Header Ads Widget

Passage Based Questions[Forensic Science]



 Read the passage carefully and answer the following questions (1-5)-

Only recently official website of Mumbai police cyber cell, cybercellmumbaicity.com was reportedly hacked by hackers. The police investigating with the help of technology expert were able to nab the two hackers, one an engineering dropout & another a software programmer & owner of a cyber café operating under assumed name of “Dr. Neukar” & “Libran”. The computer owned by one of the accomplice had various tools for hacking sites, codes of credit cards & mobile phones. With the help of these tools the hackers’ were successful in downloading certain files. The hackers had their own website with hacking tools & displaying message saying, “we hack, we teach, we make history, we are the analysers.”

Q1. Which section of Information and Technology Act defines Hacking?

  1. Section 65
  2. Section 66
  3. Section 43
  4. Section 67

ANSWER-B

EXPLANATION

Section 65 of Information and Technology Act: Tampering with computer source documents.

Section 66 of Information and Technology Act: Hacking with computer system (1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both

Section 43 of Information and Technology Act: Penalty for damage to computer, computer system, etc.

Section 67 of Information and Technology Act: Publishing of information which is obscene in electronic form.

Q2. What is Hacking?

  1. Programmed attack which involves making alteration so insignificant that it is easily concealed and would go completely unnoticed. 
  2. To redirect a website's traffic to another, fake site
  3. Unauthorized access to or control over computer system,  network security systems for some illegal purpose.
  4. Involves altering the raw data just before a computer processes it and then changing it back after processing is completed.

ANSWER-C

EXPLANATION

Salami Attack:- programmed attack which is implemented in small (meant to be unnoticeable) increments. This attack involves making alteration so insignificant that it is easily concealed and would go completely unnoticed. Attacks are used for commission of financial crimes.

Pharming:-  an online scam similar to phishing. To redirect a website's traffic to another, fake site

Hacking:- unauthorised access to or control over computer system,  network security systems for some illegal purpose.

Data Didling:- Involves altering the raw data just before a computer processes it and then changing it back after processing is completed.

Q3. Which of the following statement is incorrect about skiddie?

  1. Unskilled individual who uses scripts developed by others to attack computer systems and networks and deface websites.
  2. Also known as script kiddies or skid.
  3. Most common types of attack involves a form of social engineering
  4. Not a type of hacking.
  5. All are correct

ANSWER-D

EXPLANATION

Social Engineering :- psychological manipulation of people into performing actions or divulging confidential information. any act that influences a person to take an action that may or may not be in their best interests.

For example, social engineering is the use of the "forgot password" function on most websites which require login. An improperly-secured password-recovery system can be used to grant a malicious attacker full access to a user's account, while the original user will lose access to the account.

Q4. Which of the following is not the correct way to track the computer system of hacker?

  1. IP address
  2. Mac address
  3. IMEI number
  4. All of these

ANSWER-C

EXPLANATION

IP address:- a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent through the internet or local network.

Mac address:- Media access control address, a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.

NIC is a computer hardware component that connects a computer to a computer network.

IMEI number:- International Mobile Equipment Identity. It is a 15-digit number unique to each mobile phone. IMEI numbers are standard across the industry. 

Q5. Match the following-

  1. 1-C, 2-D, 3-B, 4-A
  2. 1-B, 2-A, 3-D, 4-C
  3. 1-C, 2-A, 3-D, 4-B
  4. 1-A, 2-D, 3-B, 4-C

ANSWER-A

EXPLANATION 

Q6. Which is correctly defines the Penetration Tester?
  1. Red hat hacker
  2. White hat hacker
  3. Grey hat hacker
  4. Black hat hacker

ANSWER-B

EXPLANATION

White hat hacker- Ethical Hackers or Penetration Tester

Black hat hacker- Unethical Hacker or Security Cracker

Grey hat hacker- hybrid form of white & black hat hacker.

Red hat hacker- use cyber-attacks to attack black hat hackers to bring them & down & to destroy them. 

Post a Comment

0 Comments