Computer Forensics MCQ Questions
Computer Forensics MCQ Questions
B. computer crime
View Answer
Ans : C
A. Steganography
B. Stochastic forensics
C. Both A and B
View Answer
Ans : B
A. Yes
B. No
C. Can be yes or no
D. Cannot say
View Answer
Ans : A
Explanation: Yes, computer forensics may also be used in civil proceedings.
4. Which of the following techniques are used during computer forensics
investigations?
A. Cross-drive analysis
B. Live analysis
C. Deleted files
View Answer
Ans : D
Explanation: All of the above are techniques are used during computer forensics
investigations.
View Answer
Ans : B
A. 1
B. 2
C. 3
D. 4
View Answer
Ans : C
Explanation: There are three c's in computer forensics : confidence. credibility. Cost
7. You are supposed to maintain three types of records. Which answer is not a
record?
A. Chain of custody
View Answer
Ans : C
Explanation: You are supposed to maintain three types of records. Searching the crime
scene is not a record
A. Bloodstain
B. Eating
C. Searching
D. Watching
View Answer
Ans : A
A. registries
B. cache
C. RAM
View Answer
Ans : D
Explanation: Volatile data resides in registries, cache, and random access memory
(RAM). The investigation of this volatile data is called live forensics.
10. Deleted files are a common technique used in computer forensics is the
recovery of deleted files.
A. TRUE
B. FALSE
D. Cannot say
View Answer
Ans : A
A. malicious hardware
B. malicious software
C. Both A and B
D. None of the above
View Answer
Ans : B
Explanation: Malware is short form of malicious software
3. Which of the following is a programs that copy themselves throughout a
computer or network?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
View Answer
Ans : C
B. Worms on existing programs and can only be activated when a user opens the
program.
View Answer
Ans : A
View Answer
Ans : C
A. ronets
B. botnets
C. botwork
D. rowork
View Answer
Ans : B
Explanation: Botnets are highly versatile and adaptable, able to maintain resilience
through redundant servers and by using infected computers to relay traffic.
8. Which malware enable administrative control, allowing an attacker to do almost
anything on an infected computer?
A. Rootkits
B. RATs
C. Botnets
D. Worms
View Answer
Ans : B
9. Which malware are often the armies behind today's distributed denial-of-
service (DDoS) attacks?
A. Botnets
B. botnetsSpyware
C. Trojans
D. Viruses
View Answer
Ans : A
Explanation: Botnets are often the armies behind today's distributed denial-of-service
(DDoS) attacks.
A. Trojans will conduct whatever action they have been programmed to carry out
B. "Trojan" alludes to the mythological story of Greek soldiers hidden inside a wooden
horse that was given to the enemy city of Troy.
C. Trojans do not replicate or reproduce through infection.
D. All of the above
View Answer
Ans : D
Explanation: All of the above statements are true.
Cyber Attacks MCQ
B. infrastructures
C. computer networks
View Answer
Ans : D
A. weapon
B. cyberweapon
C. c-weapon
D. cyberwarfare
View Answer
Ans : B
A. TRUE
B. FALSE
D. Cannot say
View Answer
Ans : A
Explanation: True, A worm does not need another file or program to copy itself; it is a
self-sustaining running program.
A. Cyberwarfare
B. Spectacularity
C. Vulnerability
View Answer
Ans : B
A. active attack
B. passive attack
C. dual attack
D. third-party attack
View Answer
Ans : A
Explanation: An active attack attempts to alter system resources or affect their operation
7. The full form of Malware is ____
A. Malfunctioned Software
B. Multipurpose Software
C. Malicious Software
D. Malfunctioning of Security
View Answer
Ans : C
Explanation: Different types of harmful software and programs that can pose threats to
a system, network or anything related to cyberspace are termed as Malware. Examples
of some common malware are Virus, Trojans, Ransomware, spyware, worms, rootkits
etc.
8. _____ is a code injecting method used for attacking the database of a system /
website.
A. HTML injection
B. SQL Injection
C. Malicious code injection
D. XML Injection
View Answer
Ans : B
Explanation: SQL (Structured Query Language Injection) is a popular attack where SQL
code is targeted or injected; for breaking the web application having SQL vulnerabilities.
This allows the attacker to run malicious code and take access to the database of that
server
9. Compromising a user’s session for exploiting the user’s data and do malicious
activities or misuse users credentials is called _____
A. Session Fixation
B. Cookie stuffing
C. Session Spying
D. Session Hijacking
View Answer
Ans : D
Explanation: Using session hijacking, which is popularly known as cookie hijacking is an
exploitation method for compromising the users session for gaining unauthorized
access to users information.
10. A cyberattack may steal, alter, or destroy a specified target by hacking into a
susceptible system
A. Yes
B. No
C. Can be yes or no
D. Cannot say
View Answer
Ans : A
A. people
B. processes
C. technologies
View Answer
Ans : D
A. vulnerability reduction
B. incident response
C. recovery policies
D. All of the above
View Answer
Ans : D
C. Both A and B
View Answer
Ans : A
A. incident security
C. internet security
D. threat security
View Answer
Ans : B
A. cybersecurity as the set of principles and practices designed to protect our computing
resources
B. cybersecurity as the set of principles and practices designed to protect our online
information against threats
View Answer
Ans : D
A. 1969
B. 1970
C. 1971
D. 1972
View Answer
Ans : B
Explanation: In 1970, Robert (Bob) Thomas who was a researcher for BBN
Technologies in Cambridge, Massachusetts created the first computer worm (virus).
A. Virus
B. Thomas program
C. Creeper
D. ARPANET
View Answer
Ans : C
Explanation: He named the program Creeper, and designed it to travel between Tenex
terminals on the early ARPANET, printing the message "I'M THE CREEPER: CATCH
ME IF YOU CAN.
8. What was the name of first antivirus software?
A. ray Tomlinson
B. tinkered
C. reaper
D. repair
View Answer
Ans : C
Explanation: He named the program Reaper, the first antivirus software which would
found copies of The Creeper and delete it.
A. 1988
B. 1989
C. 1990
D. 1991
View Answer
Ans : A
Explanation: This program went through networks, invaded Unix terminals, and copied
itself. The program became the first famous network virus and named as Moris worm or
internet worm.
View Answer
Ans : D
Explanation: All of the above are goals of cybersecurity.