ETI Chapter 3 Assignment
ETI Chapter 3 Assignment
Ans:D
Ans: A
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____
question based on
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros
(the document opens and the application automatically runs); spread via
email
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c’s in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989
Ans: B
A.1960’s
B.1970’s
C.1980’s
D.1990’s
Ans: C
Involving the analysis of digital evidence after proper search authority, the
chain of custody,
Expert presentation
Ans: B
Ans: D
Ans: B
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and
developing
Investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out
of physical or
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: B
16. In _______phase investigator transfers the relevant data from a venue out
of physical or
Administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: B
Ans: C
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
B. A copy is made onto forensically sterile media. New media should always
be used if
Available.
Evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the
physical investigation
C. Review phase.
D. Deployment phase.
Ans: B
Phase?
C. Review phase.
D. Deployment phase.
Ans: D
22. Which phase entails a review of the whole investigation and identifies an
area of improvement?
C. Review phase.
D. Deployment phase
Ans: C
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B
26. Which model of Investigation proposed by Carrier and Safford?
Ans: B
Ans. D
A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D
A. Firewall
B. Quick launch
C. OneLogin
D. Centrify
Ans: A
30. Which of the following are general Ethical norms for Investigator?
Ans: D
Ans: D
32. Which of the following is not a general ethical norm for Investigator?
D. To honor confidentially.
Ans: B
33. Which of the following is a not unethical norm for Digital Forensics
Investigation?
Ans: D
34. What is called as the process of creation a duplicate of digital media for
purpose of
Examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers to modifying a computer in a way which was not
originally intended to
View Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s
computer is an
Example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital
forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital
forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
On user input.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
Ans: A
42. ________searches through raw data on a hard drive without using a file
system.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
Ans: B
43. What is the first step to Handle Retrieving Data from an Encrypted Hard
Drive?
A. Formatting disk
B. Storing data
D. Deleting Files
Ans: C