🔍

Recent questions without answers

What is digital evidence according to Cohen ? a. Baggage of proofs b. Collection of evidences c. Bag of bits d. Backpack of Bytes

View solution
0 like 0 dislike
0 answers

Ethical hacking will allow to ………all the massive security breaches. a. Reject b. Measure c. Remove d. None of these

View solution
0 like 0 dislike
0 answers

For forensics specialists, keeping the ____ updated and complete is crucial to supporting your role as an expert and showing that you’re constantly enhancing your skills through training, teaching, and experience. a. testimony c. examination plan b. CV d. deposition

View solution
0 like 0 dislike
0 answers

In terms of digital evidence, a mobile telephone is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

View solution
0 like 0 dislike
0 answers

___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

View solution
0 like 0 dislike
0 answers

What are the three general categories of computer system that can contain digital evidence (a) Desktop ,laptop ,server (b) Personal computer (c) Hardware, software (d) Open computer system

View solution
0 like 0 dislike
0 answers

Which is not the commonly used programming language for AI? (A) PROLOG (B) Java (C) LISP (D) Perl

View solution
0 like 0 dislike
0 answers

They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers

View solution
0 like 0 dislike
0 answers

Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hackers

View solution
0 like 0 dislike
0 answers

In terms of digital evidence, the Internet is an example of: a. Open computer systems b. Communication systems c. Embedded computer systems d. None of the above

View solution
0 like 0 dislike
0 answers

What is the full form of SMTP A)Simple mail Transfer Protocol

View solution
0 like 0 dislike
0 answers

Please answer

View solution
0 like 0 dislike
0 answers

a latest herbicide family a). Triazines b). Dinitroanilines c). Sulfonyl ureas d). Growth regulators

View solution
0 like 0 dislike
0 answers

Python is a dash programming language that means the statement in Python programs are executed line by line

View solution
0 like 0 dislike
0 answers

The measured distance from a lens to the object is 20 cm and from the lens to the image is 5 cm. Calculate the focal length

View solution
0 like 0 dislike
0 answers

the DC voltage source v and DC current source I are applied similarly to the circuit below. Find the voltage across capacitor C. What is the steady state voltage across capacitor?

View solution
0 like 0 dislike
0 answers

Which step is not included in RMDFR model

View solution
0 like 0 dislike
0 answers

How to prepare manures from available waste in home and prepare insecticide?

View solution
0 like 0 dislike
0 answers

Why are trees grown along road sides? a) to absorb noise c)to take in carbon dioxide b) to trap dust and soot d)all of these

View solution
0 like 0 dislike
0 answers

Speed of sound depends upon a) temperature of medium b)pressure of medium c)temperature of source producing sound d)temperature and pressure of medium

View solution
0 like 0 dislike
0 answers

50.5k questions

47.1k answers

240 comments

7.0k users