Cyber Forensic

Cyber Forensic Quiz Crafted by -

Mr. Vinay Singh

Junior Forensic Assistant Chemical Examiner

Forensic Science Laboratory, Delhi


Introduction to Cyber Forensic 

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail. 

Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted.


Let's look at the questions and their answer.

Que 1. As opposed to "http://" (without the “s”), “https://” at the beginning of a URL denote?

a) That the site has special high definition

b) That information entered into the site is encrypted

c) That the site is the newest version available

d) That the site is not accessible to certain computers

Answer - b) That information entered into the site is encrypted 


Que 2. An example of a “Vishing” attack is:-

a) Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

b) Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information.

c) Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.

d) Fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information.

Answer - d) Fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information. 


Que 3. A group of computers, networked together and used by hackers to steal information is called a :-

a) Botnet

b) Rootkit

c) DDoS

d) Operating system

Answer - a) Botnet 


Que 4. Virtual Private Network (VPN) minimizes this kind of cyber security risk

a) Use of insecure Wi-Fi networks

b) Key-logging

c) De-anonymization by network operators

d) Phishing attacks

Answer - a) Use of insecure Wi-Fi networks 


Que 5. What can be stated as the weakest link in cyber security?

a) Weak encryption

b) Humans

c) Short passwords

d) Networking

Answer - b) Humans


Que 6. What’s the best way to secure a weak password like “monkey123”?

a) Add an uppercase, numeral and a special character, such as $

b) Don’t reuse it anywhere else

c) Enable two-factor authentication

d) Don’t share it with anyone

Answer - c) Enable two-factor authentication 


Que 7. What is the best practice to maintain privacy between two parties? 

a) Long and strong passwords

b) Two factor authentication 

c) Encrypted cloud services 

d) End-to-end encryption

Answer - d) End-to-end encryption 


Que 8. Which part of your car is the most vulnerable to hacking?

a) Cruise control

b) Entertainment system 

c) Wireless smart key

d) Navigation system

Answer - b) Entertainment system 


Que 9. IRC stands for:

a) Internet Relay Chat

b) Internal Rely Chat

c) Information Relay Chat

d) None of These

Answer - a) Internet Relay Chat 


Que 10. Stealing any digital asset or information is defined as a cyber-crime under section.

a) 65

b) 65-D

c) 67

d) 70

Answer - a) 65 


Que 11. Among the following which one is a password recovery and auditing tool?

a) LC3

b) LC4

c) Network Stumbler

d) Maltego

Answer - b) LC4 


Que 12. Spywares can be used to steal ____ from the attacker’s browser.

a) Browsing history

b) Company details

c) Browser details

d) All of the above

Answer - a) Browsing history 


Que 13. An amateur in the field of hacking who don’t have much skills about coding or in-depth working of security and hacking tools is known as

a) Sponsored Hackers

b) Hactivists

c) Script Kiddies

d) Whistle Blowers

Answer - c) Script Kiddies 


Que 14. It is a piece of software or a segment of command that usually take advantage of a bug to cause unintentional actions and behaviors.

a) Malware

b) Trojan

c) Worms

d) Exploit

Answer - d) Exploit 


Que 15. Among the tools mentioned below which one is commonly used for Wi-Fi hacking?

a) Wireshark

b) Nessus

c) Aircrack-ng

d) Snort

Answer - c) Aircrack-ng


Share on