Description : Digital Evidence must follow the requirement of the A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned
Last Answer : D)All of the mentioned
Description : Digital evidence must follow the requirements of the …….. a. Ideal evidence b. Best evidence c. Exchange evidence d. All of the mentioned
Last Answer : b. Best evidence
Description : Which of following is not a rule of digital forensics? A. An examination should be performed on the original data B. A copy is made onto forensically sterile media. New media should always be used ... D. The examination must be conducted in such a way as to prevent any modification of the evidence.
Last Answer : A. An examination should be performed on the original data
Description : Rule of evidence is called as …………. a. Digital Evidence b. Law of Evidence c. Hidden Evidence d. Electronic Evidence
Last Answer : b. Law of Evidence
Description : What is the “rule of law”? Choose one: a. Everyone but the President must follow the law. b. Government does not have to follow the law. c. All laws must be the same in every state. d. Everyone must follow the law.
Last Answer : Correct Answer: d. Everyone must follow the law.
Description : Which one is not a 103 rule of evidence a. Maintaining a claim of error b. Aim of an offer of proof c. Plain error taken d. Destroying data
Last Answer : d. Destroying data
Description : . Which one is not a 103 rule of evidence a. Maintaining a claim of error b. Aim of an offer of proof c. Plain error taken d. Destroying data
Description : Best Evidence Rule states that a. It states that multiple copies of electronic files may be a part of the original or equivalent to the original. b. It states that copy of evidence may be ... that multiple copies of electronic files may be a part of the original or same as original.
Last Answer : It states that multiple copies of electronic files may be a part of the “original” or equivalent to the “original.”
Description : Which statement is incorrect regarding the Code of Ethics for Professional Accountants in the Philippines? a. Professional accountants refer to persons who are Certified Public Accountants (CPA) ... the ethical requirements as the basic principles which they should follow in performing their work
Last Answer : Where a national statutory requirement is in conflict with a provision of the IFAC Code, the IFAC Code requirement prevails.
Description : The expertise that distinguishes auditors from accountants is in the a. Ability to interpret PAS/PFRS. b. Accumulation and interpretation of evidence. c. Ability to interpret generally accepted accounting principles. d. Requirement to possess education beyond the bachelor's degree.
Last Answer : Accumulation and interpretation of evidence.
Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the abov
Last Answer : c. Private networks contain a higher concentration of digital evidence.
Description : Video Surveillance can be form of Digital evidence a. True b. False
Last Answer : a. True
Description : Digital Evidence is only useful in court of law a. True b. False
Last Answer : b. False
Description : In term of Digital evidence, the internet is an example of a. Open computer System b. Communication System c. Embedded Computer System d. None of the above
Last Answer : b. Communication System
Description : 3. In term of Digital evidence, a mobile telephone is an example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above
Last Answer : c. Embedded Computer System
Description : In term of Digital evidence, a hard drive is example.of a. Open Computer System b. Communication System c. Embedded Computer System d. None of the Above
Last Answer : a. Open Computer System
Description : . A Valid Definition of Digital Evidence is a. Data Stored or transmitted using a computer b. Information of Probative value c. Digital dada of probative Value d. Any digital evidence on compute
Last Answer : c. Digital dada of probative Value
Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.
Last Answer : D. To respect the privacy of others.
Description : In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above
Last Answer : c. Embedded computer systems
Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems
Last Answer : d. Open computer systems, communication systems, embedded systems
Description : In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above
Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital evidence. d. All of the above.
Last Answer : b. Communication systems
Description : In terms of digital evidence, a Smart Card is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above
Description : . In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above
Description : 3. In terms of digital evidence, a hard drive is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above
Last Answer : a. Open computer systems
Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems
Description : . A valid definition of digital evidence is: a. Data stored or transmitted using a computer b. Information of probative value c. Digital data of probative value d. Any digital evidence on a computer
Last Answer : c. Digital data of probative value
Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : The evidence and proof that can be obtained from the electronic source is called the……. A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B
Last Answer : A)Digital Evidence
Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B
Last Answer : A)Attacker and victim and the crime scene
Description : 1 Digital Evidence in the form of the: A)Office File B)E-mail Messages C)Either A or B D)Both A and B
Last Answer : D)Both A and B
Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems
Last Answer : b. A procedure to find the Digital Evidence
Description : Which of the following is not the form of digital evidence: a. Text messages b. Emails c. Pictures d. Paper
Last Answer : d. Paper
Description : Digital evidences are also called as : a. Digital proof b. Evidence c. Hidden Truth d. Electronic Evidence
Last Answer : d. Electronic Evidence
Description : The evidence or proof that can be obtained from the electronic source is called the ……… a. Digital evidence b. Demonstrative evidence c. Explainable evidence d. Substantial evidence
Last Answer : a. Digital evidence
Description : The digital evidence are used to establish a credible link between…… a. Attacker and victim and the crime scene b. Attacker and the crime scene c. Victim and the crime scene d. Attacker and information
Last Answer : a. Attacker and victim and the crime scene
Description : Private networks can be a richer source of evidence than the Internet because: a. They retain data for longer periods of time. b. Owners of private networks are more cooperative with law enforcement. c. Private networks contain a higher concentration of digital Evidences d. None of the above.
Last Answer : c. Private networks contain a higher concentration of digital Evidences
Last Answer : d. None of the above
Description : In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above
Description : . A valid definition of digital evidence is: a. Data stored or transmitted using a computer b. Information of probative value c. Digital data of probative value d. Any digital evidence on a compute
Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates
Last Answer : a. hashing algorithms
Description : Which of the following is used to portray data more specifically and is helpful in determining the background of digital evidence? a. Data b. Metadata c. Cookies d. History
Last Answer : b. Metadata
Description : The digital evidence is used to establish the credible link between … a. System, evidence and victim b. Attacker, victim, and crime scene c. Attacker, victim and case file d. Attacker, system and victim
Last Answer : b. Attacker, victim, and crime scene
Description : Digital evidence is only useful in a court of law. a. True b. False