0% found this document useful (0 votes)
5K views4 pages

D. Manipulation of Computer Data

The document consists of a series of multiple-choice questions related to digital forensics, covering topics such as the definition of digital forensics, the Integrated Digital Investigation Process (IDIP), legal issues, and key figures in the field. It also addresses technical aspects like data preservation, software, and mobile device components relevant to forensic investigations. Overall, it serves as a quiz or educational tool for understanding digital forensic principles and practices.

Uploaded by

patilkiran1808
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5K views4 pages

D. Manipulation of Computer Data

The document consists of a series of multiple-choice questions related to digital forensics, covering topics such as the definition of digital forensics, the Integrated Digital Investigation Process (IDIP), legal issues, and key figures in the field. It also addresses technical aspects like data preservation, software, and mobile device components relevant to forensic investigations. Overall, it serves as a quiz or educational tool for understanding digital forensic principles and practices.

Uploaded by

patilkiran1808
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Digital forensics is all of them except:

A. Extraction of computer data.

B. Preservation of computer data.

C. Interpretation of computer data.

D. Manipulation of computer data.

2. IDIP stands for

A. Integrated Digital Investigation Process.


B. Integrated Data Investigator Process.

C. Integrated Digital Investigator Process.

D. Independent Digital Investigator Process.

3. Who proposed Road Map for Digital Forensic Research (RMDFR)

A. G.Gunsh.

B. S.Ciardhuain

C. J.Korn.

D. G.Palmar

4. The investigator should satisfy the following points:

A. Contribute to society and human beings.

B. Avoid harm to others.

C. Honest and trustworthy.


D. All of the above

5. There are three c’s in computer forensics. Which is one of the three?

A. Control
B. Chance
C. Chains
D. Core
6. When the field of PC forensics began?

A.1960’s

B.1970’s

C.1980’s

D.1990’s

7. What is the most significant legal issue in computer forensics?

A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence

8. phase includes putting the pieces of a digital puzzle together and developing investigative
hypotheses

A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase

9. Computer forensics do not involve activity.

A. Preservation of computer data.

B. Extraction of computer data.


C. Manipulation of computer data.

D. Interpretation of computer data.

10. A set of instruction compiled into a program that perform a particular task is known as:

A. Hardware.

B.CPU

C. Motherboard

D. Software
11. Which file is used to store the user entered password?

A. .exe
B. .txt
C. .iso
D. .sam

12. is the process of recording as much data as possible to create reports and analysis on user
input.

A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.

13. searches through raw data on a hard drive without using a file system.

A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.

14. Which term refers to modifying a computer in a way which was not originally intended to
view Information?

A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy

15. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law Enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation

16. What are the important parts of the mobile device which used in Digital forensic?

A. SIM
B. RAM
C. ROM.
D. EMMC chip

17. can makes or breaks investigation.

A. Crime
B. Security
C. Digital Forensic
D. Evidence

18. is software that blocks unauthorized users from connecting to your computer.

A. Firewall
B. Quick launch
C. OneLogin
D. Centrify

19. is known as father of computer forensic.

A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.

20.Who proposed End to End Digital Investigation Process (EEDIP)?

A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain

You might also like