Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B.Steganogrhy.
C.Liveanalysis
D. Hashing

1 Answer

Answer :

B.Steganogrhy.

Related questions

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.

Last Answer : Acquisition.

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing. 

Last Answer : A. Acquisition. 

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : Fill in the blanks. Digital Forensics is a series of steps to _________ and _________ electronic data through ________ method. a. Solve, analyses, Intelligent b. Uncover, analyses, scientific c. Uncover, analyses, electronic d. Solve, analyses, electronic

Last Answer : b. Uncover, analyses, scientific

Description : Digital forensics is all of them except: a. Extraction of computer data. b. Preservation of computer data. c. Interpretation of computer data. d. Manipulation of computer data.

Last Answer : d. Manipulation of computer data.

Description : Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data.

Last Answer : (D) Manipulation of computer data.

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data.

Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers 

Last Answer : c. the bank has to keep a database of the public keys of all customers

Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system

Last Answer : d. using digital Signature system 

Description : A hashing function for digital signature (i) must give a hashed message which is shorter than the original message (ii)must be hardware implementable (iii) two different messages should not give the same hashed message (iv) ... signature a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6

Last Answer : d. 6

Description : Which of the following sciences pay vital role in criminal justice systems ? a. Digital Forensics b. Forensic Science c. PC Forensics d. INTERPOL Forensic

Last Answer : b. Forensic Science

Description : . How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6

Last Answer : d. 6

Description : There are hoe many phases in RMDFR model of digital forensics? a. Four b. Six c. Eight d. Ten

Last Answer : b. Six

Description : Which of the following is not a model of digital forensics? a. RMDFR b. DFI c. IDIP d. UMDFPM

Last Answer : b. DFI

Description : There are how many models of digital forensics? a. 4 b. 5 c. 6 d. 8

Last Answer : c. 6

Description : How many Rules are there of Digital Forensics? a. 5 b. 6 c. 7 d. 4

Last Answer : b. 6

Description : Which of following is not a rule of digital forensics? A. An examination should be performed on the original data B. A copy is made onto forensically sterile media. New media should always be used ... D. The examination must be conducted in such a way as to prevent any modification of the evidence.

Last Answer : A. An examination should be performed on the original data 

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data. 

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : Masters in Cyber security and digital forensics vs security certifications like CISSP,OHCP?

Last Answer : answer:

Description : what training is required for a digital forensics job?

Last Answer : The required training for a digital forensics job would include Computer Forensics Core Competencies, Windows Forensics Essentials, as well as Computer Forensics Fundamentals.

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others. 

Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Encrypted data is referred as cipher text. -Technology

Last Answer : TrueEncrypted data is presented in coded form. So, it is known as cipher text.

Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned

Last Answer : lose the keys

Description : What is first step to Handle Retrieving Data from an Encrypted Hard Drive? A. Formatting disk B. Storing data C. Finding configuration files. D. Deleting files.

Last Answer : C. Finding configuration files. 

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key  

Last Answer : c. A encrypts message using B’s public key 

Description : A message “COMPUTERNETWORK” encrypted(ignore quotes)using columnar transposition cipher with a key “LAYER”. The encrypted message is: (A) CTTOEWMROPNRUEK (B) MROUEKCTTPNROEW (C) OEWPNRCTTUEKMRO (D) UEKPNRMROOEWCTT

Last Answer : (C) OEWPNRCTTUEKMRO

Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it

Last Answer : c. scrambling it to preserve its security 

Description : The hash function used in double hashing is of the form: (A) h(k, i)=(h1(k)+h2(k)+i)mod m (B) h(k, i)=(h1(k)+h2(k)-i)mod m (C) h(k, i)=(h1(k)+ih2(k))mod m (D) h(k, i)=(h1(k)-ih2(k))mod m

Last Answer : Answer: C

Description : A (n) ______camera records images on a disk instead of on films: a) video b) digital c) traditional d) None of The Above

Last Answer : b) digital

Description : Field of PC forensics began in which year ? a. 1975 b. 1944 c. 1971 d. 1980

Last Answer : d. 1980

Description : Field of PC forensics began in which year ? a. 1975 b. 1944 c. 1971 d. 1980

Last Answer : d. 1980

Description : When cases go to trial, you as a forensics examiner can play one of ____ roles. a. 2 c. 4 b. 3 d.5

Last Answer : a. 2

Description : Who is the father of Computer Forensics? a. Anderson b. Palmer c. Ciardhuain d. Korn

Last Answer : a. Anderson

Description : When was pc forensics began? a. 1980 b. 1984 c. 1995 d. 1997

Last Answer : a. 1980

Description : which is following father of computer forensics a. M. Anderson b. G. Gunsh c. S. Ciardhuain d. G. Palmar

Last Answer : a. M. Anderson

Description : Forensics is the systematic trucking of incoming and outgoing ruffic on your network (a) Network (b) Computer (c) Criminal (d) Server

Last Answer : d) Server

Description : When cases go to trial forensics examiner can play one of role (a) 2 (b) 4 (c) 3 (d) 5

Last Answer : (b) 4

Description : When the field of PC forensics began? (A) 1960's (B) 1970's (C) 1980's (D) 1990's

Last Answer : (C) 1980's

Description : There are three c's in computer forensics. Which is one of the three? (A) Control (B) Chance (C) Chains (D) Core

Last Answer : A) Control