Assignment No.4 ETI
Assignment No.4 ETI
2. The evidences of proof that can be obtained from the electronic source is called the
a. Digital Evidence
b. Demonstrative Evidence
c. Explainable Evidence
d. Substantial Evidence
3. What are the three general categories of computer systems that can contain digital evidence?
a.Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c.Hardware, software, networks
d.Open computer systems, communication systems, embedded systems
5. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of
himself/herself behind, is:
a.Locard’s Exchange Principle
b.Differential Association Theory
c. Beccaria‟s Social Contract
d. None of the above
6. Personal computers and networks are often a valuable source of evidence. Those involved
with------should be comfortable with this technology
a.Criminal investigation
b. Prosecution
c. Defense work
d. All of the above
7. Computer professionals who take inappropriate actions when they encounter child
pornography on their employer’s systems can lose their jobs or break the law.
a.True
b. False
11. Although it was not designed with evidence collection in mind, can still be
useful for examining network traffic.
a.EnCase
b. FTK
c. Wireshark
d. CHKDSK
12. The process of documenting the seizure of digital evidence and, in particular, when that evidence
changes hands, is known as:
a. Chain of custody
b. Field notes
c. Interim report
d. None of the above
13. Evidence contained in a document provided to prove that statements made in court are true is
referred to as:
a. Inadmissible evidence
b. Illegally obtained evidence
c. Hearsay evidence
d. Direct evidence
14. Business records are considered to be an exception to:
a. Direct evidence
b. Inadmissible evidence
c. Illegally obtained evidence
d. Hearsay evidence
19. Which of the following should the digital investigator consider when arranging for the
transportation
of evidence?
a.Should the evidence be physically in the possession of the investigator at all times?
b.Will the evidence copies be shared with other experts at other locations?
c.Will there be environmental factors associated with the digital media?
d.All of the above
20. When a network is involved in a crime, investigators must seize and preserve all systems on the
network.
a.True
b. False
23. When presenting evidence on an organizational network, the digital investigator may require the
assistance of:
a.System administrators
b.The CEO of the organization
c.The CSO (Chief Security Officer)
d.Additional forensic investigators
27. Automobiles have computers that record data such as vehicle speed, brake status, and throttle
position when an accident occurs.
a.True
b. False
28. Examination of digital evidence includes (but is not limited to) which of the following activities?
a.Seizure, preservation, and documentation
b. Recovery, harvesting, and reduction
c. Experimentation, fusion, and correlation
d. Arrest, interviewing, and trial
29. Analysis of digital evidence includes which of the following activities?
a.Seizure, preservation, and documentation
b.Experimentation, fusion, and correlation
c. Recovery, harvesting, and reduction
d. Arrest, interviewing, and trial
30. When a website is under investigation, before obtaining authorization to seize the systems it is
necessary to:
a.Determine where the web servers are located
b.Inform personnel at the web server location that you‟ll be coming to seize the systems
c.Conduct a reconnaissance probe of the target website
d.None of the above
32. Chain of custody is the process of documenting who has handled evidence, where and when, as it
travels from the crime scene to the courts.
a. True
b. False
33. In those states with legislation addressing computer forgery, contraband in the form of “forgery
devices” may include:
a.Computers
b. Computer equipment
c. Specialized computer software
d. All of the above
37. Which of the following should the digital investigator consider when arranging for the
transportation of evidence?
a.Should the evidence be physically in the possession of the investigator at all times?
b.Will the evidence copies be shared with other experts at other locations?
c.Will there be environmental factors associated with the digital media?
d.All of the above
40. When processing the digital crime scene in a violent crime investigation it is important to
have to ensure that all digital evidence and findings can hold up under close scrutiny.
a.A good supply of electrostatic bags for holding sensitive electronic components
b.More than one reliable camera for photographing the crime scene
c.Standard operating procedures for processing a digital crime scene
d.A good supply of nitrile gloves
Mission:
M1- To create opportunity for rural students with capable clever engineers and technocrats through continual excellence in engineering
education.M2-To create self-disciplined, skilled, physically and mentally fit and robust, ethically and morally powerful
engineers and technocrats with the higher degree of integrity who are responsible and capable to meet the challenges of
advance technology of present and future scenario for the welfare of mankind and nature..M3-Promote an educational
environment that integrates an excellent academic discipline and research culture to stimulate the overall technical and social
growth of young engineering graduates..M4-Enhance carrier opportunities for students through Industry-Institute-Interaction
and value-added courses training and skill development. .M5-Inculcate entrepreneurship mindset in students to enable them
job creators.
