You are on page 1of 4

Cyber Forensic

1. Computer forensics also known as?


A. digital forensic science
B. computer crime
C. computer forensic science
D. computer forensics investigations

2. Which method uses stochastic properties of the computer system to


investigate activities lacking digital artifacts?
A. Steganography
B. Stochastic forensics
C. Both A and B
D. None of the above

3. computer forensics also be used in civil proceedings.


A. Yes
B. No
C. Can be yes or no
D. Can not say

4. Which of the following techniques are used during computer


forensics investigations?
A. Cross-drive analysis
B. Live analysis
C. Deleted files
D. All of the above

5. CCFP stands for?


A. Cyber Certified Forensics Professional
B. Certified Cyber Forensics Professional
C. Certified Cyber Forensics Program
D. Certified Cyber Forensics Product

6. How many c's in computer forensics?


A. 1
B. 2
C. 3
D. 4
7. You are suppose to maintain three types of records. Which answer
is not a record?
A. Chain of custody
B. Documentation of the crime scene
C. Searching the crime scene
D. Document your actions

8. Physical Forensics Discipline include which of the following?


A. Bloodstain
B. Eating
C. Searching
D. Watching

9. Volatile data resides in ?


A. registries
B. cache
C. RAM
D. All of the above

10. Deleted files is a common technique used in computer forensics is


the recovery of deleted files.
A. TRUE
B. FALSE
C. Can be true or false
D. Cannot say

11. ECC stands for

(A) Elliptic Curve Cryptography

(B) Elliptic Cryptography Curve

(C) Error Correcting Code


(D) None of the above

12. HTTPS is abbreviated as _________

(A) Hypertexts Transfer Protocol Secured


(B) Secured Hyper Text Transfer Protocol

(C) Hyperlinked Text Transfer Protocol Secured


(D) Hyper Text Transfer Protocol Secure

13. Which of the following is not a strong security protocol

(A) SSL

(B) HTTPL

(C) SMTP
(D) SFTP

14. PGP is abbreviated as

(A) Pretty Good Privacy

(B) Pretty Good Policy

(C) Policy Good Privacy


(D) Pretty Good Protection

15. IP Sec provides ________ protocols for network layer

(A) 7

(B) 3

(C) 1
(D) 4

16. For RSA to work, the value of P must be less than the value of

(A) p

(B) q

(C) n

(D) r
17. An attempt to make a computer resource unavailable to its intended
users is called _________

(A) Denial-of-service attack

(B) Virus attack

(C) Worms attack


(D) Botnet process

18. WPA2 is used for security in _________

(A) Ethernet

(B) Wi-Fi

(C) Bluetooth
(D) E-mail

19. SET stands for

(A) Set Electronic Transaction

(B) Secure Electronic Transaction

(C) Simple Electronic Transaction


(D) None of the above

20. PGP makes use of which cryptographic algorithm?

(A) RSA

(B) AES

(C) DES
(D) ROBIN

You might also like