Total Questions : 20
Expected Time : 20 Minutes

1. Which cryptographic technique is often used to verify the integrity of digital evidence?

2. What is the role of a forensic expert in analyzing email evidence?

3. Which forensic analysis technique focuses on human behavior and intent?

4. In digital forensics, what does the term 'Chain of Custody' refer to?

5. In digital forensics, what is the role of volatile data?

6. What is the role of a forensic expert in a live response situation?

7. What is the primary purpose of digital evidence analysis?

8. What is the significance of a hash value in digital forensics?

9. In digital forensics, what is the role of a forensic expert in incident response planning?

10. What is the role of a forensic expert in the courtroom?

11. What is the role of a write blocker in digital forensics?

12. What is the primary purpose of a forensic hash?

13. What does data carving involve in digital forensics?

14. What is the significance of forensic reporting in digital investigations?

15. What is the primary focus of a forensic expert in financial fraud investigations?

16. In digital forensics, what is the role of hashing?

17. In digital forensics, what does RAM acquisition involve?

18. In digital forensics, what is the significance of RAM image analysis?

19. Why is the preservation of volatile data crucial in digital forensics?

20. Which phase of the digital forensics process involves the collection of evidence?