Enhance your Knowledge of Cyber Forensics by taking this test.
Best of luck.
#1. Degausser is used for ____.
#2. Computer forensics also known as?
#3. How many C’s are present in computer forensics?
#4. ‘Duqu’ malware can be categorised as a ____.
#5. Most of the chat and instant message conversation are stored in computer in:
#6. Which program will be used to gain administrative rights on one’s computer?
#7. In Vishing, the perpetrator convince the recipient:
#8. Length of Port address in TCP/IP is _________
#9. ___________ does NOT come under the Cellular phones category.
#10. Which of the following data extraction method is used to recover the deleted data from Smart Phone?
#11. What is the purpose of CDR analysis tool ?
#12. The video editing in digital video format is:
#13. In Phishing, the perpetrator convince the recipient:
#14. Mobile security is also known as:
#15. What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?
#16. What tool represents a scanning tool?
#17. Which of the following protocols uses both TCP and UDP?
#18. What is the use of IPDR?
#19. Which are the sections of IT Act is applicable for Cyber Pornography?
#20. ow many types of wireless authentication modes are there?
#21. Computer forensics can also be used in civil proceedings.
#22. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.
#23. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?
#24. Which of the following type of images store graphic information in a grid of individual pixels?
#25. __________ is the protocol that supports linking from one web page to another page.
#26. Which Windows log will tell you if software has been uninstalled?
#27. Which of the following techniques are used during computer forensics investigations?
#28. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:
#29. A device operating at network layer is called ____ .
#30. Base Transceiver Station (BTS) is also known as:
#31. How phone memory of a damaged mobile phone can be read?
#32. ________ describes a cloud service that can only be accessed by a limited amount of people.
#33. Data can be retrieved from a mobile device by using which software:
#34. ‘Stuxnet’ malware can be categorized as a ….
#35. Cybersecurity Covers the full range of?
#36. Which of the following program is run to examine network traffic:
#37. Cryptography is use to transform message to make them secure and immune from _______.
#38. Which of the following is the goal of Cyber Security?
#39. SIM stores the _____________.
#40. For what purpose, ‘Volatility’ tool is used?
#41. A single, common key is used to encrypt and decrypt the message in :
#42. What is the location of folder in the system hard disk having Windows Registry Hives?
#43. In Cellphone Seizure, phone book cannot contain___________.
#44. The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:
#45. Which of the following tool is used for Blackjacking?
#46. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.
#47. A governmental organization wants to ensure the integrity of information that is communicated between parties. What is needed to achieve this?
#48. The first part of a complete URL is the __________ needed to access the web resource.
#49. Who said this “The internet will disappear. There will be so many IP address, so many devices, sensors that it will be part of your presence all the time. Imagine you walk into a room and you are interacting with the things going on in there”?
#50. What is regarded as a form of social engineering?
Results
Congratulation!!!
Try Again!!!
Discover more from Forensic's blog
Subscribe to get the latest posts sent to your email.






