Computer Forensics MCQ Questions
1. Computer forensics also known as?
A. digital forensic science
B. computer crime
C. computer forensic science
D. computer forensics investigations
View Answer
Ans : C
Explanation: Computer forensics also known as computer forensic science
2. Which method uses stochastic properties of the computer system to
investigate activities lacking digital artifacts?
A. Steganography
B. Stochastic forensics
C. Both A and B
D. None of the above
View Answer
Ans : B
Explanation: A method which uses stochastic properties of the computer system to
investigate activities lacking digital artifacts. Its chief use is to investigate data theft.
3. Computer forensics also be used in civil proceedings.
A. Yes
B. No
C. Can be yes or no
D. Cannot say
View Answer
Ans : A
Explanation: Yes, computer forensics may also be used in civil proceedings.
4. Which of the following techniques are used during computer forensics
investigations?
A. Cross-drive analysis
B. Live analysis
C. Deleted files
D. All of the above
View Answer
Ans : D
Explanation: All of the above are techniques are used during computer forensics
investigations.
5. CCFP stands for?
A. Cyber Certified Forensics Professional
B. Certified Cyber Forensics Professional
C. Certified Cyber Forensics Program
D. Certified Cyber Forensics Product
View Answer
Ans : B
Explanation: CCFP : Certified Cyber Forensics Professional
6. How many c's in computer forensics?
A. 1
B. 2
C. 3
D. 4
View Answer
Ans : C
Explanation: There are three c's in computer forensics : confidence. credibility. Cost
7. You are supposed to maintain three types of records. Which answer is not a
record?
A. Chain of custody
B. Documentation of the crime scene
C. Searching the crime scene
D. Document your actions
View Answer
Ans : C
Explanation: You are supposed to maintain three types of records. Searching the crime
scene is not a record
8. Physical Forensics Discipline include which of the following?
A. Bloodstain
B. Eating
C. Searching
D. Watching
View Answer
Ans : A
Explanation: Physical Forensics Discipline includes Bloodstain.
9. Volatile data resides in?
A. registries
B. cache
C. RAM
D. All of the above
View Answer
Ans : D
Explanation: Volatile data resides in registries, cache, and random access memory
(RAM). The investigation of this volatile data is called live forensics.
10. Deleted files are a common technique used in computer forensics is the
recovery of deleted files.
A. TRUE
B. FALSE
C. Can be true or false
D. Cannot say
View Answer
Ans : A
Explanation: True, Deleted files is a common technique used in computer forensics is
the recovery of deleted files.
Malware MCQ Questions
1. Which of the following are objectives of Malware?
A. Provide remote control for an attacker to use an infected machine.
B. Investigate the infected user’s local network.
C. Steal sensitive data.
D. All of the above
View Answer
Ans : D
Explanation: Though varied in type and capabilities, malware usually has one of the
following objectives: Provide remote control for an attacker to use an infected machine,
Send spam from the infected machine to unsuspecting targets, investigate the infected
user’s local network and Steal sensitive data.
2. Malware is short form of ?
A. malicious hardware
B. malicious software
C. Both A and B
D. None of the above
View Answer
Ans : B
Explanation: Malware is short form of malicious software
3. Which of the following is a programs that copy themselves throughout a
computer or network?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
View Answer
Ans : C
Explanation: Viruses: Programs that copy themselves throughout a computer or
network.
4. Which is true about Worms?
A. Self-replicating viruses that exploit security vulnerabilities to automatically spread
themselves across computers and networks.
B. Worms on existing programs and can only be activated when a user opens the
program.
C. Worms vary and hide themselves in the operating system.
D. All of the above
View Answer
Ans : A
Explanation: Worms: Self-replicating viruses that exploit security vulnerabilities to
automatically spread themselves across computers and networks.
5. Which of the following malware do not replicate or reproduce through
infection?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
View Answer
Ans : B
Explanation: Trojans do not replicate or reproduce through infection. “Trojan” alludes to
the mythological story of Greek soldiers hidden inside a wooden horse that was given to
the enemy city of Troy.
6. RATs stand for?
A. Rootkits Administration Tools
B. Remote Access Tools
C. Remote Administration Tools
D. Remote Attack Tools
View Answer
Ans : C
Explanation: Remote Administration Tools (RATs) : Software that allows a remote
operator to control a system.
7. Which malware has Short for "robot network"?
A. ronets
B. botnets
C. botwork
D. rowork
View Answer
Ans : B
Explanation: Botnets are highly versatile and adaptable, able to maintain resilience
through redundant servers and by using infected computers to relay traffic.
8. Which malware enable administrative control, allowing an attacker to do almost
anything on an infected computer?
A. Rootkits
B. RATs
C. Botnets
D. Worms
View Answer
Ans : B
Explanation: RATs enable administrative control, allowing an attacker to do almost
anything on an infected computer.
9. Which malware are often the armies behind today's distributed denial-of-
service (DDoS) attacks?
A. Botnets
B. botnetsSpyware
C. Trojans
D. Viruses
View Answer
Ans : A
Explanation: Botnets are often the armies behind today's distributed denial-of-service
(DDoS) attacks.
10. What is true regarding Trojans?
A. Trojans will conduct whatever action they have been programmed to carry out
B. "Trojan" alludes to the mythological story of Greek soldiers hidden inside a wooden
horse that was given to the enemy city of Troy.
C. Trojans do not replicate or reproduce through infection.
D. All of the above
View Answer
Ans : D
Explanation: All of the above statements are true.
Cyber Attacks MCQ
1. A cyberattack is any offensive maneuver that targets?
A. computer information systems
B. infrastructures
C. computer networks
D. All of the above
View Answer
Ans : D
Explanation: A cyberattack is any offensive maneuver that targets computer information
systems, infrastructures, computer networks, or personal computer devices.
