CF U1&2 - CYBER FORENSICS MCQ PDF

Title CF U1&2 - CYBER FORENSICS MCQ
Course Cyber Forensics
Institution Anna University
Pages 5
File Size 326.7 KB
File Type PDF
Total Downloads 58
Total Views 197

Summary

CYBER FORENSICS MCQ
...


Description

CYBER FORENSICS UNIT 1 : 1. Which of the following is a class of computer threat? a) DoS attack b) Phishing c) Stalking d) Soliciting Answer :Dos attack 2. Which of the following is not a type of cyber crime? a) Data theft b) Forgery c) Damage to data and systems d) Installing antivirus for protection Answer : d

Explanation: Cyber crimes are one of the most threatening terms that is an evolving phase. It is said that major percentage of the World War III will be based on cyber-attacks by cyber armies of different countries.

3. Cyber-laws are incorporated for punishing all criminals only. a) True b) False Answer: b Explanation: Cyber-laws were incorporated in our law book not only to punish cyber criminals but to reduce cyber crimes and tie the hands of citizens from doing illicit digital acts that harm or damage other’s digital property or identity.

4. Cyber-crime can be categorized into ________ types. a) 4 b) 3 c) 2 d) 6 Answer: c Explanation: Cyber crime can be categorized into 2 types. These are peer-to-peer attack and computer as weapon. In peer-to-peer attack, attackers target the victim users; and in computer as weapon attack technique, computers are used by attackers for a mass attack such as illegal and banned photo leak, IPR violation, pornography, cyber terrorism etc. 5. Which of the following is not a type of peer-to-peer cyber-crime? a) Phishing b) Injecting Trojans to a target victim

c) MiTM d) Credit card details leak in deep web Answer: d Explanation: Phishing, injecting Trojans and worms to individuals comes under peer-to-peer cyber crime. Whereas, leakage of credit card data of a large number of people in deep web comes under computer as weapon cyber-crime. 6. Which is not a sep in the scientific method? a) Raise a question b) Test the hypothesis c) Wait to test d) Draw a conclusion Ans : c

7. There are three c's in computer forensics. Which is one of the three? a) Control b) Chances c) Chains d) Coins Answer :a) 8. You are suppose to maintain three types of records. Which answer is not a record? a) Chain of custody b) Documentation of crime scene c) Searching the crime scene d) Document your action Answer : c) 9. Physical Forensics Discipline include which of the following? a) Bloodstain b) Eating c) Watching d) Searching Answer :a) 10. Which word best fits with this definition - officials set up a perimeter around a crime scene? a) Civilian b) Math c) Law enforcement d) Police officer Ans : c)

UNIT 2

References:

1. 2. 3. 4. 5.

https://www.onlineinterviewquestions.com/information-security-mcq/ https://www.sanfoundry.com/cyber-security-questions-answers-cyber-laws-it-laws-1/ https://www.proprofs.com/quiz-school/quizshow.php?title=chapter-4-computer-forensics&q=1 http://grd.org:8084/grdcs/mcq/618U1%20CYBER%20LAW.pdf...


Similar Free PDFs