Header Ads Widget

FACT 2018_Section-A_Part-2_Previous Year Question Paper

Part-1 Click Here

Q 26.  Forensic Anthropology is concerned with which of the following functions?

A.   To determine the cause and manner of death if death has occurred under unknown circumstances

B.   To identify people through photographs and fingerprints

C.   To identify people through skeletal remains

D.  To link a suspect with crime through the tools used by him

ANSWER: C

Q 27.  Which of the following statements about physical evidence available at the scene of crime is NOT the appropriate one?

A.   It can establish that a crime has been committed

B.   It can link a suspect with crime

C.   It can link the victim with the scene of crime

D.  All the articles available at the scene of crime should be collected and forwarded to the forensic science laboratory

ANSWER: D

 Q 28.  In crimes involving firearms, the clothes of victims bearing gun-shot holes should be handled in which of the following ways?

A.   All the clothes should be packed as such in a box

B.   Different clothes should be dried, folded, and packed in a box

C.   Different clothes should be air-dried, properly folded after placing plastic sheets over the gun-shot holes, marked and then packed each cloth in a separate box

D.  Different clothes should be dried in sun, properly folded after placing plastic sheets over the gun-shot holes and then packed each cloth in a separate box

ANSWER: C

 Q 29.  For packing of different types of physical evidence, only clean containers should be used, because it helps in maintaining:

A.   The authenticity of physical evidence

B.   The integrity of physical evidence

C.   Safety of police officer handling the physical evidence at the scene of crime

D.  Safety of the forensic scientist who will examine the physical evidence

ANSWER: B

 Q 30.  In relation to the electromagnetic spectrum, which of the following statements is TRUE?

A.   Photons of visible light are more energetic than photons of x-rays and ultraviolet rays

B.   Photons of infrared rays are more energetic than those of ultraviolet rays and visible radiations

C.   Photons of x-rays are more energetic than those of visible and infrared rays

D.  Photons of infrared rays are more energetic than those of x-rays and ultraviolet radiations

ANSWER: C 

Q 31.  Which of the following statements is TRUE about Ramsden's eye-piece?

A.   It consists of two plano-convex lenses of equal focal length, separated by a distance equal to two-thirds of the focal length

B.   It consists of two plano-convex lenses of an equal focal length separated by a distance equal to half of their focal length

C.   It consists of two plano-convex lenses of different focal lengths separated by a distance equal to two-thirds of the sum of their focal lengths

D.  It consists of two plano-convex lenses of different focal lengths separated by a distance equal to half of the sum of their focal lengths

ANSWER: A 

Q 32. A polarizing microscope is used to identify birefringent minerals. The birefringent light beams are polarised to each other at which of the following angles?

A.   30 degree

B.   45 degree

C.   60 degree

D.  90 degree

ANSWER: D

 Q 33. Who invented the polarising light microscope?

A.   F. Zernike

B.   L. Teichmann

C.   William Nichol

D.  Abert Schneider

ANSWER: C

 Q 34.  Which of the following is the appropriate method of handling a firearm recovered at the scene of crime?

A.   It should be properly marked and sealed

B.   It should be emptied first by taking out live/fired ammunition, marked and sealed

C.   It should be checked for cocking / safety, emptied, the serial number noted and then sealed

D.  It should first be checked whether cocked or not, safety on or off, emptied, the serial number noted, marked and then sealed

ANSWER: D

 Q 35.  What is the probability of all the three coins tossed simultaneously falling with a pattern of one head and two tails?

A.   0.125

B.   0.25

C.   0.375

D.  0.5

ANSWER: C

 Q 36.  What should be the minimum number of laboratories participating in the Proficiency test for quantitative analysis of a test item?

A.   1

B.   2

C.   3

D.  4

ANSWER: C

Q 37. Under which act/law, expert opinion is admissible?

A.   Section 79A of IT Act 2000

B.   Section 293 of Criminal Procedure Code 1973

C.   Section 45 of Indian Evidence Act 1872

D.  Section 273 of Indian Penal Code 1860

ANSWER: B

EXPLANATION

Section 79A of IT Act 2000:- Central Government to notify Examiner of Electronic Evidence

Section 293 of Criminal Procedure Code 1973:- Reports of certain Government scientific experts.

Section 45 of Indian Evidence Act 1872:- Opinions of experts

Section 273 of Indian Penal Code 1860:- Sale of noxious food or drink

 Q 38.  Which one of the following evidence is subjective in nature?

