1. Computer forensics also known as?
A . digital forensic science
B . computer crime
C . computer forensic science
D . computer forensics investigations
2. Which one option is not a type of cybercrime?
A . Data theft
B . Forgery
C . Damage to data and systems
D . Installing antivirus for protection
3. CCFP stands for?
A . Cyber Certified Forensics Professional
B . Certified Cyber Forensics Professional
C . Certified Cyber Forensics Program
D . Certified Cyber Forensics Product
4. ______________involves the preservation, identification, extraction, and documentation of computer evidence stored as data or magnetically encoded information.
A . Digital Forensics
B . Live Data Collection
C . Incident Response Methodology
D . Forensic Duplication
5. _______________ recording the system time and date.
A . ls
B . date and time
C . rdate
D . w
6. How many c`s in computer forensics?
A . 1
B . 2
C . 3
D . 4
7. You are supposed to maintain three types of records. Which answer is not a record?
A . Chain of custody
B . Documentation of the crime scene
C . Searching the crime scene
D . Document your actions
8. The first computer virus is ——–
A . Virus Bomb
B . Blaster
C . Sasser
D . Creeper
9. _______________data that is stored in memory, or exists in transit, that will be lost when the computer loses power or is turned off.
A . Volatile
B . Non Volatile
C . Both
D . None of the above
10. Expand DoS Attacks __________________________
A . Denial of Service
B . Disk operating System
C . Duplication of Service
D . None of the above
11.. What category of software is designed to causedetriment to your computer?
A . System software
B . Network snakes
C . Malware
D . Bugs
12.. Rules of Digital Forensic “An examination should never be performed on the original media.” Is true of false? ________________________
A . true
B . false
C . both
D . None of the above
13.. Expand CSIRT____________________________________
A . Computer Security Incident Request Team
B . Computer Security Incident Response Team
C . Cyber Security Incident Response Team
D . None of the above
14.. Which of the following describes malicious computer programs such as viruses, worms, and Trojan horses?
A . Software piracy
B . Malware
C . Larceny
D . Arson
15.. Choose the process model whose goal is to completely describe the flow of information in a digital investigation.
A . The Physical Model
B . The Staircase Model
C . The Evidence Flow Model
D . The Subphase Model
16. Write any two components of Incident Response Methodology ___________ and _____________
A . Preparation, Identification
B . Containment, Eradication
C . Recovery, Lessons learned
D . Any of the above
17.. After An Incident Responder Identifies That A Security Incident Is In Progress, What Is The Next Step In The Incident Response Process?
A . Preparation
B . Recovery
C . Eradication
D . Containment
18.. Which of the following are not the Types of Cybercrimes?
A . Denial-of-Service Attacks
B . Monkey Attacks
C . Cyber Pornography
D . Software Piracy
19.. Which of the following have the capability of spreading itself? It doesn’t require the host and human support to sprea
A . Virus
B . Trojan
C . Worm
D . Bug
20.. Minimizing the number of incidents is a function of which of the following?
A . Incident response testing
B . Forensic analysis
C . Risk management
D . Security investments
21.. Which of the following attack types best describes a targeted attack that successfully obstructs functionality?
A . Spam attack
B . Malware attack
C . DDoS attack
D . Killer attack
22.. Which of the following belong to Categories of Cybercrimes
A . Cybercrimes against People
B . Cybercrimes against Property
C . Cybercrimes against Government
D . All the above
23.. What is the command use to indentify the running processes
A . nbtstart
B . ps
C . netstat
D . query user
24.. Which tool is not a Qualified Forensic Duplicate of a Hard Drive
A . SafeBack
B . EnCase
C . FTK Imager
D . None of the above
25.. How Many Rules in Digital forensic
A . 12
B . 19
C . 10
D . 6
26.. In Computer intrusions the attacker will be leave multiple traces of their presence in:
A . File System
B . Registry
C . System Logs
D . All of the Above
27.. What is an grey hat hacker
A . Black Hat Hacker
B . White Hat Hacker
C . Combination of White and black hat hackers
D . None
28.. To crack the password you need cracking tool such as:
A . LC4
B . John The Ripper
C . pwdump
D . All of the above
29.. Which of the following belong to Categories of Cybercrimes?
