0% found this document useful (0 votes)
4K views14 pages

Computer Forensics MCQ Questions

The document provides a series of multiple choice questions about various topics in cybersecurity including computer forensics, malware, cyber attacks, and cyber security. Specifically, it tests knowledge about key terms and concepts in each area through short questions with multiple choice answers where the correct response is revealed along with a brief explanation. Some example questions cover topics like common computer forensic techniques, objectives of malware, definitions of terms like botnets and Trojans, types of cyber attacks, and the primary components of cybersecurity.

Uploaded by

N-nyande Robert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4K views14 pages

Computer Forensics MCQ Questions

The document provides a series of multiple choice questions about various topics in cybersecurity including computer forensics, malware, cyber attacks, and cyber security. Specifically, it tests knowledge about key terms and concepts in each area through short questions with multiple choice answers where the correct response is revealed along with a brief explanation. Some example questions cover topics like common computer forensic techniques, objectives of malware, definitions of terms like botnets and Trojans, types of cyber attacks, and the primary components of cybersecurity.

Uploaded by

N-nyande Robert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Computer Forensics MCQ Questions

1. Computer forensics also known as?

A. digital forensic science

B. computer crime

C. computer forensic science

D. computer forensics investigations

View Answer

Ans : C

Explanation: Computer forensics also known as computer forensic science

2. Which method uses stochastic properties of the computer system to


investigate activities lacking digital artifacts?

A. Steganography

B. Stochastic forensics

C. Both A and B

D. None of the above

View Answer

Ans : B

Explanation: A method which uses stochastic properties of the computer system to


investigate activities lacking digital artifacts. Its chief use is to investigate data theft.

3. Computer forensics also be used in civil proceedings.

A. Yes

B. No

C. Can be yes or no

D. Cannot say

View Answer
Ans : A
Explanation: Yes, computer forensics may also be used in civil proceedings.
4. Which of the following techniques are used during computer forensics
investigations?

A. Cross-drive analysis

B. Live analysis

C. Deleted files

D. All of the above

View Answer

Ans : D

Explanation: All of the above are techniques are used during computer forensics
investigations.

5. CCFP stands for?

A. Cyber Certified Forensics Professional

B. Certified Cyber Forensics Professional

C. Certified Cyber Forensics Program

D. Certified Cyber Forensics Product

View Answer

Ans : B

Explanation: CCFP : Certified Cyber Forensics Professional

6. How many c's in computer forensics?

A. 1

B. 2

C. 3

D. 4

View Answer

Ans : C

Explanation: There are three c's in computer forensics : confidence. credibility. Cost
7. You are supposed to maintain three types of records. Which answer is not a
record?

A. Chain of custody

B. Documentation of the crime scene

C. Searching the crime scene

D. Document your actions

View Answer

Ans : C

Explanation: You are supposed to maintain three types of records. Searching the crime
scene is not a record

8. Physical Forensics Discipline include which of the following?

A. Bloodstain

B. Eating

C. Searching

D. Watching

View Answer

Ans : A

Explanation: Physical Forensics Discipline includes Bloodstain.

9. Volatile data resides in?

A. registries

B. cache

C. RAM

D. All of the above

View Answer
Ans : D
Explanation: Volatile data resides in registries, cache, and random access memory
(RAM). The investigation of this volatile data is called live forensics.
10. Deleted files are a common technique used in computer forensics is the
recovery of deleted files.

A. TRUE

B. FALSE

C. Can be true or false

D. Cannot say

View Answer

Ans : A

Explanation: True, Deleted files is a common technique used in computer forensics is


the recovery of deleted files.

Malware MCQ Questions

1. Which of the following are objectives of Malware?

A. Provide remote control for an attacker to use an infected machine.

B. Investigate the infected user’s local network.

C. Steal sensitive data.

D. All of the above


View Answer
Ans : D
Explanation: Though varied in type and capabilities, malware usually has one of the
following objectives: Provide remote control for an attacker to use an infected machine,
Send spam from the infected machine to unsuspecting targets, investigate the infected
user’s local network and Steal sensitive data.

2. Malware is short form of ?

A. malicious hardware

B. malicious software

C. Both A and B
D. None of the above
View Answer
Ans : B
Explanation: Malware is short form of malicious software
3. Which of the following is a programs that copy themselves throughout a
computer or network?

A. Worms

B. Trojans

C. Viruses

D. Rootkits

View Answer

Ans : C

Explanation: Viruses: Programs that copy themselves throughout a computer or


network.

4. Which is true about Worms?

A. Self-replicating viruses that exploit security vulnerabilities to automatically spread


themselves across computers and networks.

B. Worms on existing programs and can only be activated when a user opens the
program.

C. Worms vary and hide themselves in the operating system.

D. All of the above

View Answer

Ans : A

Explanation: Worms: Self-replicating viruses that exploit security vulnerabilities to


automatically spread themselves across computers and networks.
5. Which of the following malware do not replicate or reproduce through
infection?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
View Answer
Ans : B
Explanation: Trojans do not replicate or reproduce through infection. “Trojan” alludes to
the mythological story of Greek soldiers hidden inside a wooden horse that was given to
the enemy city of Troy.
6. RATs stand for?

A. Rootkits Administration Tools

B. Remote Access Tools

C. Remote Administration Tools

D. Remote Attack Tools

View Answer

Ans : C

Explanation: Remote Administration Tools (RATs) : Software that allows a remote


operator to control a system.

7. Which malware has Short for "robot network"?

A. ronets

B. botnets

C. botwork

D. rowork

View Answer

Ans : B

Explanation: Botnets are highly versatile and adaptable, able to maintain resilience
through redundant servers and by using infected computers to relay traffic.
8. Which malware enable administrative control, allowing an attacker to do almost
anything on an infected computer?

A. Rootkits

B. RATs

C. Botnets

D. Worms

View Answer

Ans : B

Explanation: RATs enable administrative control, allowing an attacker to do almost


anything on an infected computer.

9. Which malware are often the armies behind today's distributed denial-of-
service (DDoS) attacks?

A. Botnets

B. botnetsSpyware

C. Trojans

D. Viruses

View Answer

Ans : A

Explanation: Botnets are often the armies behind today's distributed denial-of-service
(DDoS) attacks.

10. What is true regarding Trojans?

A. Trojans will conduct whatever action they have been programmed to carry out
B. "Trojan" alludes to the mythological story of Greek soldiers hidden inside a wooden
horse that was given to the enemy city of Troy.
C. Trojans do not replicate or reproduce through infection.
D. All of the above
View Answer
Ans : D
Explanation: All of the above statements are true.
Cyber Attacks MCQ

1. A cyberattack is any offensive maneuver that targets?

A. computer information systems

B. infrastructures

C. computer networks

D. All of the above

View Answer

Ans : D

Explanation: A cyberattack is any offensive maneuver that targets computer information


systems, infrastructures, computer networks, or personal computer devices.

2. A product that facilitates cyberattack is sometimes called a ?

A. weapon

B. cyberweapon

C. c-weapon

D. cyberwarfare

View Answer

Ans : B

Explanation: A product that facilitates a cyberattack is sometimes called a


cyberweapon.

3. Which of the following is designed to perform legitimate tasks but it also


performs unknown and unwanted activity?
A. Viruses
B. Worms
C. Trojan horses
D. Semantic attack
View Answer
Ans : C
Explanation: A Trojan horse is designed to perform legitimate tasks but it also performs
unknown and unwanted activity.
4. A worm does not need another file or program to copy itself; it is a self-
sustaining running program.

A. TRUE

B. FALSE

C. Can be true or false

D. Cannot say

View Answer

Ans : A

Explanation: True, A worm does not need another file or program to copy itself; it is a
self-sustaining running program.

5. Which factor is a measure of the actual damage achieved by an attack?

A. Cyberwarfare

B. Spectacularity

C. Vulnerability

D. All of the above

View Answer

Ans : B

Explanation: The spectacularity factor is a measure of the actual damage achieved by


an attack, meaning that the attack creates direct losses (usually loss of availability or
loss of income) and garners negative publicity.

