1.
In Computer Forensics, Md5 hash value of evidence used for
Correct Answer
C. Authentication
Explanation
The MD5 hash value of evidence is used for authentication in computer forensics. MD5 is a widely used cryptographic hash function that generates a unique fixed-size hash value for a given input. By comparing the MD5 hash value of a piece of evidence with the original hash value, investigators can verify its integrity and ensure that it has not been tampered with. This process helps in authenticating the evidence and ensuring its reliability in legal proceedings.
2.
Which Section of Indian IT act,2008 has been Strike off by Supreme Court of India?
Correct Answer
D. Section 66A
Explanation
Section 66A of the Indian IT Act, 2008 has been struck off by the Supreme Court of India. This section was controversial as it allowed the arrest of individuals for posting offensive or annoying content on the internet. The court deemed it unconstitutional as it violated the right to freedom of speech and expression. This decision was made in 2015, stating that the section was too broad and vague, leading to misuse and curbing of individual liberties.
3.
In Asymetric cryptography which key is used for Decryption ?
Correct Answer
C. Private Key
Explanation
In asymmetric cryptography, the private key is used for decryption. This key is kept secret and is only known to the owner. It is used to decrypt data that has been encrypted using the corresponding public key. The public key, on the other hand, is used for encryption. This allows for secure communication between parties, as the private key is required to decrypt the message, ensuring that only the intended recipient can access the decrypted data.
4.
Which of the following is not a File System ?
Correct Answer
C. NAS
Explanation
NAS (Network Attached Storage) is not a file system, but rather a storage solution that allows multiple devices to access and share files over a network. FAT32, EXT4, and NTFS are all file systems commonly used in operating systems such as Windows, Linux, and macOS.
5.
Which of following is not a Operating System?
Correct Answer
B. Linux
Explanation
Linux is a free and open-source operating system, which means it can be modified and distributed by anyone. It is not a specific operating system like iOS, Ubuntu, or Windows10, but rather a kernel that serves as the foundation for various operating systems. Therefore, Linux itself is not an operating system, but rather a component used in the development of operating systems.
6.
Which of the following is document to keep track of evidences movement during Forensics Investigation ?
Correct Answer
C. CHAIN OF CUSTODY
Explanation
The correct answer is "CHAIN OF CUSTODY." The chain of custody is a document that is used to keep track of the movement and handling of evidence during a forensic investigation. It ensures that the evidence is properly documented, preserved, and accounted for at all times, maintaining its integrity and admissibility in court. This document includes information such as the date and time of collection, the person who collected it, any transfers or changes in possession, and any analysis or testing conducted on the evidence.
7.
Under Section 43A of Indian IT act,2008, Who is the authority to order to pay or deny compensations ?
Correct Answer
A. Adjudicating Officer
Explanation
The correct answer is Adjudicating Officer. According to Section 43A of the Indian IT Act, 2008, the Adjudicating Officer has the authority to order the payment or denial of compensations. This officer is responsible for adjudicating on matters related to data breaches, unauthorized access, or disclosure of sensitive personal information. They have the power to impose penalties and determine the amount of compensation to be paid in case of any violation of the IT Act.
8.
Which of the following method is used for cracking protected file's password
Correct Answer
D. Brute force Attack
Explanation
Brute force attack is a method used for cracking a protected file's password. In this type of attack, an attacker systematically tries all possible combinations of passwords until the correct one is found. It is a time-consuming process as it involves trying a large number of password combinations. However, if the password is weak or easily guessable, a brute force attack can be successful in gaining unauthorized access to the protected file.
9.
New Type File System has capacity to hide data in which of following?
Correct Answer
D. Alternate Data Stream
Explanation
The New Type File System has the capacity to hide data in the Alternate Data Stream. Alternate Data Stream is a feature in the NTFS file system that allows additional data to be attached to a file without changing its size or affecting its functionality. This hidden data can be used to store information that is not visible to the user, providing a way to hide sensitive or confidential data within a file.
10.
Please Download the demo case from https://drive.google.com/file/d/1-PznIU5_RmfkAGtVoen8-AGe7iBwi9qo/view?usp=sharing And Answers the followings:1. Md5 Hash value of Richard_Disk File is________2. Phone number of one of the terrorist handler named Chacha is ________3. Mouinuddin's Bank account No. is________4. Password of Camouflage image file is________5. Password of detail file is________
Correct Answer
0794fc8550b551bc921efe21d31b5290
+91982315458
45012644781TA
BRIHAN
Mum1
Explanation
The given answer provides the requested information for each question. The MD5 hash value of Richard_Disk File is "0794fc8550b551bc921efe21d31b5290". The phone number of the terrorist handler named Chacha is "+91982315458". Mouinuddin's bank account number is "45012644781TA". The password of the camouflage image file is "BRIHAN". The password of the detail file is "Mum1".