Cyber-I Cyber Crime Investigation Quiz 1.march 2017

25 Questions

Settings
Please wait...
Cyber-I Cyber Crime Investigation Quiz 1.march 2017


Questions and Answers
  • 1. 
    • A. 

      Hacker

    • B. 

      Phisher

    • C. 

      Con artist

    • D. 

      Fraudster

  • 2. 
    What term refers to uncovering computer-stored information suitable for use as evidence in courts of law.
    • A. 

      Computer Investigation

    • B. 

      Computer Detection

    • C. 

      Computer Forensics

    • D. 

      Computer Probing

  • 3. 
    A ___________ attack occurs when hackers bombard a site with more request for service than it can possibly handle,preventing legitimate users from accessing the site.
    • A. 

      Digital Bomb

    • B. 

      Service error

    • C. 

      Denial of service

    • D. 

      Computer

  • 4. 
    Illegal interception,illegal access, data interference, and system interference are all  apart of cybercrime.
    • A. 

      True

    • B. 

      False

  • 5. 
    Continuous online sexual harrasment by a male to female,comes under which category of cyber crime.
    • A. 

      Cyber Harrasment

    • B. 

      Cyber spoofing

    • C. 

      Cyber Phising

    • D. 

      Cyber Stalking

  • 6. 
    • A. 

      True

    • B. 

      False

  • 7. 
    Smallest unit of storage on the Hard Disk is called as..
    • A. 

      Cluster

    • B. 

      Sector

    • C. 

      Track

    • D. 

      Byte

  • 8. 
    You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company.What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?
    • A. 

      Trademark Law

    • B. 

      Copyright Law

    • C. 

      Printright Law

    • D. 

      Brandmark Law

  • 9. 
    Minimum how many copies we should make of "Single source evidence hard disk" for Forensics analysis purpose..
    • A. 

      A. 1

    • B. 

      B..2

    • C. 

      C.NONE

    • D. 

      D. 3

  • 10. 
    Integrity of the original evidence can be violated in the interest of investigation of the case.
    • A. