FACT and FACT Plus Exam 20 March 2022
Exam Name | FACT and FACT Plus Exam 20 March 2022 |
Test Date | 20/03/2022 |
Test Time : | 9:00 AM – 11:00 AM |
Subject | Cyber Forensics (FACT) |
Contents
Section I: Aptitude in Forensic Science
Click Here
Section II: Cyber Forensics
Q.51: The acronym CDMA stands for
- Coder Divided Multi Access
- Codec Division Multi Access
- Code Division Multiple Access
- None of these
Answer: 3. Code Division Multiple Access
Q.52: The existence of weakness in a system or network is called
- Risk
- Vulnerability
- Attack
- Exploit
Answer: 2. Vulnerability
Q.53: The acronym NTFS Stands for
- None of these
- New Topology File System
- Next Technology File System
- New Technology File System
Answer: 4. New Technology File System
Q.54: To hide information inside a picture, what technology is used?
- Steganography
- Rootkits
- Image rendering
- Image processing
Answer: 1. Steganography
Q.55: IDE, SCSI and SATA are different types of interfaces describing what component
- Flash memory
- RAM chips
- CPUs
- Hard disks
Answer: 4. Hard Disks
Q.56: Which of the following protocols uses TCP port 443?
- HTML
- HTTPS
- TELNET
- SMTP
Answer: 2. HTTPS
Q.57: Which data extraction form generally NOT includes the deleted files?
- Logical extraction
- Physical extraction
- Conceptual data
- Both 1 and 3
Answer: 1. Logical Extraction
Q.58: What is the full form of OTA?
- Over The Air
- One Time Application
- One Time Authority
- One Time Authentication
Answer: 1. Over The Air
Q.59: You may throw some confidential data in a dustbin, criminals can collect data from throwing away trash, this technique is known as
- Trash driving
- Spamming
- Dumpster driving
- Phishing
Answer: 3. Dumpster Driving
Q.60: Hardware address is known as
- Address resolution protocol
- IP address
- MAC address
- All of these
Answer: 3. MAC Address
Q.61: The authenticity of the image/clone copy is proved by
- Data matching
- Data comparators
- Cyclic redundancy check
- Hashing algorithm
Answer: 4. Hashing Algorithm
Q.62: What is cache memory?
- Temporary memory
- Random access memory
- Disk memory
- Read-only memory
Answer: 1. Temporary Memory
Q.63: In the public key cryptosystem which is kept as public
- Encryption keys
- Decryption keys
- Both 1 & 2
- None of these
Answer: 1. Encryption Keys
Q.64: Mobile phone cloning means the following
- Changing the IMSI Number
- Transferring the entire data
- Creating a new phone with the old one
- Changing the IMEI Number
Answer: 4. Changing the IMEI Number
Q.65: Which of the following protocols uses both TCP and UDP?
- FTP
- SMTP
- DNS
- TELNET
Answer: 3. DNS
Q.66: In computer networks, encryption techniques are primarily used for
- Performance
- Longevity
- Reliability
- Security
Answer: 4. Security
Q.67: The TCP/IP stands for
- Transfer Control Protocol/Internet Protocol
- Transmission Control Protocol/Internet Protocol
- Translated Control Protocol/Internet Protocol
- Transmission Content Protocol/Internet Protocol
Answer: 2. Transmission Control Protocol/Internet Protocol
Q.68: Botnets are NOT used for
- Spamming
- Encrypting for ransom
- Perform DDOS
- Steal bulk amount of sensitive data
Answer: 2. Encrypting for ransom
Q.69: A phishing attack is generally referred to as the following
- Time theft
- Identity theft
- Bank theft
- Robbery
Answer: 2. Identity Theft
Q.70: NIST stands for
- National Institute of Safety and Technology
- National Institute of Standards and Technology
- National Institute of Safety and Transportation
- National Institute of Safety and Test
Answer: 2. National Institute of Standards and Technology
Q.71: Skimmers are being used by criminals for
- Make the original plastic cards unreadable
- Cards become inaccessible
- Duplicate the magnetic strip-based cards
- None of these
Answer: 3. Duplicate the magnetic strip-based cards.
Q.72: The word “Faraday” is given by which of the following scientists
- Johannes Faraday
- Micheal Faraday
- Max Faraday
- None of these
Answer: 2. Micheal Faraday
Q.73: What do the terms Master, Slave, and Cable Select refer to?