A . Cybercrimes against People
B . Cybercrimes against Property
C . Cybercrimes against Government
D . All the above
30. ___________ is a crime committed when someone uses the internet and other technologies to harass or stalk another person online
A . Cyber Bullying
B . Cyber stalking
C . Identity Theft
D . None
31.. Volatile data resides in ?
A . registries
B . cache
C . RAM
D . All of the above
32.. The term cybercrime refers to _________________________________
A . Any criminal activity carried out over the internet
B . Any criminal activity carried out over computer
C . Any criminal activity carried out without the internet
D . Any criminal activity carried out over computer with the internet
33.. The virus does not have the capability of spreading itself. It requires the host and human support to sprea.” Is true of false”? ________________
A . true
B . false
C . both
D . None of the above
34.. Which of the following techniques are used during computer forensics investigations?
A . Cross-drive analysis
B . Live analysis
C . Deleted files
D . All of the above
35.. Which one of the following is used for encrypted data transfer?
A . netstat
B . cryptcat
C . md5sum
D . netcat
36.. Which command is used to record all users who currently logged on
A . nbtstart
B . PsLoggedOn
C . netstat
D . query user
37..Which command used to list the open ports
A . nbtstart
B . Fport
C . netstat
D . rasusers
38.. Choose the command that shows all Registry data in real time on a Windows computer.
A . PsReg
B . RegMon
C . RegExplorer
D . RegHandle
39.. Choose the term which describes Digital forensics.
A . Science of collecting and analyzing evidence
B . process of Chasing the criminal
C . Process of punishing the culprit
D . preservation filtering and organization of evidence
40.. Which tool is used for analysis of forensic image?
A . FTK Imager
B . Flawfinder
C . Nessus
D . Openstego
41.. Which of the following is not a Forensic Image Formats?
A . Complete Disk Image
B . Partition Image
C . OEM Image
D . Logical Image
42.. ____________is a broad phrase that encompasses a wide range of cyber attacks such as Trojans, viruses, and worms
A . Malware
B . Computer Crime
C . Phishing
D . None
43.. What is the command used to display command history taken during initial response
A . nbtstart
B . doskey
C . netstat
D . query user
44.. Digital Evidence in the form of the:
A . Office File
B . E-mail Messages
C . Either A or B
D . Both A and B
45.. ________________is the process of dealing with a data breach or cyber attack, including how an organization attempts to control the consequences of such an incident.
A . Digital Forensics
B . Live Data Collection
C . Incident Response Methodology
D . Forensic Duplication
46.. Computer forensics also is used in civil proceedings.
A . Yes
B . No
C . Can be yes or no
D . Cannot say
47.. Which of the following techniques are used during computer forensics investigations?
A . Cross-drive analysis
B . Live analysis
C . Deleted files
D . All of the above
48.. Deleted files are a common technique used in computer forensics is the recovery of deleted files.
A . TRUE
B . FALSE
C . Can be true or false
D . Cannot say
49.. You are supposed to maintain three types of records. Which answer is not a record?
A . Chain of custody
B . Documentation of the crime scene
C . Searching the crime scene
D . Document your actions
50.. Which of the following actions compromise cyber security?
