Header Ads Widget

Cyber Forensic quiz Part-2

Q1. Which among the following correctly explains the Cyber vandalism?

  1. Virtual defacement of someone else’s property
  2. Non-marital sexual services offered through the internet.
  3. An attempt to prevent users of a particular service from effectively using that service
  4. None of these

ANSWER-1

Q2. What is Smishing?

  1. Also k/a SMS phishing
  2. Similar to email phishing
  3. Typically invite the user to click a link, call a phone number, or contact an email address provided by the attacker via SMS message
  4. None of these
  5. All of these

ANSWER-5

Q3. What is spear phising?

  1. Use of telephony to conduct phishing attacks
  2. Involves an attacker directly targeting a specific organization or person with tailored phishing emails
  3. Termed bulk phishing
  4. Both B & C

ANSWER-2

Q4. Short cut key for Warm booting-

  1. CTRL + DELETE
  2. SHIFT+ DELETE
  3. ALT + DELETE
  4. CTRL + ALT + DELETE

ANSWER-4

Q5. How would you define Hacking?

  1. Unauthorized intrusion into computers
  2. Authorized intrusion into computers
  3. Used to breach computer software with malicious intent
  4. None of these

ANSWER-1

Q6. What is URL hijacking?

  1. Also Known as Typo-squatting
  2. An activity whereby someone acquires or otherwise assumes the online identity of another entity for the purposes of acquiring that person's or business's brand equity
  3. Relies on mistakes such as typos made by Internet users when inputting a website address into a web browser
  4. Both A & C

ANSWER-4

Q7. Which among the following is not the example of computer virus?

  1. Code Red
  2. Creeper
  3. Trojan viruses
  4. Elk Cloner

ANSWER-3

Q8. What is Cyber-extortion?

  1. A crime in which someone, via email, threatens to attack an individual, business, or organization if money is not provided to prevent the attack
  2. Malware computer program that replicates itself in order to spread to other computers
  3. Encompasses all the actions and processes that aim to attack a nation in order to cause harm that is comparable to the traditional warfare
  4. None of these

ANSWER-1

Q9. Cyber-terrorism involves?

  1. Act of misusing a computer system or network for a socially or politically motivated reason
  2. Fraudulent attempt to obtain sensitive information or data
  3. All of these
  4. The politically motivated use of computers and information technology to cause severe disruption or widespread fear in society

ANSWER-4

Q10. What is cold booting?

  1. To start up a computer that is turned off.
  2. Also called a hard boot.
  3. To start up a computer that is turned on.
  4. Both A & B

ANSWER-4

Post a Comment

2 Comments

  1. Ma'am could you please post the mcqs in pdf with answers

    ReplyDelete
  2. Big fan of your YouTube channel and blog

    ReplyDelete