MCQs on Cyber Forensics MCQs on Cyber Forensics This Test contains total 25 MCQs on Cyber Forensics. Test your Knowledge. Best of Luck. 1. Degausser is used for ____.Deselect AnswerTo wipe data from memory cardsTo wipe data in a SATA hard diskTo wipe data from CDs/DVDsTo wipe data from thumb drives2. ________ describes a cloud service that can only be accessed by a limited amount of people.Deselect AnswerVirtualisationPrivate cloudPublic cloudData center3. The browser’s __________ keeps a list of web pages you have visited during the current session.Deselect AnswerTrailFavouritesCache MemoryHistory4. Which are the sections of IT Act is applicable for Cyber pornography?Deselect Answer67, 67C, 67D67, 67A, 67B66, 66A, 66B68, 68A, 68B5. A device operating at network layer is called ____ .Deselect AnswerRouterBridgeRepeaterEqualizer6. What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?Deselect AnswerSpamSpoofingTrapperDoS7. Unsolicited commercial emails are commonly known as?Deselect AnswerJunkHoaxesHypertextSpam8. How many levels of addressing is provided in TCP/IP protocol?Deselect AnswerFourTwoOneThree9. What category of software is designed to cause detriment to your computer?Deselect AnswerMalwareNetwork snakesSystems softwareBugs10. Which program will be used to gain administrative rights on one's computer?Deselect AnswerBotTrojan horseExecutive AndroidRootkit11. For what purpose, ‘Volatility’ tool is used?Deselect AnswerTo extract data from nonvolatile dataTo capture volatile dataTo extract data from RAM dumpsTo capture RAM dump12. The first part of a complete URL is the __________ needed to access the web resource.Deselect AnswerProtocolAddressLocationName13. Which of the following protocols uses both TCP and UDP?Deselect AnswerTelnetDNSFTPSMTP14. What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?Deselect AnswerVolume Boot RecordMaster File TableVolume Boot SectorMaster Boot Record15. IT Act 2000 amended various sections of the following Acts EXCEPT?Deselect AnswerReserve Bank of India Act, 1934Indian Evidence Act, 1872 & Bankers Book Evidence Act 1891Indian Penal Code, 1860Cable Television Networks (Regulation) Act, 199516. In Linux “Dotfiles” are:Deselect AnswerSystem filesHidden filesLibrary filesDriver file17. Length of Port address in TCP/IP is _________Deselect Answer8 bit long16 bit long32 bit long4 bit long18. A single, common key is used to encrypt and decrypt the message in :Deselect AnswerSwap PartitionAnti-ForensicsPublic-Key EncryptionSymmetric-Key Encryption19. The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?Deselect AnswerSkynetBot to Bot (B2B)Machine to Machine (M2M)Intercloud20. An intrusion detection system (IDS) can be used to monitor and filter network traffic. From the viewpoint of detection, which main IDS types can be distinguished?Deselect AnswerAnomaly-based and heuristic basedAnomaly-based and behaviour basedSignature-based and knowledge-basedBehaviour-based and knowledge-based21. ________ describes a distribution model in which applications are hosted by a service provider and made available to users.Deselect AnswerSoftware-as-a-Service (SaaS)Cloud servicePlatform-as-a-Service (PaaS)Infrastructure-as-a-Service (IaaS)22. Cryptography is use to transform message to make them secure and immune from _______.Deselect AnswerCongestionIdleAttackDefend23. SIM stores the _____________.Deselect AnswerPhone serial numberCell network type (such as; 3G/4G)Mobile Subscriber IdentityTower details24. __________ is the protocol that supports linking from one web page to another page.Deselect AnswerHTMLHTTPFTPIP25. _________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.Deselect AnswerVirtualisationSecurityCost-savingsScalability26 out of 25Time is Up! Related