Enhance your Knowledge of Cyber Forensics by taking this test.
Best of luck.
#1. ‘Stuxnet’ malware can be categorized as a ….
#2. Length of Port address in TCP/IP is _________
#3. CCFP stands for:
#4. Which program will be used to gain administrative rights on one’s computer?
#5. What was the name of first antivirus software?
#6. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:
#7. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
#8. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.
#9. Cryptography is use to transform message to make them secure and immune from _______.
#10. What category of software is designed to cause detriment to your computer?
#11. What tool represents a scanning tool?
#12. The video editing in digital video format is:
#13. What is the use of IPDR?
#14. IT Act 2000 amended various sections of the following Acts EXCEPT?
#15. Unsolicited commercial emails are commonly known as?
#16. Cybersecurity is the protection of:
#17. Which of the following tool is used for Blackjacking?
#18. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?
#19. Which of the following type of images store graphic information in a grid of individual pixels?
#20. For what purpose, ‘Volatility’ tool is used?
#21. __________ is the protocol that supports linking from one web page to another page.
#22. What is Internet?
#23. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?
#24. How phone memory of a damaged mobile phone can be read?
#25. Cybersecurity Covers the full range of?
#26. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?
#27. In Linux “Dotfiles” are:
#28. What is the size of the IPV6 address?
#29. Computer forensics also known as?
#30. The first part of a complete URL is the __________ needed to access the web resource.
#31. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.
#32. Data can be retrieved from a mobile device by using which software:
#33. How many C’s are present in computer forensics?
#34. Which of the following is the goal of Cyber Security?
#35. An Android device’s encrypted data can be wiped remotely using:
#36. ow many types of wireless authentication modes are there?
#37. A device operating at network layer is called ____ .
#38. Which Windows log will tell you if software has been uninstalled?
#39. A single, common key is used to encrypt and decrypt the message in :
#40. Base Transceiver Station (BTS) is also known as:
#41. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:
#42. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.
#43. What is correct sequence of Cyber Security process cycle?
#44. An intrusion detection system (IDS) can be used to monitor and filter network traffic. From the viewpoint of detection, which main IDS types can be distinguished?
#45. Mobile security is also known as:
#46. Most of the chat and instant message conversation are stored in computer in:
#47. Volatile data resides in:
#48. How many levels of addressing is provided in TCP/IP protocol?
#49. Which of the following is not a type of hacking a smart-phone.
#50. Which of the following protocols uses both TCP and UDP?
Results
Congratulation!!!
Try Again!!!
Discover more from Forensic's blog
Subscribe to get the latest posts sent to your email.






