Cyber & Digital Forensic

Cyber & Digital Forensic

Cyber & Digital Forensic Quiz Crafted by-

Geetam Shukla

Scientific Officer, SIFS INDIA, New Delhi


Introduction to Cyber & Digital Forensic

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about digital information. Although it is most often associated with the investigation of a wide variety of computer crimes, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail. 

Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted.


Let's look at the questions and their answer.


Ques 1. Theft of intellectual property or trade secrets and Industrial espionage are certain situations which can be solved by?

a) SEBI (Security and Exchange board of INDIA)

b) Computer Forensics

c) NCB

d) NIA

Answer-b) Computer Forensics

 

Ques 2. A set of data that describes and gives information about the author of the data or the last print time or when the file was created, accessed or modified is known as.

a) Hash value                                             

b) Specialist Databases

c) Acquisition                                                  

d) Metadata

Answer- d) Metadata

 

Ques 3. Which of the following statement are correct?

a) Active data is the information that one typically needs specialized tools to get at. An example would be information that has been deleted or partially overwritten.

b) Archival data is data that has been backed up and stored. This could consist of backup tapes, CD's, floppies, or entire hard drives to cite a few examples.

c) Latent data is the information that you and I can see. Data files, programs, and files used by the operating system. This is the easiest type of data to obtain.

d) All of the above

Answer- b) Archival data is data that has been backed up and stored. This could consist of backup tapes, CD's, floppies, or entire hard drives to cite a few examples.

 

Ques 4. Which of the following tool is used to recover deleted files?

a) Twofish                                                     

b) RSA

c) Recuva                                                       

d) MD5 checksum

Answer- c) Recuva

 

Ques 5. A list used to grant users and processes access to system resources is termed as

a) SAM                                                     

b) Sha-1 hash list

c) Pandora Recovery list                                                      

d) Access control list

Answer- d) Access control list

 

Ques 6. Which of the following statements are correct?

a) A vulnerability is a weakness in the system.

b) Risks are items that may cause harm to the system or organization.

c) Both a and b

d) Neither a nor b

Answer- c) Both a and b

 

Ques 7. CIA stands for

a) Central Intelligence Agency                                                

b) Confidentiality, Integrity, Availability

c) Certified Internal Auditor                                                 

d) Community Insurance Agency

Answer- b) Confidentiality, Integrity, Availability

 

Ques 8. Which of the following program is run to examine network traffic

a) Net dump

b) TCP dump

c) Slack dump

d) Core dump

Answer- b) TCP dump

 

Ques 9. Which are the section of IT Act is applicable for cyber pornography?

a) 67, 67A, 67B                                                     

b) 68, 68A, 68 B

c) 67, 67C, 67D                                                      

d) 66, 66A, 66B

Answer- a) 67, 67A, 67B

 

Ques 10. Degausser is used for

a) To wipe data from USB drive.                                               

b) To wipe data from SD card

c) To wipe data in a SATA hard disk

d) To wipe data from optical media

Answer- c) To wipe data in a SATA hard disk

 

Ques 11. Data can be retrieved from a mobile device by using which software

a) Q-Pass Analyzer

b) Pass- Analyzer forensic

c) Oxygen forensic suite

d) Doc- center forensic

Answer- c) Oxygen forensic suite

 

Ques 12. How many phases are present in “Enhanced Integrated Digital Investigation Process” Model invented by Baryamureeba and Tushabe in 2004?

a) 5

b) 1

c) 9

d) 7

Answer- a) 5

 

Ques 13. An Android device’s encrypted data can be wiped remotely using:

a) Find my phone service

b) Google Sync

c) iCloud

d) Search My Sync

Answer- b) Google Sync

 

Ques 14.The famous computer program which provides cryptographic privacy and authentication for data communication, based on public-key encryption algorithm is:

a) PGP

b) TGEP

c) GPP

d) CGE

Answer- a) PGP

 

Ques 15. Which of the following types of images store graphic information in a grid of individual pixels?

a) Vector

b) Raster

c) Bitmaps

d) Metafiles

Answer- b) Raster

Share on