ETI 316313 Chapter 5 MCQ: Emerging Trends in Computer Engineering & IT

Emerging Trends in Computer Engineering & IT ETI 316313 most important multiple choice questions for chapter five are given below.

ETI 316313 Chapter 5 MCQ K Scheme

These questions are perticularly focus on the MSBTE new syllabus for computer engineering sixth semester.

Try to solve these questions by writing an answer without seeing the answer. The MCQ pdf file is also given at the end of the article.

ETI 316313 Chapter 5 MCQ K Scheme

A. Digital Forensics Basics (Q1–Q15)

Q1. Digital forensics is mainly concerned with
a) Designing software
b) Identifying, collecting and analyzing digital evidence
c) Encrypting data
d) Network installation
Ans: b

Q2. Which of the following devices can be examined in digital forensics?
a) Computer
b) Mobile phone
c) Network devices
d) All of the above
Ans: d

Q3. The primary goal of digital forensics is to
a) Hack systems
b) Recover deleted files only
c) Present admissible evidence in court
d) Develop antivirus software
Ans: c

Q4. Which step ensures original evidence is not altered?
a) Analysis
b) Preservation
c) Examination
d) Reporting
Ans: b

Q5. Hash functions like MD5 and SHA-256 are used to ensure
a) Confidentiality
b) Availability
c) Integrity
d) Accessibility
Ans: cQ6. Extracting deleted or hidden data comes under
a) Identification
b) Preservation

c) Recovery
d) Reporting
Ans: c

Q7. Working only on duplicate data is followed to
a) Save time
b) Reduce storage
c) Protect original evidence
d) Improve speed
Ans: c

Q8. Which forensic area deals with SMS, call logs, and app data?
a) Computer forensics
b) Network forensics
c) Mobile device forensics
d) Database forensics
Ans: c

Q9. Monitoring network traffic is part of
a) Cloud forensics
b) Network forensics
c) Malware forensics
d) Database forensics
Ans: b

Q10. The rule that tracks who handled evidence is called
a) Integrity rule
b) Chain of custody
c) Reliability rule
d) Admissibility rule
Ans: b

B. Digital Forensic Investigation Models (Q16–Q35)

Q11. DFRWS model was proposed in
a) 1998
b) 2000
c) 2001
d) 2005
Ans: c

Q12. How many phases are there in the DFRWS model?
a) 5
b) 7
c) 8
d) 9
Ans: d

Q13. Reconstructing events belongs to which DFRWS phase?
a) Analysis
b) Reconstruction
c) Documentation
d) Presentation
Ans: b
Q19. ADFM was developed by
a) Carrier and Spafford
b) Stephenson
c) Reith, Carr & Gunsch
d) Sammons
Ans: c

Q20. Which phase is newly added in ADFM?
a) Preservation
b) Preparation
c) Collection
d) Analysis
Ans: b

Q21. IDIP model integrates
a) Cloud computing
b) Physical and digital investigations
c) Ethical hacking
d) Cryptography
Ans: b

Q22. IDIP was proposed in
a) 2001
b) 2002
c) 2003
d) 2005
Ans: c

Q23. Readiness phase belongs to
a) DFRWS
b) ADFM
c) IDIP
d) EEDIP
Ans: c

Q24. EEDIP focuses on
a) Device-only analysis
b) Source-to-destination investigation
c) Malware removal
d) OS patching
Ans: b

Total MCQ80
MCQ PDFDownload

Conclusion

All important questions with answers are listed above in both text and PDF format. Also, refer textbook for a better understanding of any topic.

ETI 316313 Emerging Trends in Computer Engineering & IT Chapter 4 MCQ

Leave a Reply

Your email address will not be published. Required fields are marked *