Computer Forensics Basics — MCQs

Computer Forensics Basics — MCQs

Computer Forensics Basics — MCQs
10 questions
Read Study Notes
Q1

What is the forensic method of identification that utilizes lip prints?

Q2

In the court of law, the act of a witness giving false evidence after taking an oath is punishable under:

Q3

All of the following are true about H-files EXCEPT:

Q4

What type of evidence do medical certificates provide?

Q5

Virchow method of autopsy includes:-

Q6

Res ipsa loquitur is?

Q7

Custodial rape is punished under which section of the Indian Penal Code?

Q8

A physician is accused of death threats via anonymous email. Investigation reveals the email was sent through multiple proxy servers and TOR network from a public WiFi location. The suspect's home computer shows no direct evidence. Evaluate which combination of digital artifacts would MOST conclusively link the suspect to the anonymous communication?

Q9

A hospital's electronic medical records system was allegedly tampered with to alter a patient's medication history before a medico-legal case. The accused claims system errors caused the changes. Multiple users have access. How would you BEST establish intentional tampering versus system malfunction?

Q10

An autopsy surgeon receives a laptop allegedly containing child pornography. Initial examination shows no illegal images in accessible folders, but forensic tools detect suspicious encrypted container files. Anti-forensic timestamp manipulation is suspected. Which analytical approach would provide the MOST legally defensible evidence?

Want unlimited practice?

Get full access to all questions, explanations, and performance tracking.

Start For Free
Computer Forensics Basics MCQs | Digital Forensics Questions - OnCourse