Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.
Last Answer : A. Acquisition.
Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing
Last Answer : B. Steganography.
Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates
Last Answer : a. hashing algorithms
Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates
Last Answer : (a) Hashing algorithms
Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing
Last Answer : B.Steganogrhy.
Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These
Description : A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii)must be hardware implementable (iii) two different messages should not give the same hashed message (iv) ... signature a. i and ii b. ii and iii c. i and iii d. iii and iv
Last Answer : c. i and iii
Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law
Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
Description : Which of the following is being investigated as a means of automating the creation of a knowledge base? a) automatic knowledge acquisition b) simpler tools c) discovery of new concepts d) all of the mentioned
Last Answer : d) all of the mentioned
Description : What is the full form of ADFM a. Abstract defining forensic model b. Abstract digital forensic model c. Abstract digital forensic media d. Analysis digital forensic mode
Last Answer : b. Abstract digital forensic model
Description : Which of the following is an incorrect statement relating to the theoretical framework of auditing? a. Effective internal control structure reduces the probability of fraud or irregularities in ... collecting evidence, auditors should maintain an attitude of trust about their clients' assertions.
Last Answer : In collecting evidence, auditors should maintain an attitude of trust about their clients' assertions.
Description : Evaluation in education insists on the following Options: A) Making tests more reliable and valid B) Conducting periodical tests to detect students’ weaknesses C) Insisting on clear cut behaviour al objectives of teaching D) Examining students objectively for selection purpose
Last Answer : C) Insisting on clear cut behaviour al objectives of teaching
Description : MICR reads the characters by examining their shapes in _________ form. A. binary B. ASCII C. matrix D. None of the Above
Last Answer : C. matrix
Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it
Last Answer : c. scrambling it to preserve its security
Description : The hash function used in double hashing is of the form: (A) h(k, i)=(h1(k)+h2(k)+i)mod m (B) h(k, i)=(h1(k)+h2(k)-i)mod m (C) h(k, i)=(h1(k)+ih2(k))mod m (D) h(k, i)=(h1(k)-ih2(k))mod m
Last Answer : Answer: C
Description : The problem-solving agent with several immediate options of unknown value can decide what to do by just examining different possible sequences of actions that lead to states of known value, and then choosing the ... . This process of looking for such a sequence is called Search. a) True b) False
Last Answer : a) True
Description : What are some good books about basic steganography techniques?
Last Answer : I can recommend a good new novel that involves steganography—“Daemon” by Daniel Suarez. About the best tech thriller I’ve ever read.
Description : Which of these exemplifies social steganography?
Last Answer : Sending a hidden message to invite certain people to a party
Description : What is Steganography
Last Answer : Invisible ink writing
Description : Which of the following statements regarding the features of Information and Communication Technology (ICT) is/are true ? I. ICT are the main instruments for the creation of computer networks and the applications based on them. II. ... II only (B) I and III only (C) II and III only (D) I, II and III
Last Answer : (A) I and II only
Description : The Overseas Principal should obtain necessary authorisation from the Reserve Bank of India under the provisions of which Act to commence/ operate a payment system? A. Reserve Bank of India Act-1934 B. Banking ... , 1949 D. Payment and Settlement Systems Act (PSS Act), 2007 E. None of the Above
Last Answer : D. Payment and Settlement Systems Act (PSS Act), 2007 Explanation: The Overseas Principal should obtain necessary authorisation from the Department of Payment and Settlement Systems, Reserve Bank of India ... Payment and Settlement Systems Act (PSS Act), 2007 to commence/ operate a payment system.
Description : Any acquisition by the Payment Banks that are more than ____ will require approval of the RBI. A. 5% B. 10% C. 15% D. 20% E. None of the Above
Last Answer : A. 5% Explanation: Any acquisition of more than 5% will require approval of the RBI.
Description : Which of the following is not available to depositors of NBFCs? A. Deposit Insurance facility B. Acquisition of shares C. Loans and Advances D. All of the Above E. None of the Above
Last Answer : A. Deposit Insurance facility Explanation: Deposit insurance facility of Deposit Insurance and Credit Guarantee Corporation is not available to depositors of NBFCs, unlike in case of banks.
