Menu

Objective Type Questions & Answers


Cyber Forensics Objective Type Question Bank



1. Computer forensics also known as?

A . digital forensic science

B . computer crime

C . computer forensic science

D . computer forensics investigations

Answer



2. Which one option is not a type of cybercrime?

A . Data theft

B . Forgery

C . Damage to data and systems

D . Installing antivirus for protection

Answer



3. CCFP stands for?

A . Cyber Certified Forensics Professional

B . Certified Cyber Forensics Professional

C . Certified Cyber Forensics Program

D . Certified Cyber Forensics Product

Answer



4. ______________involves the preservation, identification, extraction, and documentation of computer evidence stored as data or magnetically encoded information.

A . Digital Forensics

B . Live Data Collection

C . Incident Response Methodology

D . Forensic Duplication

Answer



5. _______________ recording the system time and date.

A . ls

B . date and time

C . rdate

D . w

Answer



6. How many c`s in computer forensics?

A . 1

B . 2

C . 3

D . 4

Answer



7. You are supposed to maintain three types of records. Which answer is not a record?

A . Chain of custody

B . Documentation of the crime scene

C . Searching the crime scene

D . Document your actions

Answer



8. The first computer virus is ——–

A . Virus Bomb

B . Blaster

C . Sasser

D . Creeper

Answer



9. _______________data that is stored in memory, or exists in transit, that will be lost when the computer loses power or is turned off.

A . Volatile

B . Non Volatile

C . Both

D . None of the above

Answer



10. Expand DoS Attacks __________________________

A . Denial of Service

B . Disk operating System

C . Duplication of Service

D . None of the above

Answer



11.. What category of software is designed to causedetriment to your computer?

A . System software

B . Network snakes

C . Malware

D . Bugs

Answer



12.. Rules of Digital Forensic “An examination should never be performed on the original media.” Is true of false? ________________________

A . true

B . false

C . both

D . None of the above

Answer



13.. Expand CSIRT____________________________________

A . Computer Security Incident Request Team

B . Computer Security Incident Response Team

C . Cyber Security Incident Response Team

D . None of the above

Answer



14.. Which of the following describes malicious computer programs such as viruses, worms, and Trojan horses?

A . Software piracy

B . Malware

C . Larceny

D . Arson

Answer



15.. Choose the process model whose goal is to completely describe the flow of information in a digital investigation.

A . The Physical Model

B . The Staircase Model

C . The Evidence Flow Model

D . The Subphase Model

Answer



16. Write any two components of Incident Response Methodology ___________ and _____________

A . Preparation, Identification

B . Containment, Eradication

C . Recovery, Lessons learned

D . Any of the above

Answer



17.. After An Incident Responder Identifies That A Security Incident Is In Progress, What Is The Next Step In The Incident Response Process?

A . Preparation

B . Recovery

C . Eradication

D . Containment

Answer



18.. Which of the following are not the Types of Cybercrimes?  		

A . Denial-of-Service Attacks

B . Monkey Attacks

C . Cyber Pornography

D . Software Piracy

Answer



19.. Which of the following have the capability of spreading itself? It doesn’t require the host and human support to sprea 						

A . Virus

B . Trojan

C . Worm

D . Bug

Answer



20.. Minimizing the number of incidents is a function of which of the following?

A . Incident response testing

B . Forensic analysis

C . Risk management

D . Security investments

Answer



21.. Which of the following attack types best describes a targeted attack that successfully obstructs functionality?

A . Spam attack

B . Malware attack

C . DDoS attack

D . Killer attack

Answer



22.. Which of the following belong to Categories of Cybercrimes  		

A . Cybercrimes against People

B . Cybercrimes against Property

C . Cybercrimes against Government

D . All the above

Answer



23.. What is the command use to indentify the running processes		

A . nbtstart

B . ps

C . netstat

D . query user

Answer



24.. Which tool is not a Qualified Forensic Duplicate of a Hard Drive		

A . SafeBack

B . EnCase

C . FTK Imager

D . None of the above

Answer



25.. How Many Rules in Digital forensic 

A . 12

B . 19

C . 10

D . 6

Answer



26.. In Computer intrusions the attacker will be leave multiple traces of their presence in: 

A . File System

B . Registry

C . System Logs

D . All of the Above

Answer



27.. What is an grey hat hacker 

A . Black Hat Hacker

B . White Hat Hacker

C . Combination of White and black hat hackers

D . None

Answer



28.. To crack the password you need cracking tool such as: 

A . LC4

B . John The Ripper

C . pwdump

D . All of the above

Answer



29.. Which of the following belong to Categories of Cybercrimes?  		

A . Cybercrimes against People

B . Cybercrimes against Property

C . Cybercrimes against Government

D . All the above

Answer



30. ___________ is a crime committed when someone uses the internet and other technologies to harass or stalk another person online  			

A . Cyber Bullying

B . Cyber stalking

C . Identity Theft

D . None

Answer



31.. Volatile data resides in ?

A . registries

B . cache

C . RAM

D . All of the above

Answer



32.. The term cybercrime refers to _________________________________

A . Any criminal activity carried out over the internet

B . Any criminal activity carried out over computer

C . Any criminal activity carried out without the internet

D . Any criminal activity carried out over computer with the internet

Answer



33.. The virus does not have the capability of spreading itself. It requires the host and human support to sprea.” Is true of false”? ________________

A . true

B . false

C . both

D . None of the above

Answer



34.. Which of the following techniques are used during computer forensics investigations?

A . Cross-drive analysis

B . Live analysis

C . Deleted files

D . All of the above

Answer



35.. Which one of the following is used for encrypted data transfer?

A . netstat

B . cryptcat

C . md5sum

D . netcat

Answer



36.. Which command is used to record all users who currently logged on	

A . nbtstart

B . PsLoggedOn

C . netstat

D . query user

Answer



37..Which command used to list the open ports  				

A . nbtstart

B . Fport

C . netstat

D . rasusers

Answer



38.. Choose the command that shows all Registry data in real time on a Windows computer.

A . PsReg

B . RegMon

C . RegExplorer

D . RegHandle

Answer



39.. Choose the term which describes Digital forensics.

A . Science of collecting and analyzing evidence

B . process of Chasing the criminal

C . Process of punishing the culprit

D . preservation filtering and organization of evidence

Answer



40.. Which tool is used for analysis of forensic image?

A . FTK Imager

B . Flawfinder

C . Nessus

D . Openstego

Answer



41.. Which of the following is not a Forensic Image Formats?			

A . Complete Disk Image

B . Partition Image

C . OEM Image

D . Logical Image

Answer



42.. ____________is a broad phrase that encompasses a wide range of cyber attacks such as Trojans, viruses, and worms						

A . Malware

B . Computer Crime

C . Phishing

D . None

Answer



43.. What is the command used to display command history taken during initial response

A . nbtstart

B . doskey

C . netstat

D . query user

Answer



44.. Digital Evidence in the form of the:

A . Office File

B . E-mail Messages

C . Either A or B

D . Both A and B

Answer



45.. ________________is the process of dealing with a data breach or cyber attack, including how an organization attempts to control the consequences of such an incident.

A . Digital Forensics

B . Live Data Collection

C . Incident Response Methodology

D . Forensic Duplication

Answer



46.. Computer forensics also is used in civil proceedings.

A . Yes

B . No

C . Can be yes or no

D . Cannot say

Answer



47.. Which of the following techniques are used during computer forensics investigations?

A . Cross-drive analysis

B . Live analysis

C . Deleted files

D . All of the above

Answer



48.. Deleted files are a common technique used in computer forensics is the recovery of deleted files.

A . TRUE

B . FALSE

C . Can be true or false

D . Cannot say

Answer



49.. You are supposed to maintain three types of records. Which answer is not a record?

