Part-1 CLICK HERE
Q 26. In a microscope, for small values of numerical aperture of the objective, the depth of field 'd' varies with numerical aperture(NA), as?
A. "d" is directly proportional to (NA)^(2)
B. "d" is directly proportional to (NA)^(1/2)
C. "d" is inversely proportional to (NA)^(2)
D. "d" is inversely proportional to (NA)^(1/2)
ANSWER: C
Explanation
λ=
wavelength of illuminating light
n=
refractive index of the medium
NA=
numerical aperture
e=
smallest distance that can be resolved by a detector that is placed in the
image plane of the microscope objective, whose lateral magnification is M.
Q 27. The technique of taking photographs through the microscope is called?
A. Photomicrography
B. Photomacrography
C. Microphotography
D. Macrophotography
ANSWER: A
Q 28. For two events A and B, the Bayes' theorem is given by which of the following formulas, (P(A) ≠ 0) (symbols have their usual meanings)?
A. P(B/A) = [P(B) x P(A/B)] / P(A)
B. P(B/A) = P(A) / [P(B) x P(A/B)]
C. P(B/A) = [P(B) + P(A/B)] / P(A)
D. P(B/A) = P(A) / [P(B) + P(A/B)]
ANSWER: A
Explanation
Bayes theorem
- A theorem in probability and statistics, named after the Reverend Thomas Bayes.
- Theorem helps in determining the probability of an event that is based on some event that has already occurred.
Q 29. "No person accused of an offence can be compelled to be a witness against himself" is covered under:
A. Identification of Prisoners' Act
B. Indian Constitution
C. Code of Criminal Procedure, 1973
D. Indian Evidence Act, 1872
ANSWER: B
Explanation
The
Indian Constitution provides immunity to an accused against self-incrimination
under Article 20(3)
Q 30. In the electron microscope, the image of the object is formed by which of the following when a beam of electrons is directed at the object?
A. X-rays
B. Scattered electrons
C. α - Rays
D. UV-ray
ANSWER: B
Q 31. If R and S are two independent events, then, with usual symbols, the probability that they will both occur, that is P(R and S) is given by which of the following formulas?
A. P(R and S) = P(R) + P(S)
B. P(R and S) = P(R) x P(S/R)
C. P(R and S) = P(R) x P(S)
D. P(R and S) = 1 - P(R) - P(S)
ANSWER: C
Q 32. Consecutive number is always divisible by the largest possible number by which the product of five consecutive natural numbers can be divided by:
A. 160
B. 120
C. 180
D. 240
ANSWER: B
Q 33. Big-Bang theory of the universe is related to:
A. Study state theory
B. Support heliocentric theory
C. Support geocentric theory
D. Evolutionary theory
ANSWER: D
Q 34. A bag contains 8 green and 8 red balls. Find the probability that the ball drawn is red when one ball is selected at random:
A. 1 / 3
B. 1 / 6
C. 1 / 2
D. 5 / 6
ANSWER: C
Q 35. Two dice are rolled simultaneously. Find the probability of getting a multiple of 2 on one dice and multiple of three on the other dice:
A. 15 / 36
B. 25 / 36
C. 11 / 36
D. 5 / 6
ANSWER: C
Q 36. Flammable ice is
A. Dry ice
B. Methane hydrate
C. Ethane hydrate
D. Nitrous oxide under high pressure
ANSWER: B
Explanation
Dry ice- a solid form of carbon
dioxide.
Q 37. Carbon refers to diamond and then corundum refers to
A. Pearl
B. Phukraj
C. Garnet
D. Ruby
ANSWER: D
Explanation
Corundum:-naturally occurring aluminum oxide mineral (Al2O3) after diamond, the
hardest known natural substance. Its finer varieties are the gemstones sapphire
and ruby and its mixtures with iron oxides and other minerals are called emery.
Q 38. World Ozone Day is celebrated on
A. October, 16
B. September, 16
C. June, 16
D. March, 16
ANSWER: B
Q 39. Where the first chemical examiner laboratory was established?