Description : Which of the following is NOT focus of digital forensic analysis? A. Authenticity B. Comparison C. Proving D. Enhancement
Last Answer : C. Proving
Description : Digital forensic applied both ……………. ? a. Analysis and response action b. Computer crime and civil action c. Criminal and civil action d. Regional and forensic action
Last Answer : c. Criminal and civil action
Description : . Which of the following is NOT focus of digital forensic analysis? a. Authenticity b. Comparison c. Proving d. Enhancement
Last Answer : c. Proving
Description : Hard Copy refers to: a) Hardware b) Print Out of Document c) Duplicate Memory Data d) None of These
Last Answer : b) Print Out of Document
Description : Programs that duplicate the functionality of one system on another system is known as (1) Emulators (2) Simulators (3) Evaluators (4) PCB
Last Answer : Emulators
Description : Which of the following uses the spawn mechanism to duplicate itself ? (1) Trojan horse (2) Worm (3) Keystroke logger (4) Logic bomb
Last Answer : Worm
Description : Which mechanism is used by the computer virus ‘worm’ to duplicate itself? (1) Swap (2) Increment (3) Spawn (4) Swarm
Last Answer : Spawn
Description : Which of the following is an Disk Operating System (DOS) command ? (1) LIST (2) CHANGE (3) DUPLICATE (4) FORMAT
Last Answer : FORMAT
Description : What was one purpose for the creation of the Workingmen's Party?
Last Answer : One purpose of creating the working mens party was to protectthe rights of skilled workers.
Description : What is the latest write-once optical storage media? A) Digital paper B) Magneto-optical disk C) WORM disk D) CD-ROM disk
Last Answer : Answer : D
Description : Which among the following is incorrect about CD's features : a) It contains digital information that can be read, but cannot be rewritten. b) It is a very reliable storage media. It is very often used as ... c) Separate drives exist for reading and writing CDs. d) All of the Above e) None of These
Last Answer : e) None of These
Description : DMA stands for: a) Dial - Up Multiplier Access b) Digital Media Access c) Direct Memory Access d) None of These
Last Answer : c) Direct Memory Access
Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above
Last Answer : 4) All of the above
Description : Have there been any scientific studies examining the nutritous value of using goats and donkeys to breast-feed human babies?
Last Answer : Not to sure about donkeys but goat milk is well-known for babies in my area. https://www.sciencedaily.com/releases/2019/06/190627114033.htm#:~:text=The%20study%20found%20the%20natural,attach%20to%20human%20intestinal%20cells.
Description : Ray Whitcombe is found dead in his office at his desk. The police have narrowed the suspects down to three people: Mrs. Barbara Whitcombe, Ray's wife; Mr. Jason McCubbins, Ray's business partner; ... written on it. After examining this evidence, the police knew their suspect. Who was it? -Riddles
Last Answer : Jason McCubbins, Ray's business partner. The calendar is the clue to solving this murder. The police realized that since Mr. Whitcombe was wearing his watch on his right arm, he must be left handed. But ... September, October, November. Use the first letter of each month and it spells J-A-S-O-N.
Description : A historian is examining religion's role in history. Which question might the historian ask if she were organizing her study by period?
Last Answer : Answer this ques A historian is examining religion's role inhistory. Which question might the historian ask if she wereorganizing her study by period? tion…
Description : Is it possible to tell the truth about something without looking deeper into that something by looking at it from multiple perspectives?
Last Answer : answer:
Description : After examining the blood group of husband and wife ,the doctor advised them not to have more than one child ,the blood group of the couple are likely
Last Answer : After examining the blood group of husband and wife ,the doctor advised them not to have more than one child , ... Male `Rh^(-)` and female `Rh^(-)`
Description : Foetal sex can be determined by examining cells from the amniotic fluid by looking for
Last Answer : Foetal sex can be determined by examining cells from the amniotic fluid by looking for A. Chiasmata B. Autosomes C. Sex-chromosomes D. Nucleus
Description : What would a historian using historical thinking skill of examining historiography might?
Last Answer : Need answer
Description : What is an endoscope? (1) It is an optical instrument used to see inside the alimentary canal (2) It is a device which is fitted on the chest of the patient to regularize the ... used for examining ear disorders (4) It is an instrument for recording electrical signals produced by human muscles
Last Answer : (1) It is an optical instrument used to see inside the alimentary canal Explanation: Endoscopymeans looking inside and typically refers to looking inside the body for medical reasons using ... : breathing disorders; chronic diarrhea; internal bleeding; irritable bowel syndrome; stomach ulcers, etc.