You are on page 1of 2

SWAMI RAMANANDA TIRTHA INSTITUTE OF SCIENCE & TECHNOLOGY

Subject: COMPUTER FORENSICS IV -YEAR Date: 05-05-2021(A.N)

Name: ___________________ H.T.NO: _________________ Branch: CSE (A&B)

OBJECTIVE

Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 20.

A. Choose the correct alternative:


1. A crime that involves a computer and a network is [ ]

a) Cyber Crime b) Hi-tech Crime c) Cyber Crime Against Person d)NOTA

2. Encase queries the information in how many ways [ ]

a) 2 b) 6 c) 7 d) 9

3. Salami Attack falls under which category of cyber crime? [ ]

a) Cyber Crime against Person b) Cyber Cime Against Organization


c) Cyber Crime Against Property d) Cyber Crime Against Society

4. The tools that are responsible for creating forensic duplicate are [ ]

a) Unix dd command b) dfc/dd command c) open source open data duplicator d) All the above

5. Which of the following is not a data hiding technique? [ ]

a) Hiding Partition and Encryption b) Steganography and Bit Stuffing c) Live Search d) NOTA

6. Which of the following is not the characteristic of Computer Forensics? [ ]

a) Identifying b) Preserving c) Analyzing d) NOTA

7. The ________ file allowing accessibility using last utility [ ]

a) utmp b) wtmp c) lastlog d)NOTA

8. _____falls under Voilent Cybercrimes [ ]

a) Cyber Stalking b) Cyber tresspass c) Cyber Terrorism d)Both a & c

9. _________ is a built-in system tool that manages all listening ports along with their current
connection [ ]

a) rasusers b) netstat c) nbstat d) Fport

10. It is a type of attack in which the words are commonly found in the dictionary are used a
passwords in the program [ ]

a) Brute-Force attack b) Steganography c) Encryption d) Dictionary Attack

11. _____steps are necessary to resolve an incident [ ]

a) 4 b) 8 c) 10 d) 6
12. ______ is system utility offered by foundtone.com for identifying successful and failed
logons [ ]

a) NTLast b) Sfind c) dumpel d) reg

13. Which of the following is the activity of initial response [ ]

a) Performing Traditional Investigation Steps b) Assembling the CSIRT

c) Developing a Response Strategy d) All the Above e) NOTA

14. _____ function responsible for verifying the values of checksum in an image file [ ]

a) Verify b) Copy c) Restore d) Backup

15. How many methoda are used to validate forensic data [ ]

a) 5 b) 3 c) 2 d) 1

16. ---------------- phase determines “who,what,when,how,where and why” analysis


corresponding to an incident [ ]

a) Traditional Investigation Steps b) Assembling the Computer Security Incident Response Team
c) Incident Declaration d) Conducting Interview

17. Which of the following is not a NT System Process [ ]

a) RPCSS b) SPOOLOSS c) SMSS d) CSRSS

18. The main task is to generate reports in which incident details are defined [ ]

a) Reporting b) Resolution d) Formulate the Response Strategy d) Investigate incident

19. ______ is a built-in tool of Windows Operating System which offers a command based
interface [ ]

a) Fport b) md5sum c) cmd.exe d) Netcat

20. ________ search can search for alphanumeric and hexadecimal values on the evidence drive

[ ]

a) Indexed Search b) Live search c) Hidden Partition d) Encryption

You might also like