MCQs On Cyber Forensics

Enhance your Knowledge of Cyber Forensics by taking this test.

Best of luck.

 

#1. ‘Stuxnet’ malware can be categorized as a ….

#2. Length of Port address in TCP/IP is _________

#3. CCFP stands for:

#4. Which program will be used to gain administrative rights on one’s computer?

#5. What was the name of first antivirus software?

#6. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:

#7. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?

#8. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.

#9. Cryptography is use to transform message to make them secure and immune from _______.

#10. What category of software is designed to cause detriment to your computer?

#11. What tool represents a scanning tool?

#12. The video editing in digital video format is:

#13. What is the use of IPDR?

#14. IT Act 2000 amended various sections of the following Acts EXCEPT?

#15. Unsolicited commercial emails are commonly known as?

#16. Cybersecurity is the protection of:

#17. Which of the following tool is used for Blackjacking?

#18. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?

#19. Which of the following type of images store graphic information in a grid of individual pixels?

#20. For what purpose, ‘Volatility’ tool is used?

#21. __________ is the protocol that supports linking from one web page to another page.

#22. What is Internet?

#23. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?

#24. How phone memory of a damaged mobile phone can be read?

#25. Cybersecurity Covers the full range of?

#26. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?

#27. In Linux “Dotfiles” are:

#28. What is the size of the IPV6 address?

#29. Computer forensics also known as?

#30. The first part of a complete URL is the __________ needed to access the web resource.

#31. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.

#32. Data can be retrieved from a mobile device by using which software:

#33. How many C’s are present in computer forensics?

#34. Which of the following is the goal of Cyber Security?

#35. An Android device’s encrypted data can be wiped remotely using:

#36. ow many types of wireless authentication modes are there?

#37. A device operating at network layer is called ____ .

#38. Which Windows log will tell you if software has been uninstalled?

#39. A single, common key is used to encrypt and decrypt the message in :

#40. Base Transceiver Station (BTS) is also known as:

#41. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:

#42. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.

#43. What is correct sequence of Cyber Security process cycle?

#44. An intrusion detection system (IDS) can be used to monitor and filter network traffic. From the viewpoint of detection, which main IDS types can be distinguished?

#45. Mobile security is also known as:

#46. Most of the chat and instant message conversation are stored in computer in:

#47. Volatile data resides in:

#48. How many levels of addressing is provided in TCP/IP protocol?

#49. Which of the following is not a type of hacking a smart-phone.

#50. Which of the following protocols uses both TCP and UDP?

Previous
Finish

Results

Congratulation!!!

Try Again!!!


Discover more from Forensic's blog

Subscribe to get the latest posts sent to your email.

error: Content is protected !!

Discover more from Forensic's blog

Subscribe now to keep reading and get access to the full archive.

Continue reading