D. Manipulation of Computer Data
D. Manipulation of Computer Data
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
5. There are three c’s in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
6. When the field of PC forensics began?
A.1960’s
B.1970’s
C.1980’s
D.1990’s
A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
8. phase includes putting the pieces of a digital puzzle together and developing investigative
hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
10. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
11. Which file is used to store the user entered password?
A. .exe
B. .txt
C. .iso
D. .sam
12. is the process of recording as much data as possible to create reports and analysis on user
input.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
13. searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
14. Which term refers to modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
15. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law Enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
16. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D. EMMC chip
A. Crime
B. Security
C. Digital Forensic
D. Evidence
18. is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick launch
C. OneLogin
D. Centrify
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain