1.
__________ is the act of obtaining unauthorized access to a network by manipulating authorized users in to revealing their passwords and access information
Correct Answer
A. Social Engineering
2.
______________ refers to the pre-attack phase when the attacker scans the network with specific information gathered during reconnaissance.
Correct Answer
D. Scanning
3.
The objective of __________ is to authenticate based on username, password, smart cards, tokens or PINs.
a. user authentication
Correct Answer
B. User authentication
4.
____________should begin with the identification of audience and objective of the particular report
Correct Answer
D. Report writing
5.
____________ is a proxy server that doesn’t have special caching abilities of a caching HTTP proxy server.
Correct Answer
B. SOCKS
6.
The __________________ characterizes the organization’s idea of an apt computer, usage of the network and measures to deal with the network incidents.
Correct Answer
D. Network policy
7.
_________ is a program that handles external servers on behalf of internal servers.
Correct Answer
B. Proxy
8.
The authentication process is done by exchanging a set of messages between a pair of entities, usually called as an _________________ protocol.
Correct Answer
A. Authentication
9.
______ is an online utility that helps an investigator/user to search for copyright records
Correct Answer
C. LOCIS
10.
Network forensics poses greater challenges as:
Correct Answer
C. Evidence is found across multiple systems and is volatile
11.
_______ contain events generated by system component and deals with driver failures and hardware issues.
Correct Answer
B. System Log
12.
___________is a file system designed specifically for the OS/2 operating system to improve upon the limitations of the FAT file system.
Correct Answer
A. HPFS
13.
A _____________ is an application program that is used to identify an unknown or forgotten password to a computer or network resource.
Correct Answer
D. Password cracker
14.
____________ defines the way in which messages are transmitted over the Internet.
Correct Answer
C. HTTP
15.
_______________ refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of attack prior to launching an attack.
Correct Answer
C. Reconnaissance
16.
________ is a procedure by which a router changes data in packets to modify the network addresses
Correct Answer
C. NAT
17.
Common digital signature algorithms that are used include ______
Correct Answer
D. RSA and DSA
18.
The basic function of ___________is transmission of data over the communication channel.
Correct Answer
D. Physical layer
19.
A ____________ indicates successful access gained by the user and __________ stands for the unsuccessful attempt made to gain the access.
Correct Answer
B. Success event, failed event
20.
____________ of the e-mail message has key role to play in e-mail tracing as it contains the unique IP a. a. address of the server that sent the message.
Correct Answer
C. Header
21.
Computer crimes pose certain challenges to solving the crime. These include:
Correct Answer
B. Speed at which crime is committed, anonymity, volatility of evidence
22.
___________ is an incident process in which a person or software program acting on behalf of any other person takes some action and then denies them to do it later.
Correct Answer
B. Repudiation
23.
______ is a standard for encrypting and digitally signing electronic mail that contains attachments and for offering secure data transmissions.
Correct Answer
C. Secure MIME
24.
____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities
Correct Answer
C. Black Hats
25.
In a ____________________, the IDS examine activity on each individual computer or host.
Correct Answer
D. Host based
26.
In a ____________________, the IDS examine activity on each individual computer or host.
Correct Answer
A. Denial of Service
27.
A ___________is any circumstance or event that has the potential to cause harm to a system or network
a. Vulnerability
Correct Answer
A. Threat
28.
The BIOS program is usually in the _______memory location
Correct Answer
A. FFFF0h
29.
An ______________is a person who can investigate on a particular case, evaluate all findings, and educate the jury about his findings.
Correct Answer
D. Expert witness
30.
An ________can be an event or set of events that threatens the security in computing systems and networks in any organization
Correct Answer
D. Incident
31.
__________ is a system integrity check tool.
Correct Answer
D. Tripwire
32.
________________ can be said to be a security violation that results from a threat action.
Correct Answer
D. Exposure
33.
An ____________ gathers and analyzes information from various areas within a computer, or network, in order to identify possible violations of security policy, including unauthorized access, as well as misuse.
Correct Answer
D. Intrusion detection system
34.
The computer forensic investigator must maintain ___________whenever a case is being investigated.
Correct Answer
A. Objectivity
35.
_______ is a malicious program that replicates it self until it fills all of the storage space on a drive or a. network
Correct Answer
A. Worm
36.
Investigators must document digital evidence by creating an _________________
Correct Answer
D. Evidence form
37.
Any ____________involves three phases – preparation, conduct and conclusion.
a. Security testing
Correct Answer
A. Security testing
38.
Running a program that remotely finds ports opened and closed on remote systems, represents one of the most common types of __________attacks.
Correct Answer
B. Reconnaissance
39.
_______________firewalls concentrates on individual packets and analyzes their header information and which way they are directed to
Correct Answer
B. Packet filter based
40.
__________ is the technique attackers use to gain access to a network, sending messages to a computer with an IP address indicating that the message is coming from a trusted host.
Correct Answer
D. IP Spoofing
41.
E-mail crime can be categorized in two ways: one committed by sending mails and other _______
Correct Answer
A. Supported by e-mails
42.
__________ is the art and science of hiding information by embedding messages within other, seemingly harmless messages.
Correct Answer
D. Steganography
43.
The ___________ is a unique identifier that is used to establish, and maintain, wireless connectivity and acts as a single shared password between access points and clients.
Correct Answer
D. SSID
44.
IPSec aids two encryption modes:
Correct Answer
B. Transport and Tunnel
45.
The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed over several machines
Correct Answer
A. Distributed denial of service
46.
Proxy based firewalls concentrate on the _____________ rather than just the packets
Correct Answer
D. Application Layer
47.
_____________ monitors system files to determine whether an intruder has changed the system files.
Correct Answer
C. System Integrity Verifiers
48.
Cyber Crime is divided into the two T’s
Correct Answer
D. Tools and Target of the crime
49.
A ___________ is a private network of computers that uses the public Internet to connect some nodes.
Correct Answer
A. VPN
50.
__________ is a means for ensuring private, secure communication between hosts over an insecure medium using tunneling.
Correct Answer
C. VPN