Cyber & Digital Forensic Quiz Crafted by-
Scientific Officer, SIFS INDIA, New Delhi
Introduction to Cyber & Digital Forensic
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about digital information. Although it is most often associated with the investigation of a wide variety of computer crimes, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.
Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted.
Let's look at the questions and their answer.
Ques 1. Theft of intellectual property or trade secrets and Industrial espionage are certain situations which can be solved by?
a) SEBI (Security and Exchange board of INDIA)
b) Computer Forensics
Answer-b) Computer Forensics
Ques 2. A set of data that describes and gives information about the author of the data or the last print time or when the file was created, accessed or modified is known as.
a) Hash value
b) Specialist Databases
Answer- d) Metadata
Ques 3. Which of the following statement are correct?
a) Active data is the information that one typically needs specialized tools to get at. An example would be information that has been deleted or partially overwritten.
b) Archival data is data that has been backed up and stored. This could consist of backup tapes, CD's, floppies, or entire hard drives to cite a few examples.
c) Latent data is the information that you and I can see. Data files, programs, and files used by the operating system. This is the easiest type of data to obtain.
d) All of the above
Answer- b) Archival data is data that has been backed up and stored. This could consist of backup tapes, CD's, floppies, or entire hard drives to cite a few examples.
Ques 4. Which of the following tool is used to recover deleted files?
d) MD5 checksum
Answer- c) Recuva
Ques 5. A list used to grant users and processes access to system resources is termed as
b) Sha-1 hash list
c) Pandora Recovery list
d) Access control list
Answer- d) Access control list
Ques 6. Which of the following statements are correct?
a) A vulnerability is a weakness in the system.
b) Risks are items that may cause harm to the system or organization.
c) Both a and b
d) Neither a nor b
Answer- c) Both a and b
Ques 7. CIA stands for
a) Central Intelligence Agency
b) Confidentiality, Integrity, Availability
c) Certified Internal Auditor
d) Community Insurance Agency
Answer- b) Confidentiality, Integrity, Availability
Ques 8. Which of the following program is run to examine network traffic
a) Net dump
b) TCP dump
c) Slack dump
d) Core dump
Answer- b) TCP dump
Ques 9. Which are the section of IT Act is applicable for cyber pornography?
a) 67, 67A, 67B
b) 68, 68A, 68 B
c) 67, 67C, 67D
d) 66, 66A, 66B
Answer- a) 67, 67A, 67B
Ques 10. Degausser is used for
a) To wipe data from USB drive.
b) To wipe data from SD card
c) To wipe data in a SATA hard disk
d) To wipe data from optical media
Answer- c) To wipe data in a SATA hard disk
Ques 11. Data can be retrieved from a mobile device by using which software
a) Q-Pass Analyzer
b) Pass- Analyzer forensic
c) Oxygen forensic suite
d) Doc- center forensic
Answer- c) Oxygen forensic suite
Ques 12. How many phases are present in “Enhanced Integrated Digital Investigation Process” Model invented by Baryamureeba and Tushabe in 2004?
Answer- a) 5
Ques 13. An Android device’s encrypted data can be wiped remotely using:
a) Find my phone service
b) Google Sync
d) Search My Sync
Answer- b) Google Sync
Ques 14.The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:
Answer- a) PGP
Ques 15. Which of the following types of images store graphic information in a grid of individual pixels?
Answer- b) Raster