What is called as the process of creation a duplicate of digital media for purpose
of examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.

1 Answer

Answer :

Acquisition.

Related questions

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing. 

Last Answer : A. Acquisition. 

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing

Last Answer : B.Steganogrhy.

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii)must be hardware implementable (iii) two different messages should not give the same hashed message (iv) ... signature a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Which of the following is being investigated as a means of automating the creation of a knowledge base? a) automatic knowledge acquisition b) simpler tools c) discovery of new concepts d) all of the mentioned

Last Answer : d) all of the mentioned

Description : What is the full form of ADFM a. Abstract defining forensic model b. Abstract digital forensic model c. Abstract digital forensic media d. Analysis digital forensic mode

Last Answer : b. Abstract digital forensic model

Description : Which of the following is an incorrect statement relating to the theoretical framework of auditing? a. Effective internal control structure reduces the probability of fraud or irregularities in ... collecting evidence, auditors should maintain an attitude of trust about their clients' assertions.

Last Answer : In collecting evidence, auditors should maintain an attitude of trust about their clients' assertions.

Description : Evaluation in education insists on the following Options: A) Making tests more reliable and valid B) Conducting periodical tests to detect students’ weaknesses C) Insisting on clear cut behaviour al objectives of teaching D) Examining students objectively for selection purpose

Last Answer : C) Insisting on clear cut behaviour al objectives of teaching 

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : MICR reads the characters by examining their shapes in _________ form. A. binary B. ASCII C. matrix D. None of the Above

Last Answer : C. matrix

Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it

Last Answer : c. scrambling it to preserve its security 

Description : The hash function used in double hashing is of the form: (A) h(k, i)=(h1(k)+h2(k)+i)mod m (B) h(k, i)=(h1(k)+h2(k)-i)mod m (C) h(k, i)=(h1(k)+ih2(k))mod m (D) h(k, i)=(h1(k)-ih2(k))mod m

Last Answer : Answer: C

Description : The problem-solving agent with several immediate options of unknown value can decide what to do by just examining different possible sequences of actions that lead to states of known value, and then choosing the ... . This process of looking for such a sequence is called Search. a) True b) False

Last Answer : a) True

Description : What are some good books about basic steganography techniques?

Last Answer : I can recommend a good new novel that involves steganography—“Daemon” by Daniel Suarez. About the best tech thriller I’ve ever read.

Description : Which of these exemplifies social steganography?

Last Answer : Sending a hidden message to invite certain people to a party

Description : What is Steganography

Last Answer : Invisible ink writing 

Description : The Overseas Principal should obtain necessary authorisation from the Reserve Bank of India under the provisions of which Act to commence/ operate a payment system? A. Reserve Bank of India Act-1934 B. Banking ... , 1949 D. Payment and Settlement Systems Act (PSS Act), 2007 E. None of the Above

Last Answer : D. Payment and Settlement Systems Act (PSS Act), 2007 Explanation: The Overseas Principal should obtain necessary authorisation from the Department of Payment and Settlement Systems, Reserve Bank of India ... Payment and Settlement Systems Act (PSS Act), 2007 to commence/ operate a payment system.

Description : Any acquisition by the Payment Banks that are more than ____ will require approval of the RBI. A. 5% B. 10% C. 15% D. 20% E. None of the Above

Last Answer : A. 5% Explanation: Any acquisition of more than 5% will require approval of the RBI.

Description : Which of the following is not available to depositors of NBFCs? A. Deposit Insurance facility B. Acquisition of shares C. Loans and Advances D. All of the Above E. None of the Above

Last Answer : A. Deposit Insurance facility Explanation: Deposit insurance facility of Deposit Insurance and Credit Guarantee Corporation is not available to depositors of NBFCs, unlike in case of banks.

