MCQs On Cyber Forensics

Enhance your Knowledge of Cyber Forensics by taking this test.

Best of luck.

#1. Most of the chat and instant message conversation are stored in computer in:

#2. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?

#3. Which of the following techniques are used during computer forensics investigations?

#4. What is correct sequence of Cyber Security process cycle?

#5. ‘Duqu’ malware can be categorised as a ____.

#6. What is Internet?

#7. CCFP stands for:

#8. ow many types of wireless authentication modes are there?

#9. ‘Stuxnet’ malware can be categorized as a ….

#10. What was the name of first antivirus software?

#11. Which of the following type of images store graphic information in a grid of individual pixels?

#12. What are the ingredients of Cyber Security Trial?

#13. Volatile data resides in:

#14. The browser’s __________ keeps a list of web pages you have visited during the current session.

#15. Cybersecurity is also called:

#16. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.

#17. Cybersecurity is the protection of:

#18. __________ is the protocol that supports linking from one web page to another page.

#19. What is regarded as a form of social engineering?

#20. Malware gets spreads through networks and technologies, like?

#21. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?

#22. What is the size of the IPV6 address?

#23. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?

#24. Cybersecurity Covers the full range of?

#25. What is the use of IPDR?

#26. How many C's are present in computer forensics?

#27. Which Windows log will tell you if software has been uninstalled?

#28. What was the name of program which Robert Thomas created?

#29. Computer forensics can also be used in civil proceedings.

#30. The first part of a complete URL is the __________ needed to access the web resource.

#31. Cybersecurity is primarily about:

#32. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.

#33. In Phishing, the perpetrator convince the recipient:

#34. The video editing in digital video format is:

#35. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:

#36. What tool represents a scanning tool?

#37. Which are the sections of IT Act is applicable for Cyber Pornography?

#38. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?

#39. What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?

#40. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.

#41. A device operating at network layer is called ____ .

#42. Cryptography is use to transform message to make them secure and immune from _______.

#43. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:

#44. In Vishing, the perpetrator convince the recipient:

#45. How phone memory of a damaged mobile phone can be read?

#46. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?

#47. A single, common key is used to encrypt and decrypt the message in :

#48. _______________ is the central node of 802.11 wireless operations.

#49. Which of the following tool is used for Blackjacking?

#50. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?





Try Again!!!

error: Content is protected !!