Ask
Search
Ask Question
Login
×
×
Welcome back.
and 5 others joined a min ago.
Continue with Google
Continue with email
nisha.vanjari
nisha.vanjari
•
40
Reputation:
Level 0
Status:
Active
Country:
India
Last seen:
6 years, 10 months ago
Joined:
7 years, 2 months ago
Profile Strength:
40%
×
Profile Field
Percentage
Name
20%
Bio
20%
Phone
20%
Country
20%
LinkedIn Url
20%
49
Questions
21
Answers
15
Awards
None
None
Top contributions by nisha.vanjari
Questions
Answers
Tags
2
votes
1
answer
32k
views
1
answer
Explain different data hiding techniques?
digital forensics
updated
3.2 years ago
by
sagarkolekar
★
11k
2
votes
1
answer
24k
views
1
answer
Write a short note on Forensic duplication.
digital forensics
updated
7.1 years ago
by
awari.swati831
•
100
1
vote
1
answer
15k
views
1
answer
Explain evidence handling procedure in detail.
digital forensics
updated
7.0 years ago
by
jadhavvaibhav498
•
90
2
votes
1
answer
10k
views
1
answer
What are the goals of incident response ?
digital forensics
updated
7.1 years ago
by
awari.swati831
•
100
0
votes
1
answer
10.0k
views
1
answer
What are the roles of the client and server in e-mail investigation?
digital forensics
updated
7.0 years ago
by
jadhavvaibhav498
•
90
0
votes
1
answer
8.9k
views
1
answer
Explain types of forensic image format in detail.
digital forensics
updated
7.1 years ago
by
awari.swati831
•
100
1
vote
1
answer
8.7k
views
1
answer
How are evidences collected in private-sector incident scenes? Explain.
digital forensics
updated
7.0 years ago
by
jadhavvaibhav498
•
90
0
votes
1
answer
8.2k
views
1
answer
Explain a standard procedure for network forensics.
digital forensics
updated
7.0 years ago
by
jadhavvaibhav498
•
90
0
votes
1
answer
7.4k
views
1
answer
Explain the computer evidence processing steps?
digital forensics
updated
7.0 years ago
by
jadhavvaibhav498
•
90
0
votes
1
answer
6.7k
views
1
answer
Explain types of cybercrime in detail.
digital forensics
updated
7.1 years ago
by
awari.swati831
•
100
1
vote
2.3k
views
1
vote
A: Write a short note on Forensic duplication.
updated
7.1 years ago
by
awari.swati831
•
100
1
vote
1.1k
views
1
vote
A: What are the goals of incident response ?
updated
7.1 years ago
by
awari.swati831
•
100
0
votes
864
views
0
votes
A: Explain 5 rules of Evidence.
updated
7.1 years ago
by
awari.swati831
•
100
0
votes
698
views
0
votes
A: Explain types of forensic image format in detail.
updated
7.1 years ago
by
awari.swati831
•
100
0
votes
409
views
0
votes
A: Explain the pros and cons of performing a live response evidence collection vers
updated
7.1 years ago
by
awari.swati831
•
100
0
votes
251
views
0
votes
A: Explain the pros and cons of performing a live response evidence collection vers
updated
7.1 years ago
by
awari.swati831
•
100
0
votes
211
views
0
votes
A: Explain types of cybercrime in detail.
updated
7.1 years ago
by
awari.swati831
•
100
1
vote
141
views
1
vote
A: Explain the difference between worm and virus?
updated
7.1 years ago
by
awari.swati831
•
100
0
votes
71
views
0
votes
A: Explain cyber terrorism with example.
updated
7.1 years ago
by
awari.swati831
•
100
0
votes
61
views
0
votes
A: Explain Incident Response lifecycle.
updated
7.1 years ago
by
awari.swati831
•
100
digital forensics × 20
Latest awards to nisha.vanjari
Popular Question
× 15
created a question with more than 1,000 views
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money