MCQs on Cyber Forensics
This Test contains total 25 MCQs on Cyber Forensics. Test your Knowledge.
Best of Luck.
1.
Which program will be used to gain administrative rights on one's computer?
2.
_________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.
3.
The first part of a complete URL is the __________ needed to access the web resource.
4.
What category of software is designed to cause detriment to your computer?
5.
SIM stores the _____________.
6.
A device operating at network layer is called ____ .
7.
________ describes a cloud service that can only be accessed by a limited amount of people.
8.
Length of Port address in TCP/IP is _________
9.
A single, common key is used to encrypt and decrypt the message in :
11.
Degausser is used for ____.
12.
How many levels of addressing is provided in TCP/IP protocol?
13.
What is found at Cylinder 0, Head 0, and Sector 1 on a hard drive?
14.
For what purpose, ‘Volatility’ tool is used?
15.
Unsolicited commercial emails are commonly known as?
16.
________ describes a distribution model in which applications are hosted by a service provider and made available to users.
17.
An intrusion detection system (IDS) can be used to monitor and filter network traffic. From the viewpoint of detection, which main IDS types can be distinguished?
18.
__________ is the protocol that supports linking from one web page to another page.
19.
Which are the sections of IT Act is applicable for Cyber pornography?
20.
Which of the following protocols uses both TCP and UDP?
21.
The huge numbers of devices connected to the internet of things have to communicate automatically NOT via humans. What is this called?
22.
The browser’s __________ keeps a list of web pages you have visited during the current session.
23.
What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
24.
IT Act 2000 amended various sections of the following Acts EXCEPT?
25.
Cryptography is use to transform message to make them secure and immune from _______.