MCQs On Cyber Forensics

Enhance your Knowledge of Cyber Forensics by taking this test.

Best of luck.

 

#1. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.

#2. An Android device’s encrypted data can be wiped remotely using:

#3. Which of the following program is run to examine network traffic:

#4. Which of the following techniques are used during computer forensics investigations?

#5. Most of the chat and instant message conversation are stored in computer in:

#6. Which of the following tool is used for Blackjacking?

#7. An intrusion detection system (IDS) can be used to monitor and filter network traffic. From the viewpoint of detection, which main IDS types can be distinguished?

#8. Cybersecurity is primarily about:

#9. __________ is the protocol that supports linking from one web page to another page.

#10. What is correct sequence of Cyber Security process cycle?

#11. The browser’s __________ keeps a list of web pages you have visited during the current session.

#12. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?

#13. SIM stores the _____________.

#14. Who said this “The internet will disappear. There will be so many IP address, so many devices, sensors that it will be part of your presence all the time. Imagine you walk into a room and you are interacting with the things going on in there”?

#15. In Linux “Dotfiles” are:

#16. Which of the following data extraction method is used to recover the deleted data from Smart Phone?

#17. ___________ does NOT come under the Cellular phones category.

#18. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.

#19. The video editing in digital video format is:

#20. Which Windows log will tell you if software has been uninstalled?

#21. Cybersecurity is also called:

#22. What tool represents a scanning tool?

#23. What is the use of IPDR?

#24. Volatile data resides in:

#25. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?

#26. What is the size of the IPV6 address?

#27. Which of the following protocols uses both TCP and UDP?

#28. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?

#29. What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?

#30. ________ describes a cloud service that can only be accessed by a limited amount of people.

#31. IT Act 2000 amended various sections of the following Acts EXCEPT?

#32. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:

#33. A device operating at network layer is called ____ .

#34. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?

#35. In Vishing, the perpetrator convince the recipient:

#36. How phone memory of a damaged mobile phone can be read?

#37. Which are the sections of IT Act is applicable for Cyber Pornography?

#38. For what purpose, ‘Volatility’ tool is used?

#39. Unsolicited commercial emails are commonly known as?

#40. What category of software is designed to cause detriment to your computer?

#41. The first part of a complete URL is the __________ needed to access the web resource.

#42. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:

#43. What is Metadata?

#44. Which of the following is not a type of hacking a smart-phone.

#45. Data can be retrieved from a mobile device by using which software:

#46. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?

#47. Which of the following is the goal of Cyber Security?

#48. What is the location of folder in the system hard disk having Windows Registry Hives?

#49. CCFP stands for:

#50. In Phishing, the perpetrator convince the recipient:

Previous
Finish

Results

Congratulation!!!

Try Again!!!


Discover more from Forensic's blog

Subscribe to get the latest posts sent to your email.

error: Content is protected !!

Discover more from Forensic's blog

Subscribe now to keep reading and get access to the full archive.

Continue reading