Professional Documents
Culture Documents
The application of computer for investigating computer‐based crime has led to development
of a new field called ___________.
a. Computer Forensics
b. Computer Security
c. Information Security
d. Computer Investigation
ANS: a
2. _________ is maintaining confidentiality, integrity and availability of computer systems.
a. Computer Forensics
b. Computer Security
c. Information Security
d. Computer Investigation
ANS: b
3. Which of the following data is not requested for digital forensics examination?
a. E‐Mail usage
b. cell phone usage
c. file activity history
d. Criminal database
ANS: d
4. The objective of Cyberforensics is to provide __________ of a specific or general activity.
a. digital evidence
b. Computer evidence
c. Digital forensics
d. Computer forensics
ANS: a
5. Which of the following is not a role of digital forensics?
a. Uncover and document evidence and leads
b. Reveal an end‐to‐end path of events
c. Extract data that may be hidden, deleted
d. Arrest the criminal
ANS: d
6. Which of the following scenario is involved in digital forensics?
a. Road accident
b. Copyright violation
c. Theft of ornaments
d. Gas leakage
ANS: b
7. Using digital forensics techniques, which of the following one cannot do?
a. Insert incorrect assumptions
b. Provide help to verify an intrusion hypothesis
c. classify evidence
d. Generate investigative leads
ANS: a
8. _________ means the chronological documentation trail, etc. that indicates the seizure,
custody, control, transfer, analysis and disposition of evidence, physical or electronic.
a. Evidence
b. First Information Report
c. Chain of custody
d. IT Act
ANS: c
9. Network Forensics is the study of __________.
a. Network traffic
b. Network topology
c. Network administration
d. Network protection
ANS: a
10. Computer forensics experts know the techniques to ______the data.
a. Delete
b. Copy
c. backup
d. retrieve
ANS: d
11. Placing the evidence in the correct context to read its meaning is known as ________
context involved in actually identifying a piece of digital evidence.
a. Physical
b. Logical
c. Legal
d. Actual
ANS: c
12. Which of the following is not the source for Digital Evidence?
a. E‐Mail Messages
b. Web pages
c. Memory cards
d. Chain of custody
ANS: d
13. Email ______information varies with E‐Mail service provider, E‐Mail applications and system
configuration.
a. Header
b. Body
c. Sender
d. Recipient
ANS: a
14. The E‐Mail header and body are separated by a ___________.
a. blank line
b. Special character
c. Signature
d. Message‐ID
ANS: a
15. As per RFC 2822, Message‐ID included within a pair of ________.
a. Angel brackets
b. Square brackets
c. Arc brackets
d. Curly brackets
ANS: a