admissions@cyberlawacademy.com | +91-XXXXXXXXXX
Module Assessment

Electronic Evidence & Digital Cross-Examination

Test your mastery of digital evidence challenges with 10 scenario-based questions. Score 70% to pass.

10 Questions~15 minutesPass: 70%

Instructions

  • Questions cover Section 63 BSA, authenticity, WhatsApp/email, CCTV, and social media evidence
  • Select the best answer for each scenario
  • After submission, detailed explanations will be provided
Question 0 of 10 answered
Q1Section 63 BSA
A Section 63 BSA certificate must be signed by:
Explanation
Section 63(4) BSA specifically requires the certificate from a person "occupying a responsible official position in relation to the operation of the relevant device or the management of the relevant activities." This means someone with actual operational control, not just any employee or legal representative.
Q2Authenticity
Hash values in digital forensics serve to:
Explanation
Hash values are digital fingerprints. If even one bit changes, the hash changes completely. By comparing hashes at collection and analysis, investigators prove the data was not modified. Without matching hashes, integrity is compromised.
Q3WhatsApp Evidence
Scenario
The prosecution produces WhatsApp screenshots as evidence against the accused.
What is the primary weakness of this evidence?
Explanation
WhatsApp's end-to-end encryption means the company cannot provide message content for verification. Combined with the ease of fabricating screenshots, this makes WhatsApp screenshot evidence inherently weak without device-level forensic corroboration.
Q4Email Evidence
The "From" field in an email:
Explanation
Email spoofing is trivially easy. The "From" field can be set to any address the sender chooses. Proper email authentication requires server-side logs, SPF/DKIM verification, and header analysis - not just the displayed "From" address.
Q5CCTV Evidence
Scenario
CCTV footage shows the incident occurred at 21:47. The accused claims alibi at that exact time.
What is the most effective challenge to the CCTV timestamp?
Explanation
CCTV timestamps are only as accurate as the DVR's internal clock, which is rarely synchronized with accurate time sources and can drift significantly over months. Without verification of clock accuracy, timestamps may be minutes or even hours off.
Q6Chain of Custody
Scenario
A mobile phone was seized on January 1st but sent to FSL only on January 20th. The phone was kept in the Malkhana without a Faraday bag.
What is the primary concern?
Explanation
Mobile devices require immediate isolation in Faraday bags to prevent remote access. Without shielding, the phone can be accessed remotely via WhatsApp Web, iCloud, or other services - allowing data to be added, deleted, or modified without physical access.
Q7Social Media
A Facebook account with the accused's name and photo is produced as evidence. This proves:
Explanation
Anyone can create a social media account with any name and any photo. Account ownership must be independently proved through registration records (email, phone), login history, or device forensics. A name and photo alone prove nothing.
Q8Metadata
Scenario
A contract is dated March 15, 2023, but the document metadata shows "Created: March 28, 2023."
What does this suggest?
Explanation
If a document's creation date is 13 days after the date shown on the document, it suggests the document was created later and backdated. Metadata can expose fabrication that content examination cannot reveal.
Q9Section 63 BSA
When should you object to a defective Section 63 certificate?
Explanation
Object when the document is tendered, before cross-examination. Cross-examining on the document's contents without objecting may be treated as waiver of the objection. Object FIRST, then cross-examine if overruled.
Q10CCTV Evidence
The best evidence of CCTV footage is:
Explanation
The original DVR hard drive is the best evidence. USB copies can be easily edited, and screenshots lose context and metadata. Proper chain of custody requires forensic imaging of the original drive with hash verification at each step.
🏆
Your Score
0/10
0%
Loading...
Correct
0
Incorrect
0
Pass Threshold
70%