A. Bombay
B. Calcutta
C. Agra
D. Madras
ANSWER: D
Q 40. The preservative used for preservation of viscera in hydrochloric acid poisoning
A. Sodium chloride
B. Sodium hydroxide
C. Ethyl alcohol
D. Formaldehyde
ANSWER: C
Q 41. Forensic experts are authorized to conduct an examination of currency notes under section:
A. 293 CrPC
B. 290 CrPC
C. 292 CrPC
D. 280 CrPC
ANSWER: C
Q 42. Which of the following microscope is most suitable for studying the sequence of strokes?
A. Polarising microscope
B. Comparison microscope
C. Compound microscope
D. Scanning Electron microscope
ANSWER: D
Q 43. How would you distinguish a file having bad extension?
A. By determining hash value
B. By using metadata
C. By using file signature
D. Through cryptography
ANSWER: C
Q 44. Specific type of memory that can be erased anytime is classified as
A. BROM
B. DROM
C. EPROM
D. EROM
ANSWER: C
Explanation
EPROM- Erasable programmable read-only memory
EROM- Erasable read only memory
DRAM- Dynamic random access memory
Q 45. Which of the following is NOT a type of Volatile evidence?
A. Routing tables
B. Main memory
C. Log files
D. Cached data
ANSWER: C
Explanation
- Routing table is a set of rules, often viewed in table format, that is used
to determine where data packets traveling over an Internet Protocol (IP)
network will be directed. All IP-enabled devices, including routers and
switches, use routing tables
- Cached data is information stored from a website or app that makes
reopening that website or app faster.
- Log file is a file that keeps a registry of events, processes, messages and
communication between various communicating software applications and the
operating system. These are present in executable software, operating systems
and programs whereby all the messages and process details are recorded.
Q 46. The size of the seized Hard Disk is 500 GB and it is having free space of 300 GB. What will be the size of the digital forensic raw image?
A. 200 GB
B. 300 GB
C. 500 GB
D. 400 GB
ANSWER: C
Explanation
The
RAW image format is basically a bit-for-bit copy of the RAW data of either the
disk or the volume stored in single or multiple files. There is no metadata (information
that is part of or attached to some other more obvious piece of data) stored in
the image files.
Q 47. Which command will NOT show the MAC address of a computer?
A. "netstat"
B. "msconfig"
C. "ipconfig"
D. "getmac"
ANSWER: B
Explanation
msconfig command- troubleshoot the Microsoft Windows startup process
Media Access Control(MAC)
- A unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.
- MAC address a more reliable way to identify senders and receivers of data on the network, As dynamic IP address, can change time to time.
Q 48. What is the space on a drive called when a file is deleted?
A. Disk space
B. Un-allocated space
C. Drive space
D. Free space
ANSWER: B
Explanation
- Disk space- Also called disk storage, disk capacity, or storage capacity, It is the
maximum amount of data a disk, or drive is capable to hold.
- Un-allocated space- Any physical space in a
hard drive that doesn't belong to a partition as unallocated. This means that
no programs can write to the space. For all practical purposes, the space
doesn't exist to the operating system.
Q 49. Which of the following commands CANNOT be used to collect the Volatile Data
A. Date
B. Path
C. Dir
D. Del
ANSWER: D
Explanation
Volatile data
- Data stored in memory, or exists in transit, that will be lost when the computer loses power or is turned off.
- It resides in registries, cache, and random access memory (RAM).
- Investigation of volatile data = live forensics
Q 50. Crossover cable is used to connect?
A. Switch to Router
B. Host to Host
C. Hub to Router
D. Hub to switch
ANSWER: B
Explanation
- An Ethernet crossover cable, also known as a crossed cable, connects two Ethernet network devices.
- These cables support temporary host-to-host networking in situations where an intermediate device, such as a network router, is not present.
- A crossover cable connects two devices of the same type.
0 Comments