Topic 1: Exam Set A
Depending upon the Jurisdictional areas, different laws apply to different incidents. Which
of the following law is related to fraud and related activity in connection with computers?
A.
18 USC 7029
B.
18 USC 7030
C.
18 USC 7361
D.
18 USC 7371
18 USC 7030
At the time of evidence transfer, both sender and receiver need to give the information
about date and time of transfer in the chain of custody record.
A.
True
B.
False
True
When a file or folder is deleted, the complete path, including the original file name, is stored
in a special hidden file called "INF02" in the Recycled folder. If the INF02 file is deleted, it is
re-created when you___________.
A.
Restart Windows
B.
Kill the running processes in Windows task manager
C.
Run the antivirus tool on the system
D.
Run the anti-spyware tool on the system
Restart Windows
Digital photography helps in correcting the perspective of the Image which Is used In taking
the measurements of the evidence. Snapshots of the evidence and incident-prone areas
need to be taken to help in the forensic process. Is digital photography accepted as
evidence in the court of law?
A.
Yes
B.
No
Yes
Mobile phone forensics is the science of recovering digital evidence from a mobile phone
under forensically sound conditions.
A.
True
B.
False
True
Page 1 out of 98 Pages |