MCQs On Cyber Forensics

Enhance your Knowledge of Cyber Forensics by taking this test.

Best of luck.

 

#1. What category of software is designed to cause detriment to your computer?

#2. Base Transceiver Station (BTS) is also known as:

#3. What is the size of the IPV6 address?

#4. Cybersecurity is also called:

#5. Which of the following is the goal of Cyber Security?

#6. What was the name of first antivirus software?

#7. An Android device’s encrypted data can be wiped remotely using:

#8. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.

#9. What are the ingredients of Cyber Security Trial?

#10. In Cellphone Seizure, phone book cannot contain___________.

#11. Which of the following tool is used for Blackjacking?

#12. How many levels of addressing is provided in TCP/IP protocol?

#13. Computer forensics also known as?

#14. Length of Port address in TCP/IP is _________

#15. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?

#16. What is Internet?

#17. Degausser is used for ____.

#18. Which of the following techniques are used during computer forensics investigations?

#19. Which program will be used to gain administrative rights on one’s computer?

#20. Which of the following protocols uses both TCP and UDP?

#21. The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:

#22. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?

#23. In Vishing, the perpetrator convince the recipient:

#24. A single, common key is used to encrypt and decrypt the message in :

#25. A device operating at network layer is called ____ .

#26. ___________ does NOT come under the Cellular phones category.

#27. Which of the following data extraction method is used to recover the deleted data from Smart Phone?

#28. ‘Duqu’ malware can be categorised as a ____.

#29. SIM stores the _____________.

#30. The browser’s __________ keeps a list of web pages you have visited during the current session.

#31. Cybersecurity is primarily about:

#32. Which are the sections of IT Act is applicable for Cyber Pornography?

#33. Most of the chat and instant message conversation are stored in computer in:

#34. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:

#35. What is regarded as a form of social engineering?

#36. What was the name of program which Robert Thomas created?

#37. The video editing in digital video format is:

#38. ow many types of wireless authentication modes are there?

#39. How phone memory of a damaged mobile phone can be read?

#40. ________ describes a cloud service that can only be accessed by a limited amount of people.

#41. Which of the following is not a type of hacking a smart-phone.

#42. Mobile security is also known as:

#43. What is Metadata?

#44. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?

#45. How many C’s are present in computer forensics?

#46. Malware gets spreads through networks and technologies, like?

#47. Unsolicited commercial emails are commonly known as?

#48. Cybersecurity is the protection of:

#49. Which Windows log will tell you if software has been uninstalled?

#50. Cryptography is use to transform message to make them secure and immune from _______.

Previous
Finish

Results

Congratulation!!!

Try Again!!!


Discover more from Forensic's blog

Subscribe to get the latest posts sent to your email.

error: Content is protected !!

Discover more from Forensic's blog

Subscribe now to keep reading and get access to the full archive.

Continue reading