Enhance your Knowledge of Cyber Forensics by taking this test.
Best of luck.
#1. Most of the chat and instant message conversation are stored in computer in:
#2. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?
#3. Which of the following techniques are used during computer forensics investigations?
#4. What is correct sequence of Cyber Security process cycle?
#5. ‘Duqu’ malware can be categorised as a ____.
#6. What is Internet?
#7. CCFP stands for:
#8. ow many types of wireless authentication modes are there?
#9. ‘Stuxnet’ malware can be categorized as a ….
#10. What was the name of first antivirus software?
#11. Which of the following type of images store graphic information in a grid of individual pixels?
#12. What are the ingredients of Cyber Security Trial?
#13. Volatile data resides in:
#14. The browser’s __________ keeps a list of web pages you have visited during the current session.
#15. Cybersecurity is also called:
#16. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.
#17. Cybersecurity is the protection of:
#18. __________ is the protocol that supports linking from one web page to another page.
#19. What is regarded as a form of social engineering?
#20. Malware gets spreads through networks and technologies, like?
#21. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?
#22. What is the size of the IPV6 address?
#23. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?
#24. Cybersecurity Covers the full range of?
#25. What is the use of IPDR?
#26. How many C's are present in computer forensics?
#27. Which Windows log will tell you if software has been uninstalled?
#28. What was the name of program which Robert Thomas created?
#29. Computer forensics can also be used in civil proceedings.
#30. The first part of a complete URL is the __________ needed to access the web resource.
#31. Cybersecurity is primarily about:
#32. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.
#33. In Phishing, the perpetrator convince the recipient:
#34. The video editing in digital video format is:
#35. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:
#36. What tool represents a scanning tool?
#37. Which are the sections of IT Act is applicable for Cyber Pornography?
#38. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
#39. What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?
#40. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.
#41. A device operating at network layer is called ____ .
#42. Cryptography is use to transform message to make them secure and immune from _______.
#43. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:
#44. In Vishing, the perpetrator convince the recipient:
#45. How phone memory of a damaged mobile phone can be read?
#46. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?
#47. A single, common key is used to encrypt and decrypt the message in :
#48. _______________ is the central node of 802.11 wireless operations.
#49. Which of the following tool is used for Blackjacking?
#50. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?