A . Chain of custody

B . Documentation of the crime scene

C . Searching the crime scene

D . Document your actions

Answer



50.. Which of the following actions compromise cyber security?

A . Vulnerability

B . Attack

C . Threat

D . Exploit

Answer





Relevant Materials :

Cyber Forensics Objective Type Question Bank-Part-2 - [ Cyber Forensics ]

Cyber Forensics Objective Type Question Bank-Part-1 - [ Cyber Forensics ]


Similar Materials :

PPS MCQs - Unit-1 - [ PPS ]

PPS MCQs - Unit-2 - [ PPS ]

PPS MCQs - Unit-3 - [ PPS ]

PPS MCQs - Unit-4 - [ PPS ]

PPS MCQs - Unit-5 - [ PPS ]

Object Oriented Programming through Java MCQs - Unit-1 - [ OOP_JAVA ]

Object Oriented Programming through Java MCQs - Unit-2 - [ OOP_JAVA ]

Object Oriented Programming through Java MCQs - Unit-3 - [ OOP_JAVA ]

Object Oriented Programming through Java MCQs - Unit-4 - [ OOP_JAVA ]

Object Oriented Programming through Java MCQs - Unit-5 - [ OOP_JAVA ]

Design and Analysis of Algorithms MCQs - Unit-1 - [ DAA ]

Design and Analysis of Algorithms MCQs - Unit-2 - [ DAA ]

Design and Analysis of Algorithms MCQs - Unit-3 - [ DAA ]

Design and Analysis of Algorithms MCQs - Unit-4 - [ DAA ]

Design and Analysis of Algorithms MCQs - Unit-5 - [ DAA ]

Software Engineering MCQs - Unit-1 - [ SE ]

Software Engineering MCQs - Unit-2 - [ SE ]

Software Engineering MCQs - Unit-3 - [ SE ]

Software Engineering MCQs - Unit-4 - [ SE ]

Software Engineering MCQs - Unit-5 - [ SE ]

Data Mining MCQs - Unit-1 - [ DM ]

Data Mining MCQs - Unit-2 - [ DM ]

Data Mining MCQs - Unit-3 - [ DM ]

Data Mining MCQs - Unit-4 - [ DM ]

Data Mining MCQs - Unit-5 - [ DM ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-1 - [ COA ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-2 - [ COA ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-3 - [ COA ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-4 - [ COA ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-5 - [ COA ]

Data Structures Objective Type Question Bank-Unit-1 - [ DS ]

Data Structures Objective Type Question Bank-Unit-2 - [ DS ]

Data Structures Objective Type Question Bank-Unit-3 - [ DS ]

Data Structures Objective Type Question Bank-Unit-4 - [ DS ]

Data Structures Objective Type Question Bank-Unit-5 - [ DS ]

Database Management System Objective Type Question Bank-Unit-1 - [ DBMS ]

Database Management System Objective Type Question Bank-Unit-2 - [ DBMS ]

Database Management System Objective Type Question Bank-Unit-3 - [ DBMS ]

Database Management System Objective Type Question Bank-Unit-4 - [ DBMS ]

Database Management System Objective Type Question Bank-Unit-5 - [ DBMS ]

Java Programming Objective Type Question Bank - [ Java Programming ]

Java Programming Objective Type Questions-Part-1 - [ Java Programming ]

Java Programming Objective Type Questions-Part-2 - [ Java Programming ]

Java Programming Objective Type Questions-Part-3 - [ Java Programming ]

Java Programming Objective Type Questions-Part-4 - [ Java Programming ]

Java Programming Objective Type Questions-Part-5 - [ Java Programming ]

Neural Networks and Deep Learning-Unit-1 Objective Type Questions - [ NNDL ]

Neural Networks and Deep Learning-Unit-2 Objective Type Questions - [ NNDL ]

Neural Networks and Deep Learning-Unit-3 Objective Type Questions - [ NNDL ]

Neural Networks and Deep Learning-Unit-4 Objective Type Questions - [ NNDL ]