- External SCSI devices
- Jumper settings for internal expansion cards
- Jumper settings for internal hardware IDE hard disk
- Cable types for eternal hardware
Answer: 3. Jumper settings for internal hardware IDE hard disk
Q.74: What is the meaning of juice jacking attack?
- Making the USB charger as data transfer
- Charging the phone through USB
- Transferring the data
- None of these
Answer: 1. Making the USB charger as data transfer
Q.75: Which of the following is a cloud platform by Amazon?
- Cloudera
- Azure
- AWS
- All these
Answer: 3. AWS
Q.76: Secondary storage memory is basically
- Non-volatile memory
- Backup memory
- Dynamic memory
- Volatile memory
Answer: 1. Non-volatile Memory
Q.77: A bit can have a binary value of
- None of these
- 0-9
- 0-255
- 0 or 1
Answer: 4. 0 or 1
Q.78: The acronym of SCSI is
- Selective Component Of System Interface
- Standard Computer System Interface
- Small Computer System Interface
- None of these
Answer: 3. Small Computer System Interface
Q.79: Volatile data resides in
- ROM
- RAM
- Secondary memory
- All of these
Answer: 2. RAM
Q.80: What does FDISK do?
- Creates partitions on a hard drive
- Does fragmentation on the hard drive
- Fixes bad sectors on hard drive
- Recovers lost clusters on hard drive
Answer: 1. Creates partitions on a hard drive
Q.81: Running a password cracking software engages in what type of attack to gain access to a system
- Persistent
- Brute Force
- Passive Aggressive
- Hash
Answer: 2. Brute Force
Q.82: A Byte is equivalent to
- 7 BITS
- 6 BITS
- 8 BITS
- 5 BITS
Answer: 3. 8 BITS
Q.83: SMPS Stands for
- Simple mode power supply
- Switch mode power supply
- Selective mode power supply
- Standard mode power supply
Answer: 2. Switch Mode Power Supply
Q.84: Green dispenser is a type of attack on ATM machines
- Not relate to ATM attack
- Physical robbery of ATM
- Hardware attack
- Malware attack
Answer: 4. Malware Attack
Q.85: Ransomware attack does the following things
- Encrypt your files
- Changes the content of the file
- Changes the password of the system
- Unlock your system
Answer: 1. Encrypt your files
Q.86: Which of the following is not an output device?
- Monitor
- Speakers
- Printer
- Keyboard
Answer: 4. Keyboard
Q.87: Which type of the following malware does not replicate itself?
- Trojan
- Viruses
- Worms
- Rootkits
Answer: 1. Trojan
Q.88: The acronym SIM stands for
- Standard Identity Module
- Subscriber integrity module
- Selective identity module
- Subscriber Identity Module
Answer: 4. Subscriber Identity Module
Q.89: You found a SIM card at the crime scene, how do find the mobile number associated with SIM
- Send to the forensic laboratory
- Find the user
- Find through service provider
- Insert the SIM in a mobile, make a call
Answer: 3. Find through service provider
Q.90: What is the name of a non-volatile chip that stores date, time, and system configuration?
- RAM
- ROM
- PROM
- CMOS
Answer: 4. CMOS
Q.91: What is the file extension used by outlook express to store e-mails locally?
- doc
- xls
- nsf
- pst
Answer: 4. pst
Q.92: The acronym SATA stands for
- System Attached Technology Attachment
- Standard Advancement Technology Attachment
- Serial Advanced Technology Attachment
- None of these
Answer: 3. Serial Advanced Technology Attachment
Q.93: Botnet is a blend of the following words
- Robot, Network
- Bot, Network
- Bot, Internet
- None of these
Answer: 1. Robot, Network
Q.94: Under which section of the Information Technology Act, the Cyber Forensic Laboratories can be declared as Examiners of Electronic Evidence?
- IT Act 79A
- IT Act 65B
- IT Act 80
- IT Act 66
Answer: IT Act 79A
Q.95: Cross tool validation in digital forensic means
- Auditing the tools
- Use several tools for extraction
- The cross checking the findings of one tool with another tool
- Validation of the tools
Answer: 3. The cross-checking the findings of one tool with another tool
Q.96: SIM SWAP attack takes control of the following
- All calls
- Entire mobile operations from the service provider
- All text messages
- All of these
Answer: 4. All of These
Q.97: Whether the hash value of the file change by changing the name of the file?
