0% found this document useful (0 votes)
7 views

ETI assignment 3.

The document outlines key concepts and principles of digital forensics, including the identification, preservation, recovery, and presentation of digital evidence. It discusses the roles and responsibilities of digital forensic investigators, legal issues, phases of investigation, and ethical norms. Additionally, it highlights important figures and models in the field of computer forensics.

Uploaded by

vinitppatil789
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

ETI assignment 3.

The document outlines key concepts and principles of digital forensics, including the identification, preservation, recovery, and presentation of digital evidence. It discusses the roles and responsibilities of digital forensic investigators, legal issues, phases of investigation, and ethical norms. Additionally, it highlights important figures and models in the field of computer forensics.

Uploaded by

vinitppatil789
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

11. Digital Forensics entails _____.

A. Accessing the system's directories viewing mode and navigating through


the various systems

files and folders

B. Undeleting and recovering lost files

C. Identifying and solving computer crimes

D. The identification, preservation, recovery, restoration and presentation of


digital evidence

from systems and devices

Ans: D

12. Which of the following is FALSE?

A. The digital forensic investigator must maintain absolute objectivity

B. It is the investigator’s job to determine someone’s guilt or innocence.

C. It is the investigator’s responsibility to accurately report the relevant facts


of a case.

D. The investigator must maintain strict confidentiality, discussing the results


of an

investigation on only a “need to know”

Ans: B

13. What is the most significant legal issue in computer forensics?

A. Preserving Evidence

B. Seizing Evidence

C. Admissibility of Evidence

D. Discovery of Evidence

Ans: C

14. _______phase includes putting the pieces of a digital puzzle together and
developing

investigative hypotheses
A. Preservation phase

B. Survey phase

C. Documentation phase

D. Reconstruction phase

E. Presentation phase

Ans: D

15. In _______phase investigator transfers the relevant data from a venue out
of physical or

administrative control of the investigator to a controlled location

A. Preservation phase

B. Survey phase

C. Documentation phase

D. Reconstruction phase

E. Presentation phase

Ans:B

16. In _______phase investigator transfers the relevant data from a venue out
of physical or

administrative control of the investigator to a controlled location

F. Preservation phase

G. Survey phase

H. Documentation phase

I. Reconstruction phase

J. Presentation phase

Ans:B

17. Computer forensics do not involve_____activity. A.

Preservation of computer data.

B. Exraction of computer data.


C. Manipulation of computer data.

D. Interpretation of computer data.

Ans: C

18. A set of instruction compiled into a program that perform a particular


task is known as: A.

Hardware.

B.CPU

C. Motherboard

D. Software

Ans: D

19. Which of following is not a rule of digital forensics?

A. An examination should be performed on the original data

B. A copy is made onto forensically sterile media.

C. The copy of the evidence must be an exact, bit-by-bit copy

D. The examination must be conducted in such a way as to prevent any


modification of the

evidence.

Ans: A

20. To collect and analyze the digital evidence that was obtained from the
physical investigation

phase, is the goal of which phase? A. Physical crime investigation

B. Digital crime investigation.

C. Review phase.

D. Deployment phase.

Ans: B

21. To provide mechanism to an incident to be detected and confirmed is


purpose of which phase?

A. Physical crime investigation


B. Digital crime investigation.

C. Review phase.

D. Deployment phase.

Ans: D

22. Which phase entails a review of the whole investigation and identifies
area of improvement?

A. Physical crime investigation


B. Digital crime investigation.
C. Review phase.
D. Deployment phase Ans: C

23. ____________is known as father of computer forensic.

A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.

Ans: C

24. ___________is well established science where various contribution have


been made

A. Forensic

B. Crime

C. Cyber Crime

E. Evidence

Ans: A

25. Who proposed End to End Digital Investigation Process (EEDIP)?

A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain

Ans: B

26. Which model of Investigation proposed by Carrier and Safford?


A. Extended Model of Cybercrime Investigation (EMCI)
B. Integrated Digital Investigation Process(IDIP)
C. Road Map for Digital Forensic Research (RMDFR)
D. Abstract Digital Forensic Model (ADFM)

Ans: B

27. Which of the following is not a property of computer evidence?

A. Authentic and Accurate.

B. Complete and Convincing.

C. Duplicated and Preserved.

E. Conform and Human Readable. Ans. D

28. _______can makes or breaks investigation.

A. Crime

B. Security

C: Digital Forensic

D: Evidence

Ans: D

29. __________ is software that blocks unauthorized users from connecting to


your computer.

A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify

Ans: A

30. Which of following are general Ethical norms for Investigator?

A. To contribute to society and human being.

B. To avoid harm to others.

C. To be honest and trustworthy.

E. All of above
F. None of above
Ans: D

You might also like