0% found this document useful (0 votes)
69 views5 pages

Chapter 3 Digital Forensics

This document contains a chapter on digital forensics from an information technology course. It includes [1] questions about digital forensic concepts like network forensics, drive slack, and Windows Registry, [2] considerations for determining the scope of a digital investigation, and [3] questions about embedded system architectures, instruction sets, and assembly language programming.

Uploaded by

Abhinav Gadekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views5 pages

Chapter 3 Digital Forensics

This document contains a chapter on digital forensics from an information technology course. It includes [1] questions about digital forensic concepts like network forensics, drive slack, and Windows Registry, [2] considerations for determining the scope of a digital investigation, and [3] questions about embedded system architectures, instruction sets, and assembly language programming.

Uploaded by

Abhinav Gadekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Marthwada Mitra Mandal's Polytechnic

Course :- Emerging Trends in Computer and Infromation Technology


Chapter 3 - Digital forensics

Sr.No Question A B C D Answer

systematic tracking of incoming and outgoing traffic: to


ascertain how an attack was carried out or how an event
occurred on a network.
2.  Windows 3.  Network
1 1. SIM Cards Registry Forensics 4.  Drive Slack C
-intruders and network users often leave trail behind
-identify locations where relevant digital evidence exists
-crucial when developing data map of digital evidence

2 a logical drive 1. EEPROM 2. PDA's 3. SIM Cards 4. Partition D


Considerations
-determine the scope of the investigation. 1. Examination
3 -determine what the case requires 2. Drive Slack 3. Partition 4. SIM Cards A
-whether you should collect all info Plan
-what to do in case of scope creep

Can be exported as:


4 -RTF ~good for thumbnails and book marks 1. Drive Slack 2. Write Blockers 3. Windows 4. ProDiscover D
Registry Report
-TEXT~plain text

electronically erasable programmable read-only memory

-how phones store system data


5 -enables service providers to reprogram phones without having 1. Partition 2. file system 3. EEPROM 4. SIM Cards C
to physically access memory chips
-OS is stored in ROM: nonvolatile memory

file manipulation: file names and extensions/ hidden property


6 1. Windows 2. Examination 3. Virtual 4. Data-hiding D
-disk manipulation: hidden partitions/bad clusters Registry Plan Machine Techniques
-encryption: bit shifting/stenography

gives us a road map to data on a disk


7 -type of file system an OS used determines how data is stored 1. file system 2. Drive Slack 3. EEPROM 4. SIM Cards A
on the disk
a database that stores hardware and software configuration
information, network connections, user preferences, and setup 2. Windows
8 information. 1. SIM Cards 3. file system 4. Write Blockers B
-can contain valuable info about current/past applications and Registry
user created information

unused space in a cluster between the end of an active file and


9 the end of a cluster. (Includes RAM slack and file slack) 1. SIM Cards 2. file system 3. Write Blockers 4. Drive Slack D

10 Which one of the following offers CPUs as integrated memory a) b) c) Embedded d) Memory A
or peripheral interfaces? Microcontroller Microprocessor system system

11 Which of the following offers external chips for memory and a) b) c) Peripheral d) Embedded B
peripheral interface circuits? Microcontroller Microprocessor system system

12 How many bits does an MC6800 family have? a) 16 b) 32 c) 4 d) 8 D


d) National COP
13 Which of the following is a 4-bit architecture? a) MC6800 b) 8086 c) 80386 series D

c)
a) Computing b) Complex d) Complex
14 What is CISC? instruction set instruction set Complimentary instruction set B
instruction set
complex computing computing complementary

15 How is the protection and security for an embedded system a) OTP b) IPR c) Memory disk d) Security chips B
made? security
16 Which of the following possesses a CISC architecture? a) MC68020 b) ARC c) Atmel AVR d) Blackfin A

17 Which of the following is a RISC architecture? a) 80286 b) MIPS c) Zilog Z80 d) 80386 B
18 Which one of the following is board based system? a) Data bus b) Address bus c) VMEbus d) DMA bus C
c) Vertical d) Vertical
a) Versa module b) Versa module module module Europa
19 VME bus stands for Europa bus embedded bus A
embedded bus bus
20 Which of the following has a Harvard architecture? a) EDSAC b) SSEM c) PIC d) CSIRAC C
c. Fast data
21 What are the essential tight constraint/s related to the design a. Ability to fit on b. Low power processing for d. All of the D
metrics of an embedded system? a single chip consumption real-time above
operations

Which abstraction level undergo the compilation process by


22 converting a sequential program into finite-state machine and a. System b. Behaviour c. RT d. Logic B
register transfers while designing an embedded system?
Which characteristics of an embedded system exhibit the
responsiveness to the assortments or variations in system's a. Single- b. Tightly- c. Reactive & d. All of the
23 functioned constraint Real time C
environment by computing specific results for real-time Characteristic Characteristics Characteristics above
applications without any kind of postponement ?

24  Is the following instruction correct LDI R3,50? a) Yes b) No c) Cant be said d) None of the B
mentioned

a) they are used


25 Registers R0-R31 are used for what type of works? for arithmetic b) they are used c) they are used d) none of the A
and logic for data copy for calculations mentioned
instructions

26 The largest value that can be loaded in an 8 bit register is? a) 11111111H b) FH c) FFH d) 00H C

Which out of the following instructions don’t affect the flags of


27 the status register? a) AND b) INC c) OR d) ADD D
28  Which out of the following is not a directive? a) .EQU b) .DEVICE c) .ORG d) .LDI D
d) None of the
29  Is an assembly language a high level language? a) Yes b) No c) Cant be said mentioned B

A 14 bit program counter can execute a maximum of _________


30 a) 4K b) 8K c) 16K d) 64K C
memory locations?
31 When AVR wakes up, then the value of PC becomes? a) 00H b) 000H c) 0000H d) 00000H D
32
33
34
35
36
37
38
39
40
41
42
43
44
When AVR wakes up, then the value of PC becomes?
a) 00H
b) 000H
c) 0000H
d) 00000H
When AVR a)
w 00H b) 000H c) 0000H d) 00000H

You might also like