CYBER FORENSIC QUIZ
Q1. How will you differentiate Cybercrime with traditional
crimes?
- Cybercrime don’t have physical or geographic boundaries whereas traditional crimes have physical or geographic boundaries.
- Physical presence will be an indication of traditional crimes
- Virtual presence will be the indication of Cyber crimes
- All are correct
ANSWER- 4
Q2. Which among the following is not the type of Cyber Forensics?
- Network forensics
- Wireless forensics
- Data Forensics
- Malware Forensics
ANSWER- 3
Q3. Cyber labs program to train law-enforcement agencies
in handling cyber crimes, is established in India by?
- DSCI (Data Security Council of India)
- NASSCOM (National Association of Software and Service Companies)
- Ministry of Information & technology
- NITI Aayog (National Institution for Transforming India)
ANSWER- 2
Q4. Hacking is which type of cyber crime?
- Content violations
- Theft or misuse of services
- Theft or misuse of services
- Unauthorised access
ANSWER- 4
Q5. Which among the following is the type of hactivism?
- Doxing
- Website replication
- Information leaks
- All of these
ANSWER- 4
Q6. How will you define network hacking?
- Unauthorized access to the computer and steals the information from PC
- Unauthorized access on an Email account
- Gathering information about a network
- Unauthorized access over a web server
ANSWER- 3
Q7. Which among the following is not the type of hacker?
- Script Kiddie
- Neophyte
- Hacktivist
- All are types of hacker
ANSWER- 4
Q8. Which among the following is correct about DOS
attack?
- DOS attack done by multiple computer devices
- It is done by using internet- connected devices
- Both are correct
- None of these
ANSWER- 2
Q9. What/who is Botherder?
- A person who designed a malware
- A person who controls a botnet
- A type of cyber attack
- A type of computer worm
ANSWER- 2
Q10. Match column I with column II-
Column I |
Column II |
A. Zombie |
1. Group of IOT devices infected with malware, remotely controlled by an attacker. |
B. Packets |
2. A malware infected computer system used to cause DOS & DDOS attack. |
C. Botnet |
3. Data sent over computer networks. |
- A-1; B-3; C-2
- A-2; B-3; C-1
- A-3; B-2; C-1
- A-2; B-1; C-3
ANSWER- 2
0 Comments