Computer Forensics Mid - I, September - 2014
1.The biggest issue surrounding the computer forensics conundrum is a shortage of ___ who have a working knowledge of computer forensics.
-
Technologists
-
Enforcement agencies
-
Academicins
-
Awareness
-
Answer: A
2.Computer ExpertiseBelongs to the Computer _____________
-
Crime Investigators Association
-
Computer Crime
-
Computer Technologists
-
None
-
Answer: A
3.Techniques and automated tools that are used to capture and evaluate __ should be demonstrated in a training course.
-
Trojan Horse
-
File slack
-
Data Hiding techniques
-
analysis
-
Answer: B
4.A _ device shares the same evidentiary value as any other personal digital assistant (PDA)
-
PIM
-
DIM
-
RIM
-
ALL
-
Answer: C
5.In the online payment processing world, an acquiring bank provides internet merchant accounts.
-
merchant bank
-
Providing bank
-
Internet bank
-
acquiring bank
-
Answer: D
6.__ is any evidence supplied by a witness.
-
Hearsay
-
Volatile
-
testimonial
-
None
-
Answer: C
7.__ is difficult to investigate and prosecute.
-
Electronic criminal
-
Electonic Victim
-
Electronic Crime
-
none
-
Answer: C
8.Latest version of NTP is called ____
-
STD
-
xntp
-
TCP
-
OSI
-
Answer: B
9.Recovered data must be analyzed, and a coherent file must be ___ using advanced search programs specifically developed for this work.
-
Grabbed
-
uncovered
-
reconstructed
-
All
-
Answer: C
10.Network forensic data __ are key to an understanding of the network forensic data.
-
visualizers
-
Auditors
-
analysts
-
stealers
-
Answer: A
11.______________involves the preservation, identification, extraction, and documentationof computer evidence stored as data or magnetically encoded information.
Answer: Computer Forensics
12.Forensic software tools and methods can be used to identify __________________, logons, and other information.
Answer: Passwords
13.SVPN stand for _____________________.
Answer: Secure Virtual Private Network
14.A common example of a federated model is the ________________.
Answer: Passport
15.The thief’s motive is to gain goods and services at someone else’s expenseis called _______.
Answer: Oppurtunistic Theft
16.______________ are quickly gaining favor among storage administrators.
Answer: Image backups
17.Authentication means showing a true copy of the original; best evidence means presenting the __________.
Answer: Original
18.Logically, a ______________ is equivalent to an electronic safe deposit box.
Answer: Smart card
19.______________ is Internet jargon for advertising supported software (adware).
Answer: Spyware
20.___________ is the creation, management, and use of online, or digital, identities.
Answer: Identity Management