Eti 3
Eti 3
Q. 35 Which term refers to modifying a computer in a way which was not originally intended to view information?
a) Metadata b) Live analysis
c) Hacking d) Bit Copy
Q. 36 The ability to recover and read deleted or damaged files from a criminal's computer is an
example of a law enforcement specialty called?
a Robotics b) Simulation
C) Computer Forensics d) Animation
a. 37 What are the important parts of the mobile device which used in Digital forensic?
a) SIM b) RAM
c) ROM. d) MMC chip
Q. 38 Using what, data hiding in encrypted images be carried out in digital forensics?
a) Acquisition. b) Steganography.
c) Live analysis d) Hashing.
Q. 39 Which of this is nota computer crime?
a) e-mail harassment b) Falsification of data.
c Sabotage. d) Identification of data
Q. 40 Which file is used to store the user entered passWord?
a) .exe b) .txt
c) .iso .sam
Tech Kaowiedse
PUDIcatios
Ermeryjny Trends in Computer&iT (MKTE) repots and anasis
to create
Q. 41 much data as possithe
is the process of recoding ss
on user input.
b) Data caring
a) Data rrining d Data Spoofing.
c) Metadata
eyem
wthout usi ja fle
a, 42 BOarches through rau data on a hard drve
b) Data caving
Data rminirg
d) Data Spoofing
c) Metadata
Hard Drve?
Q. 43 What is theefirst step to Hardls Retrieing Data from an Encrypted
b) Storing dala
a) Fornatting disk
d) Deleting Fles
c) Finding cortiguratikon fies
Answers
0.7
O.1 Q.2
Q. 43 What is the first step to Handle Retrieving Data from an Encrypted Hard Dver
a) Formatting disk b) Storing data
c) Finding configuration files d) Deleting Files
Answers
O00