Eti MCQS
Eti MCQS
a) Analysis
b) Collection
c) Identification
d) Documentation
Answer: c) Identification
a) Changing evidence
b) Keeping information private
c) Breaking laws
d) Sharing secrets
a) Review
b) Deployment
c) Readiness
d) Digital Crime Investigation
Answer: b) Deployment
6. What is the purpose of the Reconstruction step in the Abstract Digital Forensic
Model (ADFM)?
a) Analyzing logs
b) Identifying missing links and recreating events
c) Deleting unnecessary data
d) Storing evidence securely
Answer: a) It verifies whether the collected evidence supports the investigation theory
9. Which of the following is NOT an unethical norm in digital forensics?
a) Changing evidence
b) Not keeping records
c) Using data wrongly
d) Following the law
10. A forensic investigator finds a suspicious deleted file on a suspect’s laptop. What
should they do next?
Answer: B) Any information or data that is stored electronically and can prove something in a legal case
A) Text messages
B) Emails
C) Fingerprints
D) Internet search history
Answer: C) Fingerprints
13. What does the Best Evidence Rule state?
A) The most complete and original version of evidence must be presented in court whenever possible
B) Copies of evidence are always preferred over original documents
C) Evidence must be written down to be admissible in court
D) Digital evidence is not considered valid unless printed
Answer: A) The most complete and original version of evidence must be presented in court whenever
possible
Answer: B) The first or primary source of digital data, such as a hard drive or mobile phone
Answer: A) By using forensic imaging tools to create exact copies of the data
Answer: B) A continuous flow of binary data (0s and 1s) that forms digital content
A) Printed contract
B) CCTV footage
C) DNA sample
D) Handwritten letter
A) Encrypting emails
B) Generating a unique hash to verify data integrity
C) Compressing digital files
D) Changing file formats
26. Why is it important to work with a copy of digital evidence instead of the original?
28. A suspect's email was recovered from a deleted folder, but the metadata shows an
access time after the warrant was issued. What could be a potential issue?
A) The email is not admissible in court due to the chain of custody breach
B) Digital evidence cannot be recovered once deleted
C) The email is fake and cannot be used in an investigation
D) Metadata does not affect the authenticity of digital evidence
Answer: A) The email is not admissible in court due to the chain of custody breach
29. From the two given statements, select the correct option
1) Original media can be used to carry out digital investigation process.
2) By default, every part of the victim’s computer is considered unreliable.
A) 1) and 2) both are correct
B) 1) is true 2) is false
C) 1) and 2) both are false
D) 1) is false and 2) is true
30. If two copies of the same digital evidence have different hash values, what does this
indicate?