Cyber Forensic
Cyber Forensic Quiz Crafted by -
Mr. Vinay Singh
Junior Forensic Assistant Chemical Examiner
Forensic Science Laboratory, Delhi
Introduction to Cyber Forensic
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.
Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted.
Let's look at the questions and their answer.
Que 1. As opposed to "http://" (without the “s”), “https://” at the beginning of a URL denote?
a) That the site has special high definition
b) That information entered into the site is encrypted
c) That the site is the newest version available
d) That the site is not accessible to certain computers
Answer - b) That information entered into the site is encrypted
Que 2. An example of a “Vishing” attack is:-
a) Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.
b) Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information.
c) Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.
d) Fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information.
Answer - d) Fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information.
Que 3. A group of computers, networked together and used by hackers to steal information is called a :-
a) Botnet
b) Rootkit
c) DDoS
d) Operating system
Answer - a) Botnet
Que 4. Virtual Private Network (VPN) minimizes this kind of cyber security risk
a) Use of insecure Wi-Fi networks
b) Key-logging
c) De-anonymization by network operators
d) Phishing attacks
Answer - a) Use of insecure Wi-Fi networks
Que 5. What can be stated as the weakest link in cyber security?
a) Weak encryption
b) Humans
c) Short passwords
d) Networking
Answer - b) Humans
Que 6. What’s the best way to secure a weak password like “monkey123”?
a) Add an uppercase, numeral and a special character, such as $
b) Don’t reuse it anywhere else
c) Enable two-factor authentication
d) Don’t share it with anyone
Answer - c) Enable two-factor authentication
Que 7. What is the best practice to maintain privacy between two parties?
a) Long and strong passwords
b) Two factor authentication
c) Encrypted cloud services
d) End-to-end encryption
Answer - d) End-to-end encryption
Que 8. Which part of your car is the most vulnerable to hacking?
a) Cruise control
b) Entertainment system
c) Wireless smart key
d) Navigation system
Answer - b) Entertainment system
Que 9. IRC stands for:
a) Internet Relay Chat
b) Internal Rely Chat
c) Information Relay Chat
d) None of These
Answer - a) Internet Relay Chat
Que 10. Stealing any digital asset or information is defined as a cyber-crime under section.
a) 65
b) 65-D
c) 67
d) 70
Answer - a) 65
Que 11. Among the following which one is a password recovery and auditing tool?
a) LC3
b) LC4
c) Network Stumbler
d) Maltego
Answer - b) LC4
Que 12. Spywares can be used to steal ____ from the attacker’s browser.
a) Browsing history
b) Company details
c) Browser details
d) All of the above
Answer - a) Browsing history
Que 13. An amateur in the field of hacking who don’t have much skills about coding or in-depth working of security and hacking tools is known as
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer - c) Script Kiddies
Que 14. It is a piece of software or a segment of command that usually take advantage of a bug to cause unintentional actions and behaviors.
a) Malware
b) Trojan
c) Worms
d) Exploit
Answer - d) Exploit
Que 15. Among the tools mentioned below which one is commonly used for Wi-Fi hacking?
a) Wireshark
b) Nessus
c) Aircrack-ng
d) Snort
Answer - c) Aircrack-ng