14._____ phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
15. In_____ phase investigator transfers the relevant data from a venue out of physical
or administrative control of
the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
18. A set of instruction compiled into a program that perform a particular task is
known as: A. Hardware.
B.CPU
C. Motherboard
D. Software
evidence. Vision: To be the recognized and the best rural based engineering college among the institutes in Maharashtra
20.
To collect and analyze the digital evidence that was obtained from the physical investigation phase, is
the goal of
which phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
21. To provide a mechanism to an incident to be detected and confirmed is purpose of which phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
22. Which phase entails a review of the whole investigation and identifies an area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
24. _is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
29. is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick launch
C. OneLogin
D. Centrify
30. Which of the following are general Ethical norms for Investigator?
A. To contribute to society and human beings. B. To avoid harm to others.
C. To be honest and trustworthy. D. All of the above
E. None of the above
32. Which of the following is not a general ethical norm for Investigator?
A. To contribute to society and human beings. B. Uphold any relevant Evidence.
C. To be honest and trustworthy. D. To honor confidentially.
33. Which of the following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
34. What is called as the process of creation a duplicate of digital media for purpose of examining it?
A. Acquisition.
Vision: To be the recognized and the best rural based engineering college among the institutes in Maharashtra for excellence in technical education
which contributes to the needs of society and to inculcate value-based education.
Mission:
M1- To create opportunity for rural students with capable clever engineers and technocrats through continual excellence in engineering
education.M2-To create self-disciplined, skilled, physically and mentally fit and robust, ethically and morally powerful engineers and technocrats
with the higher degree of integrity who are responsible and capable to meet the challenges of advance technology of present and future scenario for
the welfare of mankind and nature..M3-Promote an educational environment that integrates an excellent academic discipline and research culture to
stimulate the overall technical and social growth of young engineering graduates..M4-Enhance carrier opportunities for students through
Industry-Institute-Interaction and value-added courses training and skill development. .M5-Inculcate entrepreneurship mindset in students to enable
them job creators.
B. Steganography.
C. Live analysis
D. Hashing.
35. Which term refers to modifying a computer in a way which was not originally intended to view
Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of
a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Vision: To be the recognized and the best rural based engineering college among the institutes in Maharashtra for excellence in technical education
which contributes to the needs of society and to inculcate value-based education.
Mission:
M1- To create opportunity for rural students with capable clever engineers and technocrats through continual excellence in engineering
education.M2-To create self-disciplined, skilled, physically and mentally fit and robust, ethically and morally powerful engineers and technocrats
with the higher degree of integrity who are responsible and capable to meet the challenges of advance technology of present and future scenario for
the welfare of mankind and nature..M3-Promote an educational environment that integrates an excellent academic discipline and research culture to
stimulate the overall technical and social growth of young engineering graduates..M4-Enhance carrier opportunities for students through
Industry-Institute-Interaction and value-added courses training and skill development. .M5-Inculcate entrepreneurship mindset in students to enable
them job creators.
41. is the process of recording as much data as possible to create reports and analysis on user input.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
42. searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
43. What is the first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting Files
Vision: To be the recognized and the best rural based engineering college among the institutes in Maharashtra for excellence in technical education
which contributes to the needs of society and to inculcate value-based education.
Mission:
M1- To create opportunity for rural students with capable clever engineers and technocrats through continual excellence in engineering
education.M2-To create self-disciplined, skilled, physically and mentally fit and robust, ethically and morally powerful engineers and technocrats
with the higher degree of integrity who are responsible and capable to meet the challenges of advance technology of present and future scenario for
the welfare of mankind and nature..M3-Promote an educational environment that integrates an excellent academic discipline and research culture to
stimulate the overall technical and social growth of young engineering graduates..M4-Enhance carrier opportunities for students through
Industry-Institute-Interaction and value-added courses training and skill development. .M5-Inculcate entrepreneurship mindset in students to enable
them job creators.