Professional Documents
Culture Documents
70 Digital Evidence must follow the requirement of the B)Best Evidence Rule
C)Exchange Rule
D)All of the mentioned
a) Forensics science
71 . ……….pays vital role in criminal justice systems b) Digital evidences
c) Volatile Evidence
d) All of the Above
a) Magnet Media Program
Federal Bureau of Investigation program is currently b) Computer Analysis and Response Team (CART)
72
referred to as……………. c) INTERPOL
d) Computer Forensic Laboratory
Government Polytechnic, Ratnagiri
Computer Engineering Department
ETI 22618 QUESTION BANK
UNIT NO 4 Digital Forensics
a) An examination should never be performed on the original data
b)The copy of the evidence must be an exact, bit-by-bit copy
73 Which of following are rule of digital forensics? c)The chain of custody of all evidence must be clearly maintained
d)The examination must be conducted in such a way as to prevent any modification of the evidence.
e) All of the Above
a) An examination should be performed on the original data
b) A copy is made onto forensically sterile media
74 Which of following is not a rule of digital forensics?
c) The copy of the evidence must be an exact, bit-by-bit copy
d) The chain of custody of all evidence must be clearly maintained
a) Extended Model of Cybercrime Investigation (EMCI)
Which model of Investigation proposed by b) Integrated Digital Investigation Process(IDIP)
75
S.Ciardhuain? c) Road Map for Digital Forensic Research (RMDFR)
d) Extended Model of Cybercrime Investigation (EMCI)
a) Abstract Digital Forensic model (ADFM)
Which Forensic Model is more likely the most b) Integrated Digital Investigation Process(IDIP)
76
comprehensive till date? c) Extended Model of Cybercrime Investigation (EMCI)
d) Road Map for Digital Forensic Research (RMDFR)
a) Identification
Which phase record the physical scene and duplicate
b) Preservation
77 digital evidence using standardized and accepted
c) Collection
procedures?
d) Examination
a) Readiness phase
Which phase provides a mechanism for an incident to be b) Deployment phase
78
detected and confirmed? c) Physical Crime Investigation phase
d) Digital Crime Investigation phase
a)Preservation phase
Which phase includes putting the pieces of a digital
b)Survey phase
79 puzzle together and developing investigative
c)Documentation phase
hypotheses?
d)Reconstruction phase
a) Preservation phase
Which phase investigator transfers the relevant data b) Survey phase
80 from a venue out of physical or administrative control c) Documentation phase
of the investigator to a controlled location? d) Reconstruction phase
e) Presentation phase
a) Physical crime investigation
Government Polytechnic, Ratnagiri
Computer Engineering Department
ETI 22618 QUESTION BANK
UNIT NO 4 Digital Forensics
Which phase entails a review of the whole investigation b) Digital crime investigation.
81
and identifies area of improvement? c) Review phase.
d) Deployment phase
a) Honesty towards the investigation
Ethical decision making in digital forensic work consist b) Prudence means carefully handling the digital evidences
82
which of the following: c) Compliance with the law and professional norms.
d) All of the Above
a) To contribute to society and human being.
Which of following is not general ethical norm for
83 b) To express an opinion on the guilt or innocence belonging to any party
Investigator?
c) To be honest and trustworthy.
d) To honor confidentially.
a) Uphold any relevant evidence.
Which of following is a not unethical norm for Digital b) Declare any confidential matters or knowledge.
84
Forensics Investigation? c) Distort or falsify education, training, credentials.
d) Should be fair and take action not to discriminate.
a) Authentic and Accurate.
Which of the following is not a property of computer b) Complete and Convincing.
