There are 25 questions in this multiple choice test which are related to cyber forensics. Take this test and look at the answers and your score at the end.
1.
Which Windows log will tell you if software has been uninstalled?
2.
‘Stuxnet’ malware can be categorized as a ….
3.
Which of the following data extraction method is used to recover the deleted data from Smart Phone?
5.
What is the location of folder in the system hard disk having Windows Registry Hives?
6.
___________ does NOT come under the Cellular phones category.
7.
What is the size of the IPV6 address?
9.
Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?
10.
A governmental organization wants to ensure the integrity of information that is communicated between parties. What is needed to achieve this?
11.
What is regarded as a form of social engineering?
12.
Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?
13.
How phone memory of a damaged mobile phone can be read?
14.
What tool represents a scanning tool?
15.
In Cellphone Seizure, phone book cannot contain___________.
16.
What is the purpose of CDR analysis tool ?
17.
The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:
18.
In Vishing, the perpetrator convince the recipient:
19.
What is correct sequence of Cyber Security process cycle?
20.
What are the ingredients of Cyber Security Trial?
21.
What is the correct sequence of the phase of Penetration Testing?
22.
Who said this “The internet will disappear. There will be so many IP address, so many devices, sensors that it will be part of your presence all the time. Imagine you walk into a room and you are interacting with the things going on in there"?
23.
What is the use of IPDR?
24.
In Phishing, the perpetrator convince the recipient:
25.
‘Duqu’ malware can be categorised as a ____.