Enhance your Knowledge of Cyber Forensics by taking this test.
Best of luck.
#1. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?
#2. What is correct sequence of Cyber Security process cycle?
#3. _______________ is the central node of 802.11 wireless operations.
#4. Mobile security is also known as:
#5. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?
#6. Unsolicited commercial emails are commonly known as?
#7. Which of the following program is run to examine network traffic:
#8. What was the name of first antivirus software?
#9. __________ is the protocol that supports linking from one web page to another page.
#10. Which program will be used to gain administrative rights on one's computer?
#11. Which of the following data extraction method is used to recover the deleted data from Smart Phone?
#12. What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?
#13. ________ describes a cloud service that can only be accessed by a limited amount of people.
#14. CCFP stands for:
#15. Computer forensics can also be used in civil proceedings.
#16. SIM stores the _____________.
#17. Most of the chat and instant message conversation are stored in computer in:
#18. A device operating at network layer is called ____ .
#19. How many C's are present in computer forensics?
#20. Which of the following is not a type of hacking a smart-phone.
#21. What is the location of folder in the system hard disk having Windows Registry Hives?
#22. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.
#23. Which of the following protocols uses both TCP and UDP?
#24. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?
#25. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?
#26. Data can be retrieved from a mobile device by using which software:
#27. What category of software is designed to cause detriment to your computer?
#28. What are the ingredients of Cyber Security Trial?
#29. What tool represents a scanning tool?
#30. What is the correct sequence of the phase of Penetration Testing?
#31. A single, common key is used to encrypt and decrypt the message in :
#32. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:
#33. What is regarded as a form of social engineering?
#34. ‘Duqu’ malware can be categorised as a ____.
#35. Cybersecurity is the protection of:
#36. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
#37. Which are the sections of IT Act is applicable for Cyber Pornography?
#38. Cybersecurity is also called:
#39. An intrusion detection system (IDS) can be used to monitor and filter network traffic. From the viewpoint of detection, which main IDS types can be distinguished?
#40. In Linux “Dotfiles” are:
#41. For what purpose, ‘Volatility’ tool is used?
#42. The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:
#43. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.
#44. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?
#45. Length of Port address in TCP/IP is _________
#46. Malware gets spreads through networks and technologies, like?
#47. An Android device’s encrypted data can be wiped remotely using:
#48. In Vishing, the perpetrator convince the recipient:
#49. What is the use of IPDR?
#50. Which Windows log will tell you if software has been uninstalled?