85
evidence? c) Duplicated and Preserved.
d) Conform and Human Readable.
a) Crime
b) Security
86 . ……….can breaks investigation.
c) Digital Forensic
d) Evidence
a) Attacker and victim and the crime scene
The digital evidence are used to establish a credible link b) Attacker and the crime scene
87
between……………… c) Victim and the crime scene
d) Attacker and Information
a) Ideal Evidence rule
Digital evidences must follow the requirements of the b) Best Evidence rule
88
……………. c) Exchange rule
d) All of the above
a) Superior evidence
The true or real copy of the evidence media which is b) Best Evidence
89
given by victim/client. c) Original Evidence
d) All of the Above
Government Polytechnic, Ratnagiri
Computer Engineering Department
ETI 22618 QUESTION BANK
UNIT NO 4 Digital Forensics
a) Admissible
Which property defines evidence must be usable in the b) Authentic
90
court. c) Complete
d) Reliable
From the two given statements 1 and 2, select the correct a) 1 and 2 both are true
option from a-d.
1. Original media can be used to carry out digital b) 1 is true and 2 is false
91
investigation process. c) 1 and 2 both are false
2. By default, every part of the victim’s computer is
considered as unreliable d) 1 is false and 2 is true
a) Internet-based
b) Stand-alone computers
92 Which of following is/are sources of digital evidence?
c) Mobile devices
d) All of the Above
The criminological principle which states that, when a) Locard’s Exchange Principle
anyone, or anything, enters a crime scene he/she takes b) Differential Association Theory
93
something of the scene with him/her, and leaves c) Beccaria’s Social Contract
something of himself/herself behind, is: d) None of the above
a) Locard’s Exchange principle
When an incident takes place, a criminal will leave hint
b) Anderson’s Exchange principle
94 evidence at the scene and remove a hint from the
c) Charles’s Anthony principle
scene which is called as ………………..
d) Kevin Ashton principle
a) Victims and offenders
Evidence transfer in the physical and digital dimensions
b) Victims and crime scenes
95 helps investigators establish connections
c) Offenders and crime scenes
between………….
d) Victims, offenders and crime scenes
a) Stored on electronic device
Digital evidence is also defined as Information and data b) Transmitted by an electronic device
96
of value to an investigation that is ………. c) Received by an electronic device
d) All of the above
a) Digital evidence
The evidences or proof that can be obtained from the b) Demonstrative evidence
97
electronic source is called as……… c) Explainable evidence
d) Substantial evidence
a) Demonstrative evidence
Photographs, videos, sound recordings, graphs, and b) Explainable Evidence
98
charts are examples of which type of evidence. c) Substantial Evidence
Government Polytechnic, Ratnagiri
Computer Engineering Department
ETI 22618 QUESTION BANK
UNIT NO 4 Digital Forensics
d) Testimonial
a) Illustrative evidence
Dried blood, fingerprints, DNA samples, casts of
b) Explainable Evidence
99 footprints at the crime scene are examples which type of
c) Documented evidence
evidence.
d) Substantial evidence
a) Demonstrative evidence
The evidence spoken by the spectator under the oath is b) Documented Evidence
100
which type of evidence c) Substantial Evidence
d) Testimonial
a) Complete
For an evidence to be admissible, it is necessary that it b) Authenticated
101
should be…………… c) Reliable
d) Believable
a) Save the original materials.
b) Take photos of physical evidence.
102 Which is the important to establish a chain of custody? c) Take screenshots of digital evidence content.
d) Document date, time, and any other information of receipt.
e) All of the Above
a) Work with the original evidence to develop procedures.
b) Use clean collecting media.
103 Which is not related with digital evidence?
c) Document any extra scope.
d) Consider safety of personnel at the scene.
a) Evidence verification
The process of ensuring that providing the data that you
b) Evidence validation
104 have collected is similar to the data presented in a court
c) Evidence authentication
is known as……………
d) Best evidence
a) Main memory
b) Temporary file systems
105 Which of following is a most volatile evidence source?
c) Registers and cache
d) Secondary memory
a) Homicide and sexual assault
Computers can be involved in which of the following b) Computer intrusions and intellectual property theft
106
types of crime? c) Civil disputes
d) All the above