MCQs On Cyber Forensics

Enhance your Knowledge of Cyber Forensics by taking this test.

Best of luck.

#1. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?

#2. What is correct sequence of Cyber Security process cycle?

#3. _______________ is the central node of 802.11 wireless operations.

#4. Mobile security is also known as:

#5. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?

#6. Unsolicited commercial emails are commonly known as?

#7. Which of the following program is run to examine network traffic:

#8. What was the name of first antivirus software?

#9. __________ is the protocol that supports linking from one web page to another page.

#10. Which program will be used to gain administrative rights on one's computer?

#11. Which of the following data extraction method is used to recover the deleted data from Smart Phone?

#12. What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?

#13. ________ describes a cloud service that can only be accessed by a limited amount of people.

#14. CCFP stands for:

#15. Computer forensics can also be used in civil proceedings.

#16. SIM stores the _____________.

#17. Most of the chat and instant message conversation are stored in computer in:

#18. A device operating at network layer is called ____ .

#19. How many C's are present in computer forensics?

#20. Which of the following is not a type of hacking a smart-phone.

#21. What is the location of folder in the system hard disk having Windows Registry Hives?

#22. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.

#23. Which of the following protocols uses both TCP and UDP?

#24. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?

#25. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?

#26. Data can be retrieved from a mobile device by using which software:

#27. What category of software is designed to cause detriment to your computer?

#28. What are the ingredients of Cyber Security Trial?

#29. What tool represents a scanning tool?

#30. What is the correct sequence of the phase of Penetration Testing?

#31. A single, common key is used to encrypt and decrypt the message in :

#32. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:

#33. What is regarded as a form of social engineering?

#34. ‘Duqu’ malware can be categorised as a ____.

#35. Cybersecurity is the protection of:

#36. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?

#37. Which are the sections of IT Act is applicable for Cyber Pornography?

#38. Cybersecurity is also called:

#39. An intrusion detection system (IDS) can be used to monitor and filter network traffic. From the viewpoint of detection, which main IDS types can be distinguished?

#40. In Linux “Dotfiles” are:

#41. For what purpose, ‘Volatility’ tool is used?

#42. The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:

#43. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.

#44. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?

#45. Length of Port address in TCP/IP is _________

#46. Malware gets spreads through networks and technologies, like?

#47. An Android device’s encrypted data can be wiped remotely using:

#48. In Vishing, the perpetrator convince the recipient:

#49. What is the use of IPDR?

#50. Which Windows log will tell you if software has been uninstalled?

Finish

Results

-

Congratulation!!!

Try Again!!!

error: Content is protected !!