Cyber Forensics MCQ
Cyber Forensics MCQ
For computer forensics, ______ is the task of collecting digital evidence from
electronic media.
If the computer has an encrypted drive, a _________ acquisition is done if the
password or passphrase is available.
________ can image the hard disk in a single file for files in multiple sections, that
can be later joined to get a reconstructed image.
____ of data involves sorting and searching through all investigation data.
____ can be software or hardware and are used to protect evidence disks by
preventing you from writing any data to the evidence disk.
____ is a Sysinternals command that shows all Registry data in real time on a
Windows computer.
__________is the process of collecting and analyzing raw network data and
systematically tracking network trafic to ascertain how an attack was carried out or
how an event occurred on a network
In ______ phase of forensic investigation the phase data and evidences related to the i
The major goal of network forensics is _____________.
_____ gets propagated through networks and technologies like SMS, Bluetooth
wireless medium, USBs and infrared to affect mobile phones.
_____ is the protection of smart-phones, phablets, tablets, and other portable tech-de
E-mail programs save messages on the ____ or leave them on the server.
E-mail administrator can disable logging or use circular logging also called ______.
The mail log file also contains information about____.
A ______ is a small text file that is deposited on a user’s computer by a web server.
The _____ records information as the e-mail travels from the sender to the receiver.
________ is a type of online chat program which offers real time text as well as
audio video and image files transmission over the internet.
______ can be used to alias a hostname to another hostname.
Attorneys can now submit documents electronically in many courts; the standard
format in federal courts is ____
_______provide additional resource material not included in the body of the report.
Typically, report writers use one of two numbering systems: decimal numbering or
____ numbering.
____ is a written list of objections to certain testimony or exhibits.
Regarding a trial, the term ____ means rejecting potential jurors.
Environmental and ____ issues are your primary concerns when you're working at
the scene to gather information about an incident or a crime.
Certain files, such as the ____ and Security log in Windows XP, might lose essential
network activity records if the power is terminated without a proper shutdown.
Recover the data Destroy the data Copy the data Load the data Option1
A windows bootup
A SCSI boot up disk disk A writer-blocker Windows XP Option3
TCP port scan Protocol analysis Web proxies Network Forensics Option4
GSMCon Department
MOBILedit!of SIMedit 3GPim Option2
Defense Computer Computer Analysis
Federal Rules of Forensics and Response Team
Evidence (FRE) Laboratory (DCFL) DIBS (CART) Option4
DDoS attacks Zombie attacks zero day attacks. One day attacks Option3
YIM YiM
Advertisement- Y!M YLM Option3
supported social
Advisory-supported instant
mediamessaging
client clientAdvertisement-supported interface
Advertisement-supported
client Option4
instant messaging cl
Facebook messenger Yahoo messenger Instagram messenger
client client Twitter messenger client client Option2