Description : Which of the following is NOT focus of digital forensic analysis? A. Authenticity B. Comparison C. Proving D. Enhancement

Last Answer : C. Proving

Description : Digital forensic applied both ……………. ? a. Analysis and response action b. Computer crime and civil action c. Criminal and civil action d. Regional and forensic action

Last Answer : c. Criminal and civil action

Description : . Which of the following is NOT focus of digital forensic analysis? a. Authenticity b. Comparison c. Proving d. Enhancement

Last Answer : c. Proving

Description : Hard Copy refers to: a) Hardware b) Print Out of Document c) Duplicate Memory Data d) None of These

Last Answer : b) Print Out of Document

Description : Programs that duplicate the functionality of one system on another system is known as (1) Emulators (2) Simulators (3) Evaluators (4) PCB

Last Answer : Emulators

Description : Which of the following uses the spawn mechanism to duplicate itself ? (1) Trojan horse (2) Worm (3) Keystroke logger (4) Logic bomb

Last Answer : Worm

Description : Which mechanism is used by the computer virus ‘worm’ to duplicate itself? (1) Swap (2) Increment (3) Spawn (4) Swarm

Last Answer : Spawn

Description : Which of the following is an Disk Operating System (DOS) command ? (1) LIST (2) CHANGE (3) DUPLICATE (4) FORMAT

Last Answer : FORMAT

Description : What was one purpose for the creation of the Workingmen's Party?

Last Answer : One purpose of creating the working mens party was to protectthe rights of skilled workers.

Description : What is the latest write-once optical storage media? A) Digital paper B) Magneto-optical disk C) WORM disk D) CD-ROM disk

Last Answer : Answer : D

Description : Which among the following is incorrect about CD's features : a) It contains digital information that can be read, but cannot be rewritten. b) It is a very reliable storage media. It is very often used as ... c) Separate drives exist for reading and writing CDs. d) All of the Above e) None of These

Last Answer : e) None of These

Description : DMA stands for: a) Dial - Up Multiplier Access b) Digital Media Access c) Direct Memory Access d) None of These

Last Answer : c) Direct Memory Access

Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above

Last Answer : 4) All of the above

Description : Have there been any scientific studies examining the nutritous value of using goats and donkeys to breast-feed human babies?

Last Answer : Not to sure about donkeys but goat milk is well-known for babies in my area. https://www.sciencedaily.com/releases/2019/06/190627114033.htm#:~:text=The%20study%20found%20the%20natural,attach%20to%20human%20intestinal%20cells.

Description : Ray Whitcombe is found dead in his office at his desk. The police have narrowed the suspects down to three people: Mrs. Barbara Whitcombe, Ray's wife; Mr. Jason McCubbins, Ray's business partner; ... written on it. After examining this evidence, the police knew their suspect. Who was it? -Riddles

Last Answer : Jason McCubbins, Ray's business partner. The calendar is the clue to solving this murder. The police realized that since Mr. Whitcombe was wearing his watch on his right arm, he must be left handed. But ... September, October, November. Use the first letter of each month and it spells J-A-S-O-N.

Description : A historian is examining religion's role in history. Which question might the historian ask if she were organizing her study by period?

Last Answer : Answer this ques A historian is examining religion's role inhistory. Which question might the historian ask if she wereorganizing her study by period? tion…

Description : Is it possible to tell the truth about something without looking deeper into that something by looking at it from multiple perspectives?

Last Answer : answer:

Description : After examining the blood group of husband and wife ,the doctor advised them not to have more than one child ,the blood group of the couple are likely

Last Answer : After examining the blood group of husband and wife ,the doctor advised them not to have more than one child , ... Male `Rh^(-)` and female `Rh^(-)`

Description : Foetal sex can be determined by examining cells from the amniotic fluid by looking for

Last Answer : Foetal sex can be determined by examining cells from the amniotic fluid by looking for A. Chiasmata B. Autosomes C. Sex-chromosomes D. Nucleus

Description : What would a historian using historical thinking skill of examining historiography might?

Last Answer : Need answer

Description : What is an endoscope? (1) It is an optical instrument used to see inside the alimentary canal (2) It is a device which is fitted on the chest of the patient to regularize the ... used for examining ear disorders (4) It is an instrument for recording electrical signals produced by human muscles

Last Answer : (1) It is an optical instrument used to see inside the alimentary canal Explanation: Endoscopymeans looking inside and typically refers to looking inside the body for medical reasons using ... : breathing disorders; chronic diarrhea; internal bleeding; irritable bowel syndrome; stomach ulcers, etc.