A.   Finger Print

B.   Iris Pattern

C.   Eye Witness statement

D.  DNA Profiling

ANSWER: C

 Q 39.  Which one of the following is used to preserve blood for DNA profiling?

A.   Potassium oxalate

B.   Sodium chloride

C.   EDTA

D.  Ethanol

ANSWER: C

 Q 40.  Which may NOT be essential for the collection of clue material?

A.   Relevant

B.   Purity of clue material

C.   Authentic

D.  Chain of custody

ANSWER: B

 Q 41.  Which element is irrelevant for a qualified and competent expert?

A.   Of a certain age

B.   Education and qualification

C.   Technical knowledge

D.  Experience in the field

ANSWER: A

 Q 42.  Integrity of clue material is proved if

A.   Putrified

B.   Contaminated

C.   Chain of custody is maintained

D.  Spiked, seeped or evaporated

ANSWER: C

 Q 43. Which of the following is an optical digital data storage device?

A.   Floppy disk

B.   Micro SD

C.   BluRay disk

D.  Hard disk

ANSWER: C

EXPLANATION

Optical digital data storage

It is a storage method that uses the laser to store and retrieve data from optical media. For e.g. CD, DVD, BluRay disk, etc.

Magnetic storage media

It is a storage method that uses a magnetized medium to store and retrieve data. It includes hard disksfloppy disksmagnetic tapemagnetic stripes on credit cards, SuperDisk, Tape cassette, Zip diskette, etc.

Flash memory devices

An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed, For e.g. Flash drive, Memory card, Compact Flash, SD Card, SSD, xD-Picture Card (EXtreme Digital Picture Card), SDHC card (Secure Digital High Capacity), NVMe (Non-Volatile Memory Express), MultiMediaCard, etc.

 Q 44.  Which of the following technique is used to prevent altering of data on suspected drives?

A.   Encryption

B.   Write blocking

C.   Imaging

D.  Cloning

ANSWER: B

EXPLANATION

Write Blocker

It is a tool designed to prevent any write access to the hard disk, thus permitting read-only access to the data storage devices without compromising the integrity of the data. A write blocking if used correctly can guarantee the protection of the chain of custody. NIST (National Institute of Standards and Technology) has issued a set of general guidelines for write blocking requirements:

1.     Not allow a protected drive to be changed.

2.     Not prevent any operations to a drive that is not protected.

3.     Not prevent obtaining any information from or about any drive.

 Q 45. To verify the integrity of the original Hard Disk, we use ____________

A.   Password

B.   Hash value

C.   Cryptography

D.  Blockchain

ANSWER: B

EXPLANATION

Blockchain

·       It is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.

·       It is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.

·       Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.

·       The decentralized database managed by multiple participants is known as Distributed Ledger Technology (DLT).

·       Blockchain is a type of DLT in which transactions are recorded with an immutable cryptographic signature called a hash.

Hash values

·       It can be thought of as fingerprints for files.

·       The contents of a file are processed through a cryptographic algorithm, and a unique numerical value – the hash value - is produced that identifies the contents of the file.

·       If the contents are modified in any way, the value of the hash will also change significantly.

·       Two algorithms are currently widely used to produce hash values: the MD5 and SHA1 algorithms.

 Q 46. What is the full form of NIC used in computers?

A.   National Informatics Centre

B.   Network Interface Card

C.   Neural Intelligence Card

D.  Network Information Centre

ANSWER: B

 47.  “Laser discs and compact discs” are classified as

A.   fixed head discs

B.   Optical discs

C.   Bubbled discs

D.  Blocked discs

ANSWER: B

 Q 48.  Which of the following will NOT protect you from spam?

A.   Spam blocker

B.   E-mail rules

C.   Popup blocker

D.  Filters

ANSWER: C

 Q 49.  Which of the following is using flash memory chips?

A.   Thumb drive

B.   Hard drive

C.   DVD

D.  CD

ANSWER: A

 Q 50. When shutting down a PC, what data is typically lost?

A.   Data in ROM

B.   Running Processes

C.   Network topology

D.  Registry files

ANSWER: B

Registry Files

·       Aka Windows registry is a database of information, settings, options, and other values for software and hardware installed on all versions of Microsoft Windows operating systems.

·       When a program is installed, a new subkey is created in the registry.

·       This subkey contains settings specific to that program, such as its location, version, and primary executable.

Part-1 Click Here

Post a Comment

0 Comments