6. Which attack attempts to alter system resources or affect their operation?

A. active attack

B. passive attack
C. dual attack
D. third-party attack
View Answer
Ans : A
Explanation: An active attack attempts to alter system resources or affect their operation
7. The full form of Malware is ____

A. Malfunctioned Software

B. Multipurpose Software

C. Malicious Software

D. Malfunctioning of Security

View Answer

Ans : C

Explanation: Different types of harmful software and programs that can pose threats to
a system, network or anything related to cyberspace are termed as Malware. Examples
of some common malware are Virus, Trojans, Ransomware, spyware, worms, rootkits
etc.

8. _____ is a code injecting method used for attacking the database of a system /
website.
A. HTML injection
B. SQL Injection
C. Malicious code injection
D. XML Injection
View Answer
Ans : B
Explanation: SQL (Structured Query Language Injection) is a popular attack where SQL
code is targeted or injected; for breaking the web application having SQL vulnerabilities.
This allows the attacker to run malicious code and take access to the database of that
server

9. Compromising a user’s session for exploiting the user’s data and do malicious
activities or misuse users credentials is called _____

A. Session Fixation

B. Cookie stuffing

C. Session Spying

D. Session Hijacking

View Answer

Ans : D
Explanation: Using session hijacking, which is popularly known as cookie hijacking is an
exploitation method for compromising the users session for gaining unauthorized
access to users information.

10. A cyberattack may steal, alter, or destroy a specified target by hacking into a
susceptible system

A. Yes

B. No

C. Can be yes or no

D. Cannot say

View Answer

Ans : A

Explanation: Yes, A cyberattack may steal, alter, or destroy a specified target by


hacking into a susceptible system

Cyber Security MCQ

1. Cybersecurity is primarily about ?

A. people

B. processes

C. technologies

D. All of the above

View Answer

Ans : D

Explanation: Cybersecurity is primarily about people, processes, and technologies


working together to encompass the full range of threat reduction.

2. Cybersecurity encompass the full range of?

A. vulnerability reduction

B. incident response

C. recovery policies
D. All of the above

View Answer

Ans : D

Explanation: Cybersecurity encompass the full range of threat reduction, vulnerability


reduction, deterrence, international engagement, incident response, resiliency, and
recovery policies.

3. Cybersecurity is the protection of ?

A. Internet connected systems

B. Non-Internet connected systems

C. Both A and B

D. None of the above

View Answer

Ans : A

Explanation: Cybersecurity is the protection of Internet-connected systems, including


hardware, software, and data from cyber attacks

4. Cybersecurity also be referred to as?

A. incident security

B. information technology security

C. internet security

D. threat security

View Answer

Ans : B

Explanation: It may also be referred to as information technology security.

5. What is true about cybersecurity?

A. cybersecurity as the set of principles and practices designed to protect our computing
resources
B. cybersecurity as the set of principles and practices designed to protect our online
information against threats

C. cybersecurity is a critical function and needed insurance of many businesses.

D. All of the above

View Answer

Ans : D

Explanation: All of the above statement are true.

6. In which year, the first computer worm (virus) created?

A. 1969

B. 1970

C. 1971

D. 1972

View Answer

Ans : B

Explanation: In 1970, Robert (Bob) Thomas who was a researcher for BBN
Technologies in Cambridge, Massachusetts created the first computer worm (virus).

7. What was the name of program Robert Thomas created?

A. Virus

B. Thomas program

C. Creeper

D. ARPANET

View Answer

Ans : C

Explanation: He named the program Creeper, and designed it to travel between Tenex
terminals on the early ARPANET, printing the message "I'M THE CREEPER: CATCH
ME IF YOU CAN.
8. What was the name of first antivirus software?

A. ray Tomlinson

B. tinkered

C. reaper

D. repair

View Answer

Ans : C

Explanation: He named the program Reaper, the first antivirus software which would
found copies of The Creeper and delete it.

9. In which year, Moris worm virus named?

A. 1988

B. 1989

C. 1990

D. 1991

View Answer

Ans : A

Explanation: This program went through networks, invaded Unix terminals, and copied
itself. The program became the first famous network virus and named as Moris worm or
internet worm.

10. Which of the following is one of the Cyber Security Goals?

A. Protect the confidentiality of data.

B. Preserve the integrity of data

C. Promote the availability of data for authorized users

D. All of the above

View Answer
Ans : D
Explanation: All of the above are goals of cybersecurity.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy