Menu

Objective Type Questions & Answers


Cyber Forensics Objective Type Question Bank-Part-2



1. HTTPS is abbreviated as _________

A . Hypertexts Transfer Protocol Secured

B . Secured Hyper Text Transfer Protocol

C . Hyperlinked Text Transfer Protocol Secured

D . Hyper Text Transfer Protocol Secure

Answer



2. Which of the following is not a strong security protocol?

A . SSL

B . HTTPL

C . SMTP

D . SFTP

Answer



3. An attempt to make a computer resource unavailable to its intended users is called _________

A . Denial-of-service attack

B . Virus attack

C . Worms attack

D . Botnet process

Answer



4. You are supposed to maintain three types of records. Which answer is not a record?

A . Chain of custody

B . Documentation of the crime scene

C . Searching the crime scene

D . Document your actions

Answer



5. Volatile data resides in ____________________________?

A . Registries

B . Cache

C . RAM

D . All of the above

Answer



6. Who Can Use Computer Forensic Evidence? 

A . Criminal Prosecutors

B . Civil litigations

C . Law enforcement

D . All of them

Answer



7. When handling computers for legal purposes, investigators increasingly are faced with four main types of problems, except:  

A . How to recover data from computers while preserving evidential integrity

B . How to keep your data and information safe from theft or accidental loss

C . How to securely store and handle recovered data

D . How to find the significant information in a large volume of data

Answer



8. In order for a double tier approach to work it is necessary to have:  

A . A defined methodology

B . Civil control

C . A breach of contract

D . Asset recovery

Answer



9. Criteria for equipment in the double tier approach results in the following except:  

A . Simple to use

B . Quick to learn

C . Totally reliable

D . Legally operable

Answer



10. Computer forensics specialist will take several careful steps to identify and attempt to retrieve possible evidence 

A . Protect

B . Discover

C . Recover

D . All of them

Answer



11. A computer forensics professional does more than turn on a computer, make a directory listing, and search through files. Your forensics professionals should be able to successfully perform complex evidence recovery procedures with the skill and expertise that lends credibility to your case. For example, they should be able to perform the following services, except:  

A . Data seizure

B . Data duplication and preservation

C . Data recovery

D . Data dump

Answer



12. The following are what it really costs to replace a stolen computer, except:  

A . The price of the replacement hardware

B . The price of replacing the software

C . The cost of creating data

D . The cost of lost production time or instruction time

Answer



13. Forensic services include but are not limited to the following, except:  

A . Lost password and file recovery

B . Location and retrieval of deleted and hidden files

C . File and email decryption

D . Email non-supervision and non-authentication

Answer



14. Computer evidence is like any other evidence. It must be 

A . Authentic

B . Accurate

C . Complete

D . All of them

Answer



15. The legal aspects of a computer forensics investigation center primarily on the following two main issues:  

A . The requirements that need to be met in order for evidence to be successfully presented in court and, of course, not considered legally admissible

B . The requirements that need to be met in order for evidence to be successfully presented in court and, of course, considered legally admissible

C . The right of the investigator to avoid the possibility of not incurring legal action against himself or the organization for whom he is conducting the investigation

D . The acceptance of the investigator to avoid the possibility of incurring legal action against himself or the organization for whom he is reviewing the investigation

Answer



16. Which of the following is not a type of peer-to-peer cyber-crime?  

A . Phishing

B . Injecting Trojans to a target victim

C . MiTM

D . Credit card details leak in deep web

Answer



17. In terms of digital evidence, the Internet is an example of  

A . Open computer systems

B . Communication systems

C . Embedded computer systems

D . None of the above

Answer



18. In terms of digital evidence, a hard drive is an example of:

A . Open computer systems

B . Communication systems

C . Embedded computer systems

D . None of the above

Answer



19. In terms of digital evidence, a Smart Card is an example of 

A . Open computer systems

B . Communication systems

C . Embedded computer systems

D . None of the above

Answer



20. Private networks can be a richer source of evidence than the Internet because:  

A . They retain data for longer periods of time.

B . Owners of private networks are more cooperative with law enforcement.

