiency with which resources are employed b. Assist members of the organization in the effective discharge of their ... in legal and financial disputes d. Provide assurance that financial data have been accurately recorded

Last Answer : Unearth the truth and provide evidence in legal and financial disputes

Description : Identify the incorrect statement: (A) A hypothesis is made on the basis of limited evidence as a starting point for further investigations. (B) A hypothesis is a basis for reasoning without ... is a proposed explanation for a phenomenon. (D) Scientific hypothesis is a scientific theory.

Last Answer : (D) Scientific hypothesis is a scientific theory. 

Description : The first electronic general purpose digital computer built by Eckert and Mauchly called ENIAC did not work on the stored program concept. How many numbers could it store in its internal memory? A) 100 B) 20 C) 40 D) 80

Last Answer : Answer : B

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the abov

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : Video Surveillance can be form of Digital evidence a. True b. False

Last Answer : a. True

Description : Digital Evidence is only useful in court of law a. True b. False

Last Answer : b. False

Description : In term of Digital evidence, the internet is an example of a. Open computer System b. Communication System c. Embedded Computer System d. None of the above

Last Answer : b. Communication System

Description : 3. In term of Digital evidence, a mobile telephone is an example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : c. Embedded Computer System

Description : In term of Digital evidence, a hard drive is example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above

Last Answer : a. Open Computer System

Description : . A Valid Definition of Digital Evidence is a. Data Stored or transmitted using a computer b. Information of Probative value c. Digital dada of probative Value d. Any digital evidence on compute

Last Answer : c. Digital dada of probative Value

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.

Last Answer : c. Private networks contain a higher concentration of digital evidence.

Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : b. Communication systems

Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems

Description : . In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

Last Answer : c. Embedded computer systems