Computer Forensics Mid - I, September - 2014
1.The biggest issue surrounding the computer forensics conundrum is a shortage of ___ who have a working knowledge of computer forensics.
- 
                                            Technologists
- 
                                            Enforcement agencies
- 
                                            Academicins
- 
                                            Awareness
- 
                                            
                                                Answer: A
                                            
                                        2.Computer ExpertiseBelongs to the Computer _____________
- 
                                            Crime Investigators Association
- 
                                            Computer Crime
- 
                                            Computer Technologists
- 
                                            None
- 
                                            
                                                Answer: A
                                            
                                        3.Techniques and automated tools that are used to capture and evaluate __ should be demonstrated in a training course.
- 
                                            Trojan Horse
- 
                                            File slack
- 
                                            Data Hiding techniques
- 
                                            analysis
- 
                                            
                                                Answer: B
                                            
                                        4.A _ device shares the same evidentiary value as any other personal digital assistant (PDA)
- 
                                            PIM
- 
                                            DIM
- 
                                            RIM
- 
                                            ALL
- 
                                            
                                                Answer: C
                                            
                                        5.In the online payment processing world, an acquiring bank provides internet merchant accounts.
- 
                                            merchant bank
- 
                                            Providing bank
- 
                                            Internet bank
- 
                                            acquiring bank
- 
                                            
                                                Answer: D
                                            
                                        6.__ is any evidence supplied by a witness.
- 
                                            Hearsay
- 
                                            Volatile
- 
                                            testimonial
- 
                                            None
- 
                                            
                                                Answer: C
                                            
                                        7.__ is difficult to investigate and prosecute.
- 
                                            Electronic criminal
- 
                                            Electonic Victim
- 
                                            Electronic Crime
- 
                                            none
- 
                                            
                                                Answer: C
                                            
                                        8.Latest version of NTP is called ____
- 
                                            STD
- 
                                            xntp
- 
                                            TCP
- 
                                            OSI
- 
                                            
                                                Answer: B
                                            
                                        9.Recovered data must be analyzed, and a coherent file must be ___ using advanced search programs specifically developed for this work.
- 
                                            Grabbed
- 
                                            uncovered
- 
                                            reconstructed
- 
                                            All
- 
                                            
                                                Answer: C
                                            
                                        10.Network forensic data __ are key to an understanding of the network forensic data.
- 
                                            visualizers
- 
                                            Auditors
- 
                                            analysts
- 
                                            stealers
- 
                                            
                                                Answer: A
                                            
                                        11.______________involves the preservation, identification, extraction, and documentationof computer evidence stored as data or magnetically encoded information.
                                                Answer: Computer Forensics
                                            
                                        12.Forensic software tools and methods can be used to identify __________________, logons, and other information.
                                                Answer: Passwords
                                            
                                        13.SVPN stand for _____________________.
                                                Answer: Secure Virtual Private Network
                                            
                                        14.A common example of a federated model is the ________________.
                                                Answer: Passport
                                            
                                        15.The thief’s motive is to gain goods and services at someone else’s expenseis called _______.
                                                Answer: Oppurtunistic Theft
                                            
                                        16.______________ are quickly gaining favor among storage administrators.
                                                Answer: Image backups
                                            
                                        17.Authentication means showing a true copy of the original; best evidence means presenting the __________.
                                                Answer: Original
                                            
                                        18.Logically, a ______________ is equivalent to an electronic safe deposit box.
                                                Answer: Smart card
                                            
                                        19.______________ is Internet jargon for advertising supported software (adware).
                                                Answer: Spyware
                                            
                                        20.___________ is the creation, management, and use of online, or digital, identities.
                                                Answer: Identity Management