2. A product that facilitates cyberattack is sometimes called a ?
A. weapon
B. cyberweapon
C. c-weapon
D. cyberwarfare
View Answer
Ans : B
Explanation: A product that facilitates a cyberattack is sometimes called a
cyberweapon.
3. Which of the following is designed to perform legitimate tasks but it also
performs unknown and unwanted activity?
A. Viruses
B. Worms
C. Trojan horses
D. Semantic attack
View Answer
Ans : C
Explanation: A Trojan horse is designed to perform legitimate tasks but it also performs
unknown and unwanted activity.
4. A worm does not need another file or program to copy itself; it is a self-
sustaining running program.
A. TRUE
B. FALSE
C. Can be true or false
D. Cannot say
View Answer
Ans : A
Explanation: True, A worm does not need another file or program to copy itself; it is a
self-sustaining running program.
5. Which factor is a measure of the actual damage achieved by an attack?
A. Cyberwarfare
B. Spectacularity
C. Vulnerability
D. All of the above
View Answer
Ans : B
Explanation: The spectacularity factor is a measure of the actual damage achieved by
an attack, meaning that the attack creates direct losses (usually loss of availability or
loss of income) and garners negative publicity.
6. Which attack attempts to alter system resources or affect their operation?
A. active attack
B. passive attack
C. dual attack
D. third-party attack
View Answer
Ans : A
Explanation: An active attack attempts to alter system resources or affect their operation
7. The full form of Malware is ____
A. Malfunctioned Software
B. Multipurpose Software
C. Malicious Software
D. Malfunctioning of Security
View Answer
Ans : C
Explanation: Different types of harmful software and programs that can pose threats to
a system, network or anything related to cyberspace are termed as Malware. Examples
of some common malware are Virus, Trojans, Ransomware, spyware, worms, rootkits
etc.
8. _____ is a code injecting method used for attacking the database of a system /
website.
A. HTML injection
B. SQL Injection
C. Malicious code injection
D. XML Injection
View Answer
Ans : B
Explanation: SQL (Structured Query Language Injection) is a popular attack where SQL
code is targeted or injected; for breaking the web application having SQL vulnerabilities.
This allows the attacker to run malicious code and take access to the database of that
server
9. Compromising a user’s session for exploiting the user’s data and do malicious
activities or misuse users credentials is called _____
A. Session Fixation
B. Cookie stuffing
C. Session Spying
D. Session Hijacking
View Answer
Ans : D
Explanation: Using session hijacking, which is popularly known as cookie hijacking is an
exploitation method for compromising the users session for gaining unauthorized
access to users information.
10. A cyberattack may steal, alter, or destroy a specified target by hacking into a
susceptible system
A. Yes
B. No
C. Can be yes or no
D. Cannot say
View Answer
Ans : A
Explanation: Yes, A cyberattack may steal, alter, or destroy a specified target by
hacking into a susceptible system
Cyber Security MCQ
1. Cybersecurity is primarily about ?
A. people
B. processes
C. technologies
D. All of the above
View Answer
Ans : D
Explanation: Cybersecurity is primarily about people, processes, and technologies
working together to encompass the full range of threat reduction.
2. Cybersecurity encompass the full range of?
A. vulnerability reduction
B. incident response
C. recovery policies
D. All of the above
View Answer
Ans : D
Explanation: Cybersecurity encompass the full range of threat reduction, vulnerability
reduction, deterrence, international engagement, incident response, resiliency, and
recovery policies.
3. Cybersecurity is the protection of ?
A. Internet connected systems
B. Non-Internet connected systems
C. Both A and B
D. None of the above
View Answer
Ans : A
Explanation: Cybersecurity is the protection of Internet-connected systems, including
hardware, software, and data from cyber attacks
4. Cybersecurity also be referred to as?
A. incident security
B. information technology security
C. internet security
D. threat security
View Answer
Ans : B
Explanation: It may also be referred to as information technology security.
5. What is true about cybersecurity?
A. cybersecurity as the set of principles and practices designed to protect our computing
resources
B. cybersecurity as the set of principles and practices designed to protect our online
information against threats
C. cybersecurity is a critical function and needed insurance of many businesses.
D. All of the above
View Answer
Ans : D
Explanation: All of the above statement are true.
6. In which year, the first computer worm (virus) created?
A. 1969
B. 1970
C. 1971
D. 1972
View Answer
Ans : B
Explanation: In 1970, Robert (Bob) Thomas who was a researcher for BBN
Technologies in Cambridge, Massachusetts created the first computer worm (virus).
7. What was the name of program Robert Thomas created?
A. Virus
B. Thomas program
C. Creeper
D. ARPANET
View Answer
Ans : C
Explanation: He named the program Creeper, and designed it to travel between Tenex
terminals on the early ARPANET, printing the message "I'M THE CREEPER: CATCH
ME IF YOU CAN.
8. What was the name of first antivirus software?
A. ray Tomlinson
B. tinkered
C. reaper
D. repair
View Answer
Ans : C
Explanation: He named the program Reaper, the first antivirus software which would
found copies of The Creeper and delete it.
9. In which year, Moris worm virus named?
A. 1988
B. 1989
C. 1990
D. 1991
View Answer
Ans : A
Explanation: This program went through networks, invaded Unix terminals, and copied
itself. The program became the first famous network virus and named as Moris worm or
internet worm.
10. Which of the following is one of the Cyber Security Goals?
A. Protect the confidentiality of data.
B. Preserve the integrity of data
C. Promote the availability of data for authorized users
D. All of the above
View Answer
Ans : D
Explanation: All of the above are goals of cybersecurity.