MCQs On Cyber Forensics

Enhance your Knowledge of Cyber Forensics by taking this test.

Best of luck.

#1. In Vishing, the perpetrator convince the recipient:

#2. __________ is the protocol that supports linking from one web page to another page.

#3. How many levels of addressing is provided in TCP/IP protocol?

#4. What is correct sequence of Cyber Security process cycle?

#5. _______________ is the central node of 802.11 wireless operations.

#6. What is Internet?

#7. Cybersecurity is primarily about:

#8. Which of the following type of images store graphic information in a grid of individual pixels?

#9. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.

#10. ___________ does NOT come under the Cellular phones category.

#11. What was the name of first antivirus software?

#12. What is the correct sequence of the phase of Penetration Testing?

#13. Mobile security is also known as:

#14. What is the use of IPDR?

#15. Cybersecurity Covers the full range of?

#16. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.

#17. Data can be retrieved from a mobile device by using which software:

#18. IT Act 2000 amended various sections of the following Acts EXCEPT?

#19. ________ describes a cloud service that can only be accessed by a limited amount of people.

#20. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?

#21. Cybersecurity is also called:

#22. How many C's are present in computer forensics?

#23. Cryptography is use to transform message to make them secure and immune from _______.

#24. Computer forensics also known as?

#25. Unsolicited commercial emails are commonly known as?

#26. A device operating at network layer is called ____ .

#27. What category of software is designed to cause detriment to your computer?

#28. Malware gets spreads through networks and technologies, like?

#29. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?

#30. Cybersecurity is the protection of:

#31. What is the size of the IPV6 address?

#32. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?

#33. What are the ingredients of Cyber Security Trial?

#34. What is Metadata?

#35. SIM stores the _____________.

#36. CCFP stands for:

#37. What is the purpose of CDR analysis tool ?

#38. The video editing in digital video format is:

#39. Which are the sections of IT Act is applicable for Cyber Pornography?

#40. Base Transceiver Station (BTS) is also known as:

#41. Who said this “The internet will disappear. There will be so many IP address, so many devices, sensors that it will be part of your presence all the time. Imagine you walk into a room and you are interacting with the things going on in there"?

#42. For what purpose, ‘Volatility’ tool is used?

#43. Most of the chat and instant message conversation are stored in computer in:

#44. A single, common key is used to encrypt and decrypt the message in :

#45. Which of the following techniques are used during computer forensics investigations?

#46. How phone memory of a damaged mobile phone can be read?

#47. Which of the following tool is used for Blackjacking?

#48. ‘Duqu’ malware can be categorised as a ____.

#49. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:

#50. The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:





Try Again!!!

error: Content is protected !!