Professional Documents
Culture Documents
OBJECTIVE
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 20.
a) 2 b) 6 c) 7 d) 9
4. The tools that are responsible for creating forensic duplicate are [ d]
a) Unix dd command b) dfc/dd command c) open source open data duplicator d) All the above
a) Hiding Partition and Encryption b) Steganography and Bit Stuffing c) Live Search d) NOTA
9. _________ is a built-in system tool that manages all listening ports along with their current
connection [ c]
10. It is a type of attack in which the words are commonly found in the dictionary are used a
passwords in the program [ d]
12. ______ is system utility offered by foundtone.com for identifying successful and failed
logons [ a]
14. _____ function responsible for verifying the values of checksum in an image file [ a]
a) 5 b) 3 c) 2 d) 1
a) Traditional Investigation Steps b) Assembling the Computer Security Incident Response Team
c) Incident Declaration d) Conducting Interview
18. The main task is to generate reports in which incident details are defined [ a ]
19. ______ is a built-in tool of Windows Operating System which offers a command based
interface [c ]
20. ________ search can search for alphanumeric and hexadecimal values on the evidence drive
[ a ]