- Depends on the content
- No
- Yes
- None of these
Answer: 2. No
Q.98: Spear phishing refers to
- Targeted attack
- Mass attack
- General attack
- All these
Answer: Targeted Attack
Q.99: Which one of the following systems cannot be considered as an example of an operating system?
- Red hat linux
- Windows 10
- Microsoft Office
- BSD Linux
Answer: 3. Microsoft Office
Q.100: Which of the following is embedded in the SIM card?
- IMEI
- ICCID
- ISTD
- None of these
Answer: 2. ICCID
Q.101: Voice phishing is often known as
- Email based phishing
- Domain phishing
- Vishing
- All of these
Answer: 3. Vishing
Q.102: DNS stands for
- Domains Naming System
- Data Name Server
- Data Name System
- Domain Name System
Answer: 4. Domain Name System
Q.103: Network layer firewall works as a
- Both Frame as well as Packet filter
- Frame filter
- Packet filter
- None of the options
Answer: 3. Packet Filter
Q.104: The acronym IMEI stands for
- International Mobile Extensive Identification
- International Modular Enquiry Identification
- International Module for Equipment Identity
- International Mobile Equipment Identity
Answer: 4. International Mobile Equipment Identity
Q.105: The attacker will use different zombie PCs to ping your server and the name of the attack is
- Controlled Denial of service
- Permanent Denial of service
- Distributed Denial of service
- All of these
Answer: 3. Distributed Denial of Service
Q.106: Who coined the term “Cyberspace”?
- Richard Stallman
- William Gibson
- Eugan Casey
- John Vocca
Answer: 2. William Gibson
Q.107: The term SaaS stands for
- Software as a Service
- Software as a Standard
- Specialization as a Service
- Standards as a Service
Answer: 1. Software as a Service
Q.108: The following is the websites Phishers often develop for tricking users and filling their personal data
- Genuine
- Illegitimate
- Legitimate
- Official
Answer: 2. Illegitimate
Q.109: A type of ROM which is manufactured having any program is termed as
- PROM
- BROM
- DROM
- EROM
Answer: 1. PROM
Q.110: What is slack space?
- Unallocated space on the disk
- The space between the end of the file and the end of the disk cluster it is stored in
- Empty space for further usage
- None of these
Answer: 2. The Space between the end of the file and the end of the disk cluster it is stored in
Q.111: What is the format of ipv4 IP address?
- 16 bit
- 64 bit
- 32 bit
- 34 bit
Answer: 3. 32 bit
Q.112: In the asymmetric key pair, which of the following key is known only to the owner?
- Protected Key
- Private Key
- Unique Key
- Public Key
Answer: 2. Private Key
Q.113: The following are the methods of isolating the phone from the mobile network.
- Airplane mode or flight mode
- Faraday bag or strong hold box
- Removing the SIM card
- All of these
Answer: 4. All of These
Q.114: Which of the following is NOT the focus of digital forensic analysis?
- Admissibility
- Documentation
- Consultation
- Authenticity
Answer: 3. Consultation
Q.115: The MD5 hash algorithm produces a bit value of
- 32
- 128
- 256
- 64
Answer: 2. 128
Q.116: TOR stands for
- Tactical Onion Router
- The Open Router
- The Onion Router
- The Onion Reader
Answer: 3. The Onion Router
Q.117: Which of the following is an android application that can wipe data from remote access?
- Wipe the android app
- Android device manager
- OTA wiped cleaner
- Android wiper
Answer: 2. Android Device Manager
Q.118: How many bytes a sector of hard disk holds
- 1024
- 512
- 64
- 32
Answer: 2. 512
Q.119: What is the full form of GPU?
- Graphics Processing Unit
- Graphics Program unit
- Gaming Program Unit
- Graphics Provider Interface
Answer: 1. Graphics Processing Unit
Q.120: One of the cardinal rules of the computer forensics is
- Never work on the original system
- Attach the suspect disk as secondary disk to the system
- Work on the original system
- Boot the system in the laboratory
Answer: 1. Never work on the original system.