Ccfp (Basic) Final Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ramesh
R
Ramesh
Community Contributor
Quizzes Created: 1 | Total Attempts: 49
Questions: 10 | Attempts: 49

SettingsSettingsSettings
Ccfp (Basic) Final Test - Quiz

Note:All Questions are Compulsory. Download the case image from given Link in question. You are allowed to use required tools for solving the questions. Use CCFP virtual machine and tools. 50% is Min. Passing Score Limit.


Questions and Answers
  • 1. 

    In Computer Forensics, Md5 hash value of evidence used for

    • A.

      Authorisation

    • B.

      Non-Repudiation

    • C.

      Authentication

    • D.

      Completeness

    Correct Answer
    C. Authentication
    Explanation
    The MD5 hash value of evidence is used for authentication in computer forensics. MD5 is a widely used cryptographic hash function that generates a unique fixed-size hash value for a given input. By comparing the MD5 hash value of a piece of evidence with the original hash value, investigators can verify its integrity and ensure that it has not been tampered with. This process helps in authenticating the evidence and ensuring its reliability in legal proceedings.

    Rate this question:

  • 2. 

    Which Section of Indian IT act,2008 has been Strike off by Supreme Court of India?

    • A.

      Section 67A

    • B.

      Section 65

    • C.

      Section 66B

    • D.

      Section 66A

    Correct Answer
    D. Section 66A
    Explanation
    Section 66A of the Indian IT Act, 2008 has been struck off by the Supreme Court of India. This section was controversial as it allowed the arrest of individuals for posting offensive or annoying content on the internet. The court deemed it unconstitutional as it violated the right to freedom of speech and expression. This decision was made in 2015, stating that the section was too broad and vague, leading to misuse and curbing of individual liberties.

    Rate this question:

  • 3. 

    In Asymetric cryptography which key is used for Decryption ?

    • A.

      Public Key

    • B.

      Symetric Key

    • C.

      Private Key

    • D.

      Digital Signature

    Correct Answer
    C. Private Key
    Explanation
    In asymmetric cryptography, the private key is used for decryption. This key is kept secret and is only known to the owner. It is used to decrypt data that has been encrypted using the corresponding public key. The public key, on the other hand, is used for encryption. This allows for secure communication between parties, as the private key is required to decrypt the message, ensuring that only the intended recipient can access the decrypted data.

    Rate this question:

  • 4. 

    Which of the following is not a File System ?

    • A.

      FAT32

    • B.

      EXT4

    • C.

      NAS

    • D.

      NTFS

    Correct Answer
    C. NAS
    Explanation
    NAS (Network Attached Storage) is not a file system, but rather a storage solution that allows multiple devices to access and share files over a network. FAT32, EXT4, and NTFS are all file systems commonly used in operating systems such as Windows, Linux, and macOS.

    Rate this question:

  • 5. 

    Which of following is not a Operating System?

    • A.

      IOS

    • B.

      Linux

    • C.

      Ubuntu

    • D.

      Windows10

    Correct Answer
    B. Linux
    Explanation
    Linux is a free and open-source operating system, which means it can be modified and distributed by anyone. It is not a specific operating system like iOS, Ubuntu, or Windows10, but rather a kernel that serves as the foundation for various operating systems. Therefore, Linux itself is not an operating system, but rather a component used in the development of operating systems.

    Rate this question:

  • 6. 

    Which of the following is document to keep track of evidences movement during Forensics Investigation ?

    • A.

      PANCH NAMA

    • B.

      FINAL INVESTIGATION REPORT

    • C.

      CHAIN OF CUSTODY

    • D.

      FIR

    Correct Answer
    C. CHAIN OF CUSTODY
    Explanation
    The correct answer is "CHAIN OF CUSTODY." The chain of custody is a document that is used to keep track of the movement and handling of evidence during a forensic investigation. It ensures that the evidence is properly documented, preserved, and accounted for at all times, maintaining its integrity and admissibility in court. This document includes information such as the date and time of collection, the person who collected it, any transfers or changes in possession, and any analysis or testing conducted on the evidence.

    Rate this question:

  • 7. 

    Under Section 43A of Indian IT act,2008, Who is the authority to order to pay or deny compensations ?

    • A.

      Adjudicating Officer

    • B.

      Investigation Officer

    • C.

      Forensic Laboratory Officer

    • D.

      Finance Minister's Secretary

    Correct Answer
    A. Adjudicating Officer
    Explanation
    The correct answer is Adjudicating Officer. According to Section 43A of the Indian IT Act, 2008, the Adjudicating Officer has the authority to order the payment or denial of compensations. This officer is responsible for adjudicating on matters related to data breaches, unauthorized access, or disclosure of sensitive personal information. They have the power to impose penalties and determine the amount of compensation to be paid in case of any violation of the IT Act.

    Rate this question:

  • 8. 

    Which of the following method is used for cracking protected file's password

    • A.

      DOS or DDOS attack

    • B.

      Phishing attack

    • C.

      Ransome ware attack

    • D.

      Brute force Attack

    Correct Answer
    D. Brute force Attack
    Explanation
    Brute force attack is a method used for cracking a protected file's password. In this type of attack, an attacker systematically tries all possible combinations of passwords until the correct one is found. It is a time-consuming process as it involves trying a large number of password combinations. However, if the password is weak or easily guessable, a brute force attack can be successful in gaining unauthorized access to the protected file.

    Rate this question:

  • 9. 

    New Type File System has capacity to hide data in which of following?

    • A.

      Multiple Data Stream

    • B.

      Meta Data Stream

    • C.

      Encrypted Data Stream

    • D.

      Alternate Data Stream

    Correct Answer
    D. Alternate Data Stream
    Explanation
    The New Type File System has the capacity to hide data in the Alternate Data Stream. Alternate Data Stream is a feature in the NTFS file system that allows additional data to be attached to a file without changing its size or affecting its functionality. This hidden data can be used to store information that is not visible to the user, providing a way to hide sensitive or confidential data within a file.

    Rate this question:

  • 10. 

    Please Download the demo case from https://drive.google.com/file/d/1-PznIU5_RmfkAGtVoen8-AGe7iBwi9qo/view?usp=sharing And Answers the followings:1. Md5 Hash value of Richard_Disk File is________2. Phone number of one of the terrorist handler named Chacha is ________3. Mouinuddin's Bank account No. is________4. Password of Camouflage image file is________5. Password of detail file is________ 

    Correct Answer
    0794fc8550b551bc921efe21d31b5290
    +91982315458
    45012644781TA
    BRIHAN
    Mum1
    Explanation
    The given answer provides the requested information for each question. The MD5 hash value of Richard_Disk File is "0794fc8550b551bc921efe21d31b5290". The phone number of the terrorist handler named Chacha is "+91982315458". Mouinuddin's bank account number is "45012644781TA". The password of the camouflage image file is "BRIHAN". The password of the detail file is "Mum1".

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.