C . Private networks contain a higher concentration of digital evidence.

D . All of the above.

Answer



21. Computers can play the following roles in a crime:  

A . Target, object, and subject

B . Evidence, instrumentality, contraband, or fruit of crime

C . Object, evidence, and tool

D . Symbol, instrumentality, and source of evidence

Answer



22. The following specializations exist in digital investigations:  

A . First responder (a.k.a. digital crime scene technician)

B . Forensic examiner

C . Digital investigator

D . All of the above

Answer



23. A printer used for counterfeiting is an example of:  

A . Hardware as contraband or fruits of crime

B . Hardware as an instrumentality

C . Hardware as evidence

D . Information as contraband or fruits of crime

Answer



24. Having a member of the search team trained to handle digital evidence: 

A . Can reduce the number of people who handle the evidence

B . Can serve to streamline the presentation of the case

C . Can reduce the opportunity for opposing counsel to impugn the integrity of the evidence

D . All of the above

Answer



25. What can you do to determine the number of sectors on a hard drive larger than 8GB? 

A . Use a UNIX tool like hdparm

B . Use a Windows tools like EnCase

C . Check the drive manufacturer’s website for the specific drive

D . All of the above

Answer



26. A device that connects network with different protocols 

A . Switch

B . Hub

C . Gateway

D . All of the above

Answer



27. A device that is used to connect a number of LANs is  

A . Routers

B . Repeater

C . Bridge

D . All of these

Answer



28. Because the Internet is built upon the TCP/IP protocol, many hacker attacks will seek to exploit the TCP ports of these servers with public IP addresses. A number of common ports are scanned and attacked, except: 

A . FTP (21)

B . Telnet (23)

C . SMTP (25)

D . INS (53)

Answer



29. There are _______ major ways of stealing email information.

A . 2

B . 3

C . 4

D . 5

Answer



30. Which of them is not a major way of stealing email information?

A . Stealing cookies

B . Reverse Engineering

C . Password Phishing

D . Social Engineering

Answer



31. Which of them is an example of grabbing email information?

A . Cookie stealing

B . Reverse engineering

C . Port scanning

D . Banner grabbing

Answer



32. The process of documenting the seizure of digital evidence and, in particular, when that evidence changes hands, is known as:

A . Chain of custody

B . Field notes

C . Interim report

D . None of the above

Answer



33. A network sniffer program is an example of:

A . Hardware as contraband or fruits of crime

B . Hardware as an instrumentality

C . Information as an instrumentality

D . Information as evidence

Answer



34. HDD,CD/DVD media, backup tapes, USB drive, biometric scanner, digital camera, smart phone, smart card, PDA etc. are ________________________________________.

A . Physical evidence

B . Electronic evidence

C . Illustrative evidence.

D . Documented evidence

Answer



35. Which of the following is not a type of volatile evidence?

A . Routing tables

B . Main memory

C . Log files

D . Cached data

Answer



36. Private networks can be a richer source of evidence than the Internet because:

A . They retain data for longer periods of time.

B . Owners of private networks are more cooperative with law enforcement.

C . Private networks contain a higher concentration of digital evidence.

D . All of the above.

Answer



37. ___________________ the first task in computer forensics investigation. 	

A . Acquisition

B . Validation and discrimination

C . Extraction

D . Reconstruction

Answer



38. Validating data is done by obtaining

A . Binary values

B . Hex values

C . Hash values

D . None of the above

Answer



39. _____________________laptop computer with a built-in LCD monitor and almost as many bays and peripherals as a stationary workstation 				

A . Lightweight workstation

B . Portable workstation

C . Advanced Stationary workstation

D . None of the above

Answer



40. ___________________publishes articles, provides tools, and creates procedures for testing and validating computer forensics software.						

A . IIT

B . MIT

C . NIST

D . both B & C

Answer



41. ______________________ e-mail system is specific to a company, used only by its employees.	

A . Localhost

B . Intranet

C . Internet

D . None of the above

Answer



42. What is the disadvantage of circular logging? 			

A . It saves server space

B . Can’t recover a log after it’s overwritten

C . It records traffic in the Mon.log file

D . None of the above

Answer



43. E-mail logs generally identifies:				

A . E-mail contents

B . IP address

C . System-specific information

D . All of the above

Answer



44. What are some tools that can be used to recover e-mail files? 			

A . ProDiscover Basic and Access Data FTK

B . FINAL e MAIL for Outlook Express and Eudora

C . Sawmill-GroupWise for log analysis office_agent.html

D . All of the above

Answer



45. What is the search criteria used to find log files?				

A . .log

B . .db

C . .pst

D . .ost

Answer



46. What is one of the most challenging tasks in digital forensics? 		

A . Investigating cell phones and mobile devices

B . Investigating laptops and desktops

C . Investigating servers and databases

D . Investigating networks and routers

Answer



47. What is a SIM card reader?			

A . A software device

B . A hardware device

C . A combination hardware/software device

D . None of these

Answer



48. What is the first tool used for computer investigations? 		

A . Norton Disk Edit

B . FTK Imager

C . MS-DOS

D . None of the above

Answer



49. What is the most challenging task in a computing investigation?	

A . Data viewing

B . Keyword searching

C . Decompressing

D . Recovery task

Answer



50. What is the primary purpose of data discrimination? 		

A . To remove good data from suspicious data

B . To remove suspicious data from good data

C . To remove all data from the disk

D . To remove all files from the disk

Answer



51. What is the first task in computer forensics investigations?		

A . Copying the original drive

B . Analyzing the data

C . Preserving the original drive

D . Acquiring an image

Answer



52. What are software forensics tools used for? 			

A . To analyze image files

B . To copy data from a suspect’s drive to an image file

C . To read all structures in an image file though image were original drive.

D . Both B and C

Answer



53. What is the purpose of GUI acquisition tools?			

A . To analyze image files

B . To copy data from a suspect’s drive to an image file

C . To read all structures in an image file as though the image were the original drive.

D . All the above

Answer



54. What are some analysis tools used for analyzing image files? 	

A . ProDiscover and En Case

B . FTK and X-Ways Forensics

C . ILook

D . All of the above

Answer



55. Software Forensics Tools Software forensics tools are grouped into 		

A . Command-line applications

B . GUI applications

C . Both A & B

D . None of the Above

Answer



56. What is the function of validation and discrimination? 			

A . To refine data analysis and recovery

B . To acquire data from a device

C . To extract data from a device

D . None of the above

Answer



57. ____________________powerful Windows tool available at Sysinternals

A . RegMon

B . filemon

C . handle

D . All the above

Answer



58. ______________________ tool display who logged on locally 

A . PsLoggedOn

B . PsKill

C . PsPasswd

D . PsList

Answer



59. _________________ Kills processes by name or process ID

A . PsExec

B . PsGetSid

C . PsKill

D . PsList

Answer



60. _______________ tool allows you to change account password

A . PsService

B . PsPasswd

C . PsShutdown

D . PsSuspend

Answer



61. _______ tool lists detailed information about processes 

A . PsGetSid

B . PsKill

C . PsList

D . PsLoggedOn

Answer



62.) _______ tool shuts down and optionally restarts a computer

A . PsSuspend

B . PsPasswd

C . PsService

D . PsShutdown

Answer



Fill in the Blanks


63. _________________is chronological documentation of electronic evidence.

Answer


64.The aim of a forensic examination is to prove with certainty what occurred (True/False)?

Answer


65. Even digital investigations that do not result in legal action can benefit from principles of forensic science.(True/False)?

Answer


66. Forensic science is the application of science to investigation and prosecution of crime or to the just resolution of conflict.(True/False)?

Answer


67. When a file is deleted from a hard drive, it can often be recovered.(True/False)?

Answer


68. NSA stands for ___________________________________________

Answer


69._______________________ is the strategy developed by the National Security Agency.

Answer


70. Three modes of protection in DiD are ___________________________________.

Answer


71. IDS stand for _______________________________ 

Answer


72. How long a piece of information lasts on a system is known as ________________________

Answer


73.________________ is a collection of free tools for examining Windows products.

