Marthwada Mitra Mandal's Polytechnic
Course :- Emerging Trends in Computer and Infromation Technology
Chapter 3 - Digital forensics
Sr.No Question A B C D Answer
1
systematic tracking of incoming and outgoing traffic: to ascertain
how an attack was carried out or how an event occurred on a
network.
-intruders and network users often leave trail behind
-identify locations where relevant digital evidence exists
-crucial when developing data map of digital evidence
1. SIM Cards
2. Windows
Registry
3. Network
Forensics
4. Drive Slack C
2 a logical drive 1. EEPROM 2. PDA's 3. SIM Cards 4. Partition D
3
Considerations
-determine the scope of the investigation.
-determine what the case requires
-whether you should collect all info
-what to do in case of scope creep
1. Examination
Plan
2. Drive Slack 3. Partition 4. SIM Cards A
4
Can be exported as:
-RTF ~good for thumbnails and book marks
-TEXT~plain text
1. Drive Slack 2. Write Blockers
3. Windows
Registry
4. ProDiscover
Report
D
5
electronically erasable programmable read-only memory
-how phones store system data
-enables service providers to reprogram phones without having
to physically access memory chips
-OS is stored in ROM: nonvolatile memory
1. Partition 2. file system 3. EEPROM 4. SIM Cards C
6
file manipulation: file names and extensions/ hidden property
-disk manipulation: hidden partitions/bad clusters
-encryption: bit shifting/stenography
1. Windows
Registry
2. Examination
Plan
3. Virtual
Machine
4. Data-hiding
Techniques
D
7
gives us a road map to data on a disk
-type of file system an OS used determines how data is stored on
the disk
1. file system 2. Drive Slack 3. EEPROM 4. SIM Cards A
8
a database that stores hardware and software configuration
information, network connections, user preferences, and setup
information.
-can contain valuable info about current/past applications and
user created information
1. SIM Cards
2. Windows
Registry
3. file system 4. Write Blockers B
9
unused space in a cluster between the end of an active file and
the end of a cluster. (Includes RAM slack and file slack)
1. SIM Cards 2. file system 3. Write Blockers 4. Drive Slack D
10
Which one of the following offers CPUs as integrated memory or
peripheral interfaces?
a)
Microcontroller
b)
Microprocessor
c) Embedded
system
d) Memory
system
A
11
Which of the following offers external chips for memory and
peripheral interface circuits?
a)
Microcontroller
b)
Microprocessor
c) Peripheral
system
d) Embedded
system
B
12 How many bits does an MC6800 family have? a) 16 b) 32 c) 4 d) 8 D
13 Which of the following is a 4-bit architecture? a) MC6800 b) 8086 c) 80386
d) National COP
series
D
14 What is CISC?
a) Computing
instruction set
complex
b) Complex
instruction set
computing
c)
Complimentary
instruction set
computing
d) Complex
instruction set
complementary
B
15
How is the protection and security for an embedded system
made?
a) OTP b) IPR
c) Memory disk
security
d) Security chips B
16 Which of the following possesses a CISC architecture? a) MC68020 b) ARC c) Atmel AVR d) Blackfin A
17 Which of the following is a RISC architecture? a) 80286 b) MIPS c) Zilog Z80 d) 80386 B
18 Which one of the following is board based system? a) Data bus b) Address bus c) VMEbus d) DMA bus C
19 VME bus stands for
a) Versa module
Europa bus
b) Versa module
embedded bus
c) Vertical
module
embedded bus
d) Vertical
module Europa
bus
A
20 Which of the following has a Harvard architecture? a) EDSAC b) SSEM c) PIC d) CSIRAC C
21
What are the essential tight constraint/s related to the design
metrics of an embedded system?
a. Ability to fit on
a single chip
b. Low power
consumption
c. Fast data
processing for
real-time
operations
d. All of the
above
D
22
Which abstraction level undergo the compilation process by
converting a sequential program into finite-state machine and
register transfers while designing an embedded system?
a. System b. Behaviour c. RT d. Logic B
23
Which characteristics of an embedded system exhibit the
responsiveness to the assortments or variations in system's
environment by computing specific results for real-time
applications without any kind of postponement ?
a. Single-
functioned
Characteristic
b. Tightly-
constraint
Characteristics
c. Reactive &
Real time
Characteristics
d. All of the
above
C
24 Is the following instruction correct LDI R3,50? a) Yes b) No c) Cant be said
d) None of the
mentioned
B
25 Registers R0-R31 are used for what type of works?
a) they are used
for arithmetic
and logic
instructions
b) they are used
for data copy
c) they are used
for calculations
d) none of the
mentioned
A
26 The largest value that can be loaded in an 8 bit register is? a) 11111111H b) FH c) FFH d) 00H C
27
Which out of the following instructions don’t affect the flags of
the status register?
a) AND b) INC c) OR d) ADD D
28 Which out of the following is not a directive? a) .EQU b) .DEVICE c) .ORG d) .LDI D
29 Is an assembly language a high level language? a) Yes b) No c) Cant be said
d) None of the
mentioned
B
30
A 14 bit program counter can execute a maximum of _________
memory locations?
a) 4K b) 8K c) 16K d) 64K C
31 When AVR wakes up, then the value of PC becomes? a) 00H b) 000H c) 0000H d) 00000H D
32
33
34
35
36
37
38
39
40
41
42
43
44
When AVR wakes up, then the value of PC becomes?
a) 00H
b) 000H
c) 0000H
d) 00000H
When AVR a) 00H b) 000H c) 0000H d) 00000H

chapter-3-digital-forensics.pdf

  • 1.
