Enhance your Knowledge of Cyber Forensics by taking this test.
Best of luck.
#1. What is regarded as a form of social engineering?
#2. _______________ is the central node of 802.11 wireless operations.
#3. Which of the following is not a type of hacking a smart-phone.
#4. What are the ingredients of Cyber Security Trial?
#5. What is the size of the IPV6 address?
#6. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?
#7. Degausser is used for ____.
#8. Computer forensics also known as?
#9. For what purpose, ‘Volatility’ tool is used?
#10. Which Windows log will tell you if software has been uninstalled?
#11. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?
#12. A single, common key is used to encrypt and decrypt the message in :
#13. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.
#14. In Linux “Dotfiles” are:
#15. __________ is the protocol that supports linking from one web page to another page.
#16. The key to Forensic Investigation is 1. Preserver 2. Analyse 3. Report 4. Collect. Arrange them in the correct sequence:
#17. Computer forensics can also be used in civil proceedings.
#18. A governmental organization wants to ensure the integrity of information that is communicated between parties. What is needed to achieve this?
#19. What category of software is designed to cause detriment to your computer?
#20. Unsolicited commercial emails are commonly known as?
#21. What is Metadata?
#22. SIM stores the _____________.
#23. How phone memory of a damaged mobile phone can be read?
#24. Which tool should be used to capture credit card numbers, e-mail addresses, zip files, URLs, IP addresses, telephone numbers, etc. from a digital forensic image?
#25. Which of the following is the goal of Cyber Security?
#26. Cybersecurity is primarily about:
#27. Data can be retrieved from a mobile device by using which software:
#28. What is correct sequence of Cyber Security process cycle?
#29. Cybersecurity is also called:
#30. In Phishing, the perpetrator convince the recipient:
#31. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.
#32. Which are the sections of IT Act is applicable for Cyber Pornography?
#33. What tool represents a scanning tool?
#34. Most of the chat and instant message conversation are stored in computer in:
#35. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?
#36. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.
#37. What was the name of first antivirus software?
#38. Length of Port address in TCP/IP is _________
#39. IT Act 2000 amended various sections of the following Acts EXCEPT?
#40. Base Transceiver Station (BTS) is also known as:
#41. What is the purpose of CDR analysis tool ?
#42. Which of the following protocols uses both TCP and UDP?
#43. Which of the following data extraction method is used to recover the deleted data from Smart Phone?
#44. ow many types of wireless authentication modes are there?
#45. Cryptography is use to transform message to make them secure and immune from _______.
#46. Volatile data resides in:
#47. ‘Stuxnet’ malware can be categorized as a ….
#48. CCFP stands for:
#49. What is the correct sequence of the phase of Penetration Testing?
#50. The video editing in digital video format is:
Results
-
Congratulation!!!
Try Again!!!