Enhance your Knowledge of Cyber Forensics by taking this test.
Best of luck.
#1. What is the use of IPDR?
#2. Which of the following is NOT a well known Cell Phone Forensics Commercial Tool ?
#3. What was the name of program which Robert Thomas created?
#4. CCFP stands for:
#5. A single, common key is used to encrypt and decrypt the message in :
#6. Cybersecurity Covers the full range of?
#7. In Linux “Dotfiles” are:
#8. ow many types of wireless authentication modes are there?
#9. ‘Stuxnet’ malware can be categorized as a ….
#10. In Vishing, the perpetrator convince the recipient:
#11. Computer forensics also known as?
#12. ___________ does NOT come under the Cellular phones category.
#13. Which of the following program is run to examine network traffic:
#14. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.
#15. The computerized pad which recognizes the signature based on the speed, pressure and rhythm of signing is called:
#16. What is the purpose of CDR analysis tool ?
#17. What category of software is designed to cause detriment to your computer?
#18. Mobile security is also known as:
#19. Length of Port address in TCP/IP is _________
#20. IT Act 2000 amended various sections of the following Acts EXCEPT?
#21. How many levels of addressing is provided in TCP/IP protocol?
#22. Base Transceiver Station (BTS) is also known as:
#23. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?
#24. __________ is the protocol that supports linking from one web page to another page.
#25. What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?
#26. Volatile data resides in:
#27. ________ describes a cloud service that can only be accessed by a limited amount of people.
#28. How many C's are present in computer forensics?
#29. ‘Duqu’ malware can be categorised as a ____.
#30. The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:
#31. What was the name of first antivirus software?
#32. Cybersecurity is the protection of:
#33. Which are the sections of IT Act is applicable for Cyber Pornography?
#34. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?
#35. What is Internet?
#36. Who said this “The internet will disappear. There will be so many IP address, so many devices, sensors that it will be part of your presence all the time. Imagine you walk into a room and you are interacting with the things going on in there"?
#37. What is regarded as a form of social engineering?
#38. A device operating at network layer is called ____ .
#39. Which of the following tool is used for Blackjacking?
#40. How phone memory of a damaged mobile phone can be read?
#41. Which of the following is not a type of hacking a smart-phone.
#42. Data can be retrieved from a mobile device by using which software:
#43. Which of the following data extraction method is used to recover the deleted data from Smart Phone?
#44. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?
#45. The video editing in digital video format is:
#46. What is Metadata?
#47. Cryptography is use to transform message to make them secure and immune from _______.
#48. The browser’s __________ keeps a list of web pages you have visited during the current session.
#49. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
#50. Which of the following is the goal of Cyber Security?