    Marthwada Mitra Mandal'sPolytechnic Course :- Emerging Trends in Computer and Infromation Technology Chapter 3 - Digital forensics Sr.No Question A B C D Answer 1 systematic tracking of incoming and outgoing traffic: to ascertain how an attack was carried out or how an event occurred on a network. -intruders and network users often leave trail behind -identify locations where relevant digital evidence exists -crucial when developing data map of digital evidence 1. SIM Cards 2. Windows Registry 3. Network Forensics 4. Drive Slack C 2 a logical drive 1. EEPROM 2. PDA's 3. SIM Cards 4. Partition D 3 Considerations -determine the scope of the investigation. -determine what the case requires -whether you should collect all info -what to do in case of scope creep 1. Examination Plan 2. Drive Slack 3. Partition 4. SIM Cards A 4 Can be exported as: -RTF ~good for thumbnails and book marks -TEXT~plain text 1. Drive Slack 2. Write Blockers 3. Windows Registry 4. ProDiscover Report D 5 electronically erasable programmable read-only memory -how phones store system data -enables service providers to reprogram phones without having to physically access memory chips -OS is stored in ROM: nonvolatile memory 1. Partition 2. file system 3. EEPROM 4. SIM Cards C 6 file manipulation: file names and extensions/ hidden property -disk manipulation: hidden partitions/bad clusters -encryption: bit shifting/stenography 1. Windows Registry 2. Examination Plan 3. Virtual Machine 4. Data-hiding Techniques D 7 gives us a road map to data on a disk -type of file system an OS used determines how data is stored on the disk 1. file system 2. Drive Slack 3. EEPROM 4. SIM Cards A 8 a database that stores hardware and software configuration information, network connections, user preferences, and setup information. -can contain valuable info about current/past applications and user created information 1. SIM Cards 2. Windows Registry 3. file system 4. Write Blockers B
  • 2.
    9 unused space ina cluster between the end of an active file and the end of a cluster. (Includes RAM slack and file slack) 1. SIM Cards 2. file system 3. Write Blockers 4. Drive Slack D 10 Which one of the following offers CPUs as integrated memory or peripheral interfaces? a) Microcontroller b) Microprocessor c) Embedded system d) Memory system A 11 Which of the following offers external chips for memory and peripheral interface circuits? a) Microcontroller b) Microprocessor c) Peripheral system d) Embedded system B 12 How many bits does an MC6800 family have? a) 16 b) 32 c) 4 d) 8 D 13 Which of the following is a 4-bit architecture? a) MC6800 b) 8086 c) 80386 d) National COP series D 14 What is CISC? a) Computing instruction set complex b) Complex instruction set computing c) Complimentary instruction set computing d) Complex instruction set complementary B 15 How is the protection and security for an embedded system made? a) OTP b) IPR c) Memory disk security d) Security chips B 16 Which of the following possesses a CISC architecture? a) MC68020 b) ARC c) Atmel AVR d) Blackfin A 17 Which of the following is a RISC architecture? a) 80286 b) MIPS c) Zilog Z80 d) 80386 B 18 Which one of the following is board based system? a) Data bus b) Address bus c) VMEbus d) DMA bus C 19 VME bus stands for a) Versa module Europa bus b) Versa module embedded bus c) Vertical module embedded bus d) Vertical module Europa bus A 20 Which of the following has a Harvard architecture? a) EDSAC b) SSEM c) PIC d) CSIRAC C 21 What are the essential tight constraint/s related to the design metrics of an embedded system? a. Ability to fit on a single chip b. Low power consumption c. Fast data processing for real-time operations d. All of the above D 22 Which abstraction level undergo the compilation process by converting a sequential program into finite-state machine and register transfers while designing an embedded system? a. System b. Behaviour c. RT d. Logic B 23 Which characteristics of an embedded system exhibit the responsiveness to the assortments or variations in system's environment by computing specific results for real-time applications without any kind of postponement ? a. Single- functioned Characteristic b. Tightly- constraint Characteristics c. Reactive & Real time Characteristics d. All of the above C 24 Is the following instruction correct LDI R3,50? a) Yes b) No c) Cant be said d) None of the mentioned B
  • 3.
    25 Registers R0-R31are used for what type of works? a) they are used for arithmetic and logic instructions b) they are used for data copy c) they are used for calculations d) none of the mentioned A 26 The largest value that can be loaded in an 8 bit register is? a) 11111111H b) FH c) FFH d) 00H C 27 Which out of the following instructions don’t affect the flags of the status register? a) AND b) INC c) OR d) ADD D 28 Which out of the following is not a directive? a) .EQU b) .DEVICE c) .ORG d) .LDI D 29 Is an assembly language a high level language? a) Yes b) No c) Cant be said d) None of the mentioned B 30 A 14 bit program counter can execute a maximum of _________ memory locations? a) 4K b) 8K c) 16K d) 64K C 31 When AVR wakes up, then the value of PC becomes? a) 00H b) 000H c) 0000H d) 00000H D 32 33 34 35 36 37 38 39 40 41 42 43 44
  • 4.
    When AVR wakesup, then the value of PC becomes? a) 00H b) 000H c) 0000H d) 00000H
  • 5.
    When AVR a)00H b) 000H c) 0000H d) 00000H