MCQs On Cyber Forensics

Enhance your Knowledge of Cyber Forensics by taking this test.

Best of luck.

#1. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?

#2. IT Act 2000 amended various sections of the following Acts EXCEPT?

#3. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:

#4. What is the size of the IPV6 address?

#5. Which of the following techniques are used during computer forensics investigations?

#6. A single, common key is used to encrypt and decrypt the message in :

#7. Which Windows log will tell you if software has been uninstalled?

#8. The browser’s __________ keeps a list of web pages you have visited during the current session.

#9. What is the location of folder in the system hard disk having Windows Registry Hives?

#10. An intrusion detection system (IDS) can be used to monitor and filter network traffic. From the viewpoint of detection, which main IDS types can be distinguished?

#11. How many levels of addressing is provided in TCP/IP protocol?

#12. ‘Duqu’ malware can be categorised as a ____.

#13. ___________ does NOT come under the Cellular phones category.

#14. Which program will be used to gain administrative rights on one's computer?

#15. What are the ingredients of Cyber Security Trial?

#16. Which of the following protocols uses both TCP and UDP?

#17. Mobile security is also known as:

#18. What is the purpose of CDR analysis tool ?

#19. Cybersecurity is primarily about:

#20. Malware gets spreads through networks and technologies, like?

#21. Which of the following tool is used for Blackjacking?

#22. How many C's are present in computer forensics?

#23. The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:

#24. What is regarded as a form of social engineering?

#25. Computer forensics also known as?

#26. The video editing in digital video format is:

#27. Cybersecurity Covers the full range of?

#28. Unsolicited commercial emails are commonly known as?

#29. Volatile data resides in:

#30. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.

#31. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?

#32. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?

#33. In Phishing, the perpetrator convince the recipient:

#34. In Vishing, the perpetrator convince the recipient:

#35. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:

#36. Data can be retrieved from a mobile device by using which software:

#37. An Android device’s encrypted data can be wiped remotely using:

#38. What is correct sequence of Cyber Security process cycle?

#39. How phone memory of a damaged mobile phone can be read?

#40. What was the name of program which Robert Thomas created?

#41. Computer forensics can also be used in civil proceedings.

#42. ________ describes a cloud service that can only be accessed by a limited amount of people.

#43. What is the correct sequence of the phase of Penetration Testing?

#44. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.

#45. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?

#46. For what purpose, ‘Volatility’ tool is used?

#47. Cybersecurity is also called:

#48. ‘Stuxnet’ malware can be categorized as a ….

#49. Which are the sections of IT Act is applicable for Cyber Pornography?

#50. CCFP stands for:





Try Again!!!