Header Ads Widget

CYBER FORENSIC QUIZ PART-1



CYBER FORENSIC QUIZ 

Q1. How will you differentiate Cybercrime with traditional crimes?

  1. Cybercrime don’t have physical or geographic boundaries whereas traditional crimes have physical or geographic boundaries.
  2. Physical presence will be an indication of traditional crimes
  3. Virtual presence will be the indication of Cyber crimes
  4. All are correct

ANSWER- 4

Q2. Which among the following is not the type of Cyber Forensics?

  1. Network forensics
  2. Wireless forensics
  3. Data Forensics
  4. Malware Forensics

ANSWER- 3

Q3. Cyber labs program to train law-enforcement agencies in handling cyber crimes, is established in India by?

  1. DSCI (Data Security Council of India)
  2. NASSCOM (National Association of Software and Service Companies)
  3. Ministry of Information & technology
  4. NITI Aayog (National Institution for Transforming India)

ANSWER- 2

Q4. Hacking is which type of cyber crime?

  1. Content violations
  2. Theft or misuse of services
  3. Theft or misuse of services
  4. Unauthorised access

ANSWER- 4

Q5. Which among the following is the type of hactivism?

  1. Doxing
  2. Website replication
  3. Information leaks
  4. All of these

ANSWER- 4

Q6. How will you define network hacking?

  1. Unauthorized access to the computer and steals the information from PC
  2. Unauthorized access on an Email account
  3. Gathering information about a network
  4. Unauthorized access over a web server

ANSWER- 3

Q7. Which among the following is not the type of hacker?

  1. Script Kiddie
  2. Neophyte
  3. Hacktivist
  4. All are types of hacker

ANSWER- 4

Q8. Which among the following is correct about DOS attack?

  1. DOS attack done by multiple computer devices
  2. It is done by using internet- connected devices
  3. Both are correct
  4. None of these

ANSWER- 2

Q9. What/who is Botherder?

  1. A person who designed a malware
  2. A person who controls a botnet
  3. A type of cyber attack
  4. A type of computer worm

ANSWER- 2

Q10. Match column I with column II-

Column I

Column II

A. Zombie

1. Group of IOT devices infected with malware, remotely controlled by an attacker.

B. Packets

2. A malware infected computer system used to cause DOS & DDOS attack.

C. Botnet

3. Data sent over computer networks.

  1. A-1; B-3; C-2
  2. A-2; B-3; C-1
  3. A-3; B-2; C-1
  4. A-2; B-1; C-3

ANSWER- 2

 

Post a Comment

0 Comments