Ask
Search
Ask Question
Login
×
×
Welcome back.
and 3 others joined a min ago.
Continue with Google
Continue with email
nisha.vanjari
nisha.vanjari
•
40
Reputation:
Level 0
Status:
Active
Country:
India
Last seen:
5 years, 4 months ago
Joined:
5 years, 8 months ago
Profile Strength:
40%
×
Profile Field
Percentage
Name
20%
Bio
20%
Phone
20%
Country
20%
LinkedIn Url
20%
49
Questions
21
Answers
15
Awards
None
None
Top contributions by nisha.vanjari
Questions
Answers
Tags
2
votes
1
answer
27k
views
1
answer
Explain different data hiding techniques?
digital forensics
updated
20 months ago
by
sagarkolekar
★
10k
2
votes
1
answer
20k
views
1
answer
Write a short note on Forensic duplication.
digital forensics
updated
5.6 years ago
by
awari.swati831
•
100
1
vote
1
answer
13k
views
1
answer
Explain evidence handling procedure in detail.
digital forensics
updated
5.5 years ago
by
jadhavvaibhav498
•
90
1
vote
1
answer
9.1k
views
1
answer
What are the goals of incident response ?
digital forensics
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
1
answer
7.9k
views
1
answer
What are the roles of the client and server in e-mail investigation?
digital forensics
updated
5.5 years ago
by
jadhavvaibhav498
•
90
0
votes
1
answer
7.0k
views
1
answer
Explain types of forensic image format in detail.
digital forensics
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
1
answer
7.0k
views
1
answer
Explain a standard procedure for network forensics.
digital forensics
updated
5.5 years ago
by
jadhavvaibhav498
•
90
1
vote
1
answer
6.7k
views
1
answer
How are evidences collected in private-sector incident scenes? Explain.
digital forensics
updated
5.5 years ago
by
jadhavvaibhav498
•
90
0
votes
1
answer
6.3k
views
1
answer
Explain the computer evidence processing steps?
digital forensics
updated
5.5 years ago
by
jadhavvaibhav498
•
90
0
votes
1
answer
6.1k
views
1
answer
Explain types of cybercrime in detail.
digital forensics
updated
5.6 years ago
by
awari.swati831
•
100
1
vote
2.0k
views
1
vote
A: Write a short note on Forensic duplication.
updated
5.6 years ago
by
awari.swati831
•
100
1
vote
915
views
1
vote
A: What are the goals of incident response ?
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
733
views
0
votes
A: Explain 5 rules of Evidence.
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
560
views
0
votes
A: Explain types of forensic image format in detail.
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
365
views
0
votes
A: Explain the pros and cons of performing a live response evidence collection vers
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
236
views
0
votes
A: Explain the pros and cons of performing a live response evidence collection vers
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
199
views
0
votes
A: Explain types of cybercrime in detail.
updated
5.6 years ago
by
awari.swati831
•
100
1
vote
119
views
1
vote
A: Explain the difference between worm and virus?
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
68
views
0
votes
A: Explain cyber terrorism with example.
updated
5.6 years ago
by
awari.swati831
•
100
0
votes
60
views
0
votes
A: Explain Incident Response lifecycle.
updated
5.6 years ago
by
awari.swati831
•
100
digital forensics × 20
Latest awards to nisha.vanjari
Popular Question
× 15
created a question with more than 1,000 views
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money