Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing
Last Answer : B. Steganography.
Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.
Last Answer : Acquisition.
Last Answer : A. Acquisition.
Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates
Last Answer : a. hashing algorithms
Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates
Last Answer : (a) Hashing algorithms
Description : Fill in the blanks. Digital Forensics is a series of steps to _________ and _________ electronic data through ________ method. a. Solve, analyses, Intelligent b. Uncover, analyses, scientific c. Uncover, analyses, electronic d. Solve, analyses, electronic
Last Answer : b. Uncover, analyses, scientific
Description : Digital forensics is all of them except: a. Extraction of computer data. b. Preservation of computer data. c. Interpretation of computer data. d. Manipulation of computer data.
Last Answer : d. Manipulation of computer data.
Description : Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data.
Last Answer : (D) Manipulation of computer data.
Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.
Last Answer : D. Manipulation of computer data.
Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers
Last Answer : c. the bank has to keep a database of the public keys of all customers
Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system
Last Answer : d. using digital Signature system
Description : A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii)must be hardware implementable (iii) two different messages should not give the same hashed message (iv) ... signature a. i and ii b. ii and iii c. i and iii d. iii and iv
Last Answer : c. i and iii
Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.
Last Answer : D. To respect the privacy of others.
Description : How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6
Last Answer : d. 6
Description : Which of the following sciences pay vital role in criminal justice systems ? a. Digital Forensics b. Forensic Science c. PC Forensics d. INTERPOL Forensic
Last Answer : b. Forensic Science
Description : . How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6
Description : There are hoe many phases in RMDFR model of digital forensics? a. Four b. Six c. Eight d. Ten
Last Answer : b. Six
Description : Which of the following is not a model of digital forensics? a. RMDFR b. DFI c. IDIP d. UMDFPM
Last Answer : b. DFI
Description : There are how many models of digital forensics? a. 4 b. 5 c. 6 d. 8
Last Answer : c. 6
Description : How many Rules are there of Digital Forensics? a. 5 b. 6 c. 7 d. 4
Last Answer : b. 6
Description : Which of following is not a rule of digital forensics? A. An examination should be performed on the original data B. A copy is made onto forensically sterile media. New media should always be used ... D. The examination must be conducted in such a way as to prevent any modification of the evidence.
Last Answer : A. An examination should be performed on the original data
Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender
Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : Masters in Cyber security and digital forensics vs security certifications like CISSP,OHCP?
Last Answer : answer:
Description : what training is required for a digital forensics job?
Last Answer : The required training for a digital forensics job would include Computer Forensics Core Competencies, Windows Forensics Essentials, as well as Computer Forensics Fundamentals.
Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices
Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices
Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct
Last Answer : 1,2,3 are correct
Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Description : Encrypted data is referred as cipher text. -Technology
Last Answer : TrueEncrypted data is presented in coded form. So, it is known as cipher text.
Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned
Last Answer : lose the keys
Description : What is first step to Handle Retrieving Data from an Encrypted Hard Drive? A. Formatting disk B. Storing data C. Finding configuration files. D. Deleting files.
Last Answer : C. Finding configuration files.
Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv
Last Answer : a. i and ii
Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key
Last Answer : c. A encrypts message using B’s public key
Description : A message “COMPUTERNETWORK” encrypted(ignore quotes)using columnar transposition cipher with a key “LAYER”. The encrypted message is: (A) CTTOEWMROPNRUEK (B) MROUEKCTTPNROEW (C) OEWPNRCTTUEKMRO (D) UEKPNRMROOEWCTT
Last Answer : (C) OEWPNRCTTUEKMRO
Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it
Last Answer : c. scrambling it to preserve its security
Description : The hash function used in double hashing is of the form: (A) h(k, i)=(h1(k)+h2(k)+i)mod m (B) h(k, i)=(h1(k)+h2(k)-i)mod m (C) h(k, i)=(h1(k)+ih2(k))mod m (D) h(k, i)=(h1(k)-ih2(k))mod m
Last Answer : Answer: C
Description : A (n) ______camera records images on a disk instead of on films: a) video b) digital c) traditional d) None of The Above
Last Answer : b) digital
Description : Field of PC forensics began in which year ? a. 1975 b. 1944 c. 1971 d. 1980
Last Answer : d. 1980
Description : When cases go to trial, you as a forensics examiner can play one of ____ roles. a. 2 c. 4 b. 3 d.5
Last Answer : a. 2
Description : Who is the father of Computer Forensics? a. Anderson b. Palmer c. Ciardhuain d. Korn
Last Answer : a. Anderson
Description : When was pc forensics began? a. 1980 b. 1984 c. 1995 d. 1997
Last Answer : a. 1980
Description : which is following father of computer forensics a. M. Anderson b. G. Gunsh c. S. Ciardhuain d. G. Palmar
Last Answer : a. M. Anderson
Description : Forensics is the systematic trucking of incoming and outgoing ruffic on your network (a) Network (b) Computer (c) Criminal (d) Server
Last Answer : d) Server
Description : When cases go to trial forensics examiner can play one of role (a) 2 (b) 4 (c) 3 (d) 5
Last Answer : (b) 4
Description : When the field of PC forensics began? (A) 1960's (B) 1970's (C) 1980's (D) 1990's
Last Answer : (C) 1980's
Description : There are three c's in computer forensics. Which is one of the three? (A) Control (B) Chance (C) Chains (D) Core
Last Answer : A) Control