Answer


74. DDL stands for _______________________________

Answer


75.___________________ tool shows all Registry data in real time. 

Answer


76.__________________________ enables you to view and control services.

Answer




Relevant Materials :

Cyber Forensics Objective Type Question Bank-Part-2 - [ Cyber Forensics ]

Cyber Forensics Objective Type Question Bank-Part-1 - [ Cyber Forensics ]


Similar Materials :

R - Programming MCQs - Unit-1 - [ R-Programming ]

R - Programming MCQs - Unit-2 - [ R-Programming ]

R - Programming MCQs - Unit-3 - [ R-Programming ]

R - Programming MCQs - Unit-4 - [ R-Programming ]

R - Programming MCQs - Unit-5 - [ R-Programming ]

Formal Languages and Automata Theory (FLAT) MCQs - Unit-1 - [ FLAT ]

Formal Languages and Automata Theory (FLAT) MCQs - Unit-2 - [ FLAT ]

Formal Languages and Automata Theory (FLAT) MCQs - Unit-3 - [ FLAT ]

Formal Languages and Automata Theory (FLAT) MCQs - Unit-4 - [ FLAT ]

Formal Languages and Automata Theory (FLAT) MCQs - Unit-5 - [ FLAT ]

PPS MCQs - Unit-1 - [ PPS ]

PPS MCQs - Unit-2 - [ PPS ]

PPS MCQs - Unit-3 - [ PPS ]

PPS MCQs - Unit-4 - [ PPS ]

PPS MCQs - Unit-5 - [ PPS ]

Object Oriented Programming through Java MCQs - Unit-1 - [ OOP_JAVA ]

Object Oriented Programming through Java MCQs - Unit-2 - [ OOP_JAVA ]

Object Oriented Programming through Java MCQs - Unit-3 - [ OOP_JAVA ]

Object Oriented Programming through Java MCQs - Unit-4 - [ OOP_JAVA ]

Object Oriented Programming through Java MCQs - Unit-5 - [ OOP_JAVA ]

Design and Analysis of Algorithms MCQs - Unit-1 - [ DAA ]

Design and Analysis of Algorithms MCQs - Unit-2 - [ DAA ]

Design and Analysis of Algorithms MCQs - Unit-3 - [ DAA ]

Design and Analysis of Algorithms MCQs - Unit-4 - [ DAA ]

Design and Analysis of Algorithms MCQs - Unit-5 - [ DAA ]

Software Engineering MCQs - Unit-1 - [ SE ]

Software Engineering MCQs - Unit-2 - [ SE ]

Software Engineering MCQs - Unit-3 - [ SE ]

Software Engineering MCQs - Unit-4 - [ SE ]

Software Engineering MCQs - Unit-5 - [ SE ]

Data Mining MCQs - Unit-1 - [ DM ]

Data Mining MCQs - Unit-2 - [ DM ]

Data Mining MCQs - Unit-3 - [ DM ]

Data Mining MCQs - Unit-4 - [ DM ]

Data Mining MCQs - Unit-5 - [ DM ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-1 - [ COA ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-2 - [ COA ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-3 - [ COA ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-4 - [ COA ]

Computer Organization and Architecture (COA) Objective Question Bank-Unit-5 - [ COA ]

Data Structures Objective Type Question Bank-Unit-1 - [ DS ]

Data Structures Objective Type Question Bank-Unit-2 - [ DS ]

Data Structures Objective Type Question Bank-Unit-3 - [ DS ]

Data Structures Objective Type Question Bank-Unit-4 - [ DS ]

Data Structures Objective Type Question Bank-Unit-5 - [ DS ]

Database Management System Objective Type Question Bank-Unit-1 - [ DBMS ]

Database Management System Objective Type Question Bank-Unit-2 - [ DBMS ]

Database Management System Objective Type Question Bank-Unit-3 - [ DBMS ]

Database Management System Objective Type Question Bank-Unit-4 - [ DBMS ]

Database Management System Objective Type Question Bank-Unit-5 - [ DBMS ]