Computer Crime

Computer Crime Quiz Crafted By-

Akhil B. Parippallil

Scientific Officer

Sherlock Institute of Forensic Science India Pvt. Ltd, New Delhi


Introduction to Computer Crime 

cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

Let's look at the questions and their answer. 


Ques 1. Most of the chat and instant message conversations are stored in computer in

a) Hard disk

b) RAM

c) Wintex

d) Slack space

Answer-b) RAM

Ques 2. Which of the following program is run to examine network traffic

a) Net dump                                                      

b) TICP dump

c) Slack dump                                                        

d) Core dump

Answer- b) TICP dump

Ques 3. Data can be retrieved from a mobile device using which software

a) Q-Pass Analyzer                                                      

b) Pass- Analyzer forensic

c) Oxygen forensic suite                                                        

d) Doc- center forensic

Answer- c) Oxygen forensic suite

Ques 4. Which of the following types of images store graphic information in a grid of individual pixels?

 a) Vector

b) Raster

c) Bitmaps

d) Metafiles

Answer-b) Raster

Ques 5. The famous computer program which provides cryptographic privacy and authentication for data communication, based in public-key encryption algorithm is: 

a)  PGP                                                     

b) TGEP

c)  GPP                                                       

d) CGE

Answer- a) PGP

Ques 6. An Android device’s encrypted data can be wiped remotely using:

a) Find my phone service                                                      

b) Google Sync

c)  iCloud                                                       

d) Search My Sync

Answer- b) Google Sync

Ques 7. How many phases are present in “Enhanced Integrated Digital Investigation Process” Model invented by Baryamureeba and Tushabe in 2004?

a) 5                                                      

b) 1

c) 9                                                        

d) 7

Answer-a) 5

Ques 8. Assertion (A): Digital image technology is a powerful tool for recording the crime scene.

Reason (R): Digital imaging allows real time access to the crime scene even one is away from the scene. 

a) (A) is correct, but (R) is wrong                                                      

b) Both (A) and (R) are correct

c) (A) is incorrect, but (R) is correct                                                        

d) (A) & (R) both are wrong

Answer- b) Both (A) and (R) are correct.

Ques 9. Which of the following techniques are used during computer forensics investigation?

a) Cross-drive analysis                                                      

b) Live analysis

c) Deleted files                                                        

d) All of the above

Answer- d) All of the above

Ques 10. You are supposed to maintain three types of records. Which answer is not a record?

a) Chain of custody                                                      

b) Documentation of the crime scene

c)  Searching the crime scene                                                       

d) Document your actions

Answer- c) Searching the crime scene

Share on