Computer Forensics Mid - I, September - 2014

1.The biggest issue surrounding the computer forensics conundrum is a shortage of ___ who have a working knowledge of computer forensics.
  • Technologists
  • Enforcement agencies
  • Academicins
  • Awareness
Answer: A
2.Computer ExpertiseBelongs to the Computer _____________
  • Crime Investigators Association
  • Computer Crime
  • Computer Technologists
  • None
Answer: A
3.Techniques and automated tools that are used to capture and evaluate __ should be demonstrated in a training course.
  • Trojan Horse
  • File slack
  • Data Hiding techniques
  • analysis
Answer: B
4.A _ device shares the same evidentiary value as any other personal digital assistant (PDA)
  • PIM
  • DIM
  • RIM
  • ALL
Answer: C
5.In the online payment processing world, an acquiring bank provides internet merchant accounts.
  • merchant bank
  • Providing bank
  • Internet bank
  • acquiring bank
Answer: D
6.__ is any evidence supplied by a witness.
  • Hearsay
  • Volatile
  • testimonial
  • None
Answer: C
7.__ is difficult to investigate and prosecute.
  • Electronic criminal
  • Electonic Victim
  • Electronic Crime
  • none
Answer: C
8.Latest version of NTP is called ____
  • STD
  • xntp
  • TCP
  • OSI
Answer: B
9.Recovered data must be analyzed, and a coherent file must be ___ using advanced search programs specifically developed for this work.
  • Grabbed
  • uncovered
  • reconstructed
  • All
Answer: C
10.Network forensic data __ are key to an understanding of the network forensic data.
  • visualizers
  • Auditors
  • analysts
  • stealers
Answer: A
11.______________involves the preservation, identification, extraction, and documentationof computer evidence stored as data or magnetically encoded information.
Answer: Computer Forensics
12.Forensic software tools and methods can be used to identify __________________, logons, and other information.
Answer: Passwords
13.SVPN stand for _____________________.
Answer: Secure Virtual Private Network
14.A common example of a federated model is the ________________.
Answer: Passport
15.The thief’s motive is to gain goods and services at someone else’s expenseis called _______.
Answer: Oppurtunistic Theft
16.______________ are quickly gaining favor among storage administrators.
Answer: Image backups
17.Authentication means showing a true copy of the original; best evidence means presenting the __________.
Answer: Original
18.Logically, a ______________ is equivalent to an electronic safe deposit box.
Answer: Smart card
19.______________ is Internet jargon for advertising supported software (adware).
Answer: Spyware
20.___________ is the creation, management, and use of online, or digital, identities.
Answer: Identity Management