Topic 1: Exam Set A
Which of the following Steganography techniques allows you to encode information that
ensures creation of cover for secret communication?
A.
Substitution techniques
B.
Transform domain techniques
C.
Cover generation techniques
D.
Spread spectrum techniques
Cover generation techniques
Data Acquisition is the process of imaging or otherwise obtaining information from a digital
device and its peripheral equipment and media
A.
True
B.
False
True
Which of the following statements is not a part of securing and evaluating electronic crime
scene checklist?
A.
Locate and help the victim
B.
Transmit additional flash messages to other responding units
C.
Request additional help at the scene if needed
D.
Blog about the incident on the internet
Blog about the incident on the internet
Smith, as a part his forensic investigation assignment, has seized a mobile device. He was
asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith
found that the SIM was protected by a Personal identification Number (PIN) code but he
was also aware that people generally leave the PIN numbers to the defaults or use easily
guessable numbers such as 1234. He unsuccessfully tried three PIN numbers that blocked
the SIM card. What Jason can do in this scenario to reset the PIN and access SIM data?
A.
He should contact the device manufacturer for a Temporary Unlock Code (TUK) to gain
access to the SIM
B.
He cannot access the SIM data in this scenario as the network operators or device
manufacturers have no idea about a device PIN
C.
He should again attempt PIN guesses after a time of 24 hours
D.
He should ask the network operator for Personal Unlock Number (PUK) to gain access
to the SIM
He should ask the network operator for Personal Unlock Number (PUK) to gain access
to the SIM
What is the smallest allocation unit of a hard disk?
A.
Cluster
B.
Spinning tracks
C.
Disk platters
D.
Slack space
Cluster
Page 12 out of 98 Pages |
Previous |