Enhance your Knowledge of Cyber Forensics by taking this test.
Best of luck.
#1. What category of software is designed to cause detriment to your computer?
#2. Base Transceiver Station (BTS) is also known as:
#3. What is the size of the IPV6 address?
#4. Cybersecurity is also called:
#5. Which of the following is the goal of Cyber Security?
#6. What was the name of first antivirus software?
#7. An Android device’s encrypted data can be wiped remotely using:
#8. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.
#9. What are the ingredients of Cyber Security Trial?
#10. In Cellphone Seizure, phone book cannot contain___________.
#11. Which of the following tool is used for Blackjacking?
#12. How many levels of addressing is provided in TCP/IP protocol?
#13. Computer forensics also known as?
#14. Length of Port address in TCP/IP is _________
#15. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?
#16. What is Internet?
#17. Degausser is used for ____.
#18. Which of the following techniques are used during computer forensics investigations?
#19. Which program will be used to gain administrative rights on one’s computer?
#20. Which of the following protocols uses both TCP and UDP?
#21. The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:
#22. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
#23. In Vishing, the perpetrator convince the recipient:
#24. A single, common key is used to encrypt and decrypt the message in :
#25. A device operating at network layer is called ____ .
#26. ___________ does NOT come under the Cellular phones category.
#27. Which of the following data extraction method is used to recover the deleted data from Smart Phone?
#28. ‘Duqu’ malware can be categorised as a ____.
#29. SIM stores the _____________.
#30. The browser’s __________ keeps a list of web pages you have visited during the current session.
#31. Cybersecurity is primarily about:
#32. Which are the sections of IT Act is applicable for Cyber Pornography?
#33. Most of the chat and instant message conversation are stored in computer in:
#34. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:
#35. What is regarded as a form of social engineering?
#36. What was the name of program which Robert Thomas created?
#37. The video editing in digital video format is:
#38. ow many types of wireless authentication modes are there?
#39. How phone memory of a damaged mobile phone can be read?
#40. ________ describes a cloud service that can only be accessed by a limited amount of people.
#41. Which of the following is not a type of hacking a smart-phone.
#42. Mobile security is also known as:
#43. What is Metadata?
#44. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?
#45. How many C’s are present in computer forensics?
#46. Malware gets spreads through networks and technologies, like?
#47. Unsolicited commercial emails are commonly known as?
#48. Cybersecurity is the protection of:
#49. Which Windows log will tell you if software has been uninstalled?
#50. Cryptography is use to transform message to make them secure and immune from _______.
Results
Congratulation!!!
Try Again!!!
Discover more from Forensic's blog
Subscribe to get the latest posts sent to your email.






