CYBER FORENSICS Q1. Which of the following is a memory-only malware? A. Worm B. Exploit kit C. Fileless malware D. Ransomware Answer: C. Fileless malware Explanation: Fileless malware resides in RAM and disappears after reboot. Q2. A “cold boot attack” ex... See more
CYBER FORENSICS Q1. Which of the following techniques is used to recover deleted files in digital forensics? a. File carving b. File hashing c. File encryption d. File wiping ANSWER: a. File carving EXPLANATION: File carving is a technique used in digital... See more
1. INTRODUCTION Chromatography is one of the most powerful and versatile separation techniques in analytical science, enabling qualitative and quantitative analysis of complex multicomponent systems. Beyond its routine analytical use, chromatography at th... See more
CYBER FORENSICS Q1. Slack space refers to: A. Network buffer B. Unused space within the last cluster of a file C. RAM allocation D. Reserved BIOS area Answer: B. Unused space within the last cluster of a file Explanation: Slack space may contain remnants ... See more
Forensic Anthropology Questions Set-6 Question 1. Which of the following skeletal features is most commonly used to determine the biological sex of an individual in forensic anthropology? A) Shape of the cranial vault B) Pelvic morphology C) Mandibular sh... See more