A . Vulnerability
B . Attack
C . Threat
D . Exploit
☞ Cyber Forensics Objective Type Question Bank-Part-2 - [ Cyber Forensics ]
☞ Cyber Forensics Objective Type Question Bank-Part-1 - [ Cyber Forensics ]
☞ PPS MCQs - Unit-1 - [ PPS ]
☞ PPS MCQs - Unit-2 - [ PPS ]
☞ PPS MCQs - Unit-3 - [ PPS ]
☞ PPS MCQs - Unit-4 - [ PPS ]
☞ PPS MCQs - Unit-5 - [ PPS ]
☞ Object Oriented Programming through Java MCQs - Unit-1 - [ OOP_JAVA ]
☞ Object Oriented Programming through Java MCQs - Unit-2 - [ OOP_JAVA ]
☞ Object Oriented Programming through Java MCQs - Unit-3 - [ OOP_JAVA ]
☞ Object Oriented Programming through Java MCQs - Unit-4 - [ OOP_JAVA ]
☞ Object Oriented Programming through Java MCQs - Unit-5 - [ OOP_JAVA ]
☞ Design and Analysis of Algorithms MCQs - Unit-1 - [ DAA ]
☞ Design and Analysis of Algorithms MCQs - Unit-2 - [ DAA ]
☞ Design and Analysis of Algorithms MCQs - Unit-3 - [ DAA ]
☞ Design and Analysis of Algorithms MCQs - Unit-4 - [ DAA ]
☞ Design and Analysis of Algorithms MCQs - Unit-5 - [ DAA ]
☞ Software Engineering MCQs - Unit-1 - [ SE ]
☞ Software Engineering MCQs - Unit-2 - [ SE ]
☞ Software Engineering MCQs - Unit-3 - [ SE ]
☞ Software Engineering MCQs - Unit-4 - [ SE ]
☞ Software Engineering MCQs - Unit-5 - [ SE ]
☞ Data Mining MCQs - Unit-1 - [ DM ]
☞ Data Mining MCQs - Unit-2 - [ DM ]
☞ Data Mining MCQs - Unit-3 - [ DM ]
☞ Data Mining MCQs - Unit-4 - [ DM ]
☞ Data Mining MCQs - Unit-5 - [ DM ]
☞ Computer Organization and Architecture (COA) Objective Question Bank-Unit-1 - [ COA ]
☞ Computer Organization and Architecture (COA) Objective Question Bank-Unit-2 - [ COA ]
☞ Computer Organization and Architecture (COA) Objective Question Bank-Unit-3 - [ COA ]
☞ Computer Organization and Architecture (COA) Objective Question Bank-Unit-4 - [ COA ]
☞ Computer Organization and Architecture (COA) Objective Question Bank-Unit-5 - [ COA ]
☞ Data Structures Objective Type Question Bank-Unit-1 - [ DS ]
☞ Data Structures Objective Type Question Bank-Unit-2 - [ DS ]
☞ Data Structures Objective Type Question Bank-Unit-3 - [ DS ]
☞ Data Structures Objective Type Question Bank-Unit-4 - [ DS ]
☞ Data Structures Objective Type Question Bank-Unit-5 - [ DS ]
☞ Database Management System Objective Type Question Bank-Unit-1 - [ DBMS ]
☞ Database Management System Objective Type Question Bank-Unit-2 - [ DBMS ]
☞ Database Management System Objective Type Question Bank-Unit-3 - [ DBMS ]
☞ Database Management System Objective Type Question Bank-Unit-4 - [ DBMS ]
☞ Database Management System Objective Type Question Bank-Unit-5 - [ DBMS ]
☞ Java Programming Objective Type Question Bank - [ Java Programming ]
☞ Java Programming Objective Type Questions-Part-1 - [ Java Programming ]
☞ Java Programming Objective Type Questions-Part-2 - [ Java Programming ]
☞ Java Programming Objective Type Questions-Part-3 - [ Java Programming ]
☞ Java Programming Objective Type Questions-Part-4 - [ Java Programming ]
☞ Java Programming Objective Type Questions-Part-5 - [ Java Programming ]
☞ Neural Networks and Deep Learning-Unit-1 Objective Type Questions - [ NNDL ]
☞ Neural Networks and Deep Learning-Unit-2 Objective Type Questions - [ NNDL ]
☞ Neural Networks and Deep Learning-Unit-3 Objective Type Questions - [ NNDL ]
☞ Neural Networks and Deep Learning-Unit-4 Objective Type Questions - [ NNDL ]