MCQs On Cyber Forensics

Enhance your Knowledge of Cyber Forensics by taking this test.

Best of luck.

#1. What is regarded as a form of social engineering?

#2. _______________ is the central node of 802.11 wireless operations.

#3. Which of the following is not a type of hacking a smart-phone.

#4. What are the ingredients of Cyber Security Trial?

#5. What is the size of the IPV6 address?

#6. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?

#7. Degausser is used for ____.

#8. Computer forensics also known as?

#9. For what purpose, ‘Volatility’ tool is used?

#10. Which Windows log will tell you if software has been uninstalled?

#11. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?

#12. A single, common key is used to encrypt and decrypt the message in :

#13. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.

#14. In Linux “Dotfiles” are:

#15. __________ is the protocol that supports linking from one web page to another page.

#16. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:

#17. Computer forensics can also be used in civil proceedings.

#18. A governmental organization wants to ensure the integrity of information that is communicated between parties. What is needed to achieve this?

#19. What category of software is designed to cause detriment to your computer?

#20. Unsolicited commercial emails are commonly known as?

#21. What is Metadata?

#22. SIM stores the _____________.

#23. How phone memory of a damaged mobile phone can be read?

#24. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?

#25. Which of the following is the goal of Cyber Security?

#26. Cybersecurity is primarily about:

#27. Data can be retrieved from a mobile device by using which software:

#28. What is correct sequence of Cyber Security process cycle?

#29. Cybersecurity is also called:

#30. In Phishing, the perpetrator convince the recipient:

#31. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.

#32. Which are the sections of IT Act is applicable for Cyber Pornography?

#33. What tool represents a scanning tool?

#34. Most of the chat and instant message conversation are stored in computer in:

#35. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?

#36. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.

#37. What was the name of first antivirus software?

#38. Length of Port address in TCP/IP is _________

#39. IT Act 2000 amended various sections of the following Acts EXCEPT?

#40. Base Transceiver Station (BTS) is also known as:

#41. What is the purpose of CDR analysis tool ?

#42. Which of the following protocols uses both TCP and UDP?

#43. Which of the following data extraction method is used to recover the deleted data from Smart Phone?

#44. ow many types of wireless authentication modes are there?

#45. Cryptography is use to transform message to make them secure and immune from _______.

#46. Volatile data resides in:

#47. ‘Stuxnet’ malware can be categorized as a ….

#48. CCFP stands for:

#49. What is the correct sequence of the phase of Penetration Testing?

#50. The video editing in digital video format is:

Finish

Results

-

Congratulation!!!

Try Again!!!

error: Content is protected !!

Discover more from Forensic's blog

Subscribe now to keep reading and get access to the full archive.

Continue reading