Professional Documents
Culture Documents
Fir Cat 2 Questions
Fir Cat 2 Questions
CO4: Evaluate the units and network traffic using forensics tools.
CO5: Comp are and validate foren sics data in cyber security.
CO6: Evaluate the Investigations techniques to han dle ethical issues.
K1- Remenber K2-Understand K3- Apply K4- Analyse K5 - Evaluate K6-Create
1.
a) Forensic Duplicate CO3 KI
b) Qualified Duplicate
c) Cyber Duplicate
d) Image Duplicate
Capturing an Image with ProDis cover Basic, Image file will be split in to segments
of
2.
a) 550MB CO3 KI
b) 650MB
c) 750MB
d) 850MB
MirosotOSs alloonte disk space fror fles by clusters is called as.
) disk eluster
b) NTFS
) FAT
d) drive slnck
A text file containing commands that typically run only at sys tem start up to
enhance the computer's DOSconfiguration is called.
n) lo sy%
b) Config.sy
) Msdos.sys
d) Autocxec bat
Name the tool used in extensive-response field kit
a) Evidene log forms
b) SATA cables
c) Electrical pover strips
d) Permnanent ink marker
involves sortingand searching through allinvestigation data
a) Validation
6 b) Diserimination
c) Verification
d) Sorter
A
well known technique for hiding data by altering the byte values of data is
called
a) Bit alter
b) Bit Locking
c) Bit shifing
d) Bit variance
js u bootable Linux CD intended computer and network forensics
a) Knoppix Security Tools Distribution
b) Utimaco SafeGuard Easy
c) packet sniffers
d) DBXract
Which is not the Mobile foren sics tool?
a) Aucss Data "TK Imager
b) MOBILocdit
c) BitPm
d) SIMcon
The tile axKoiated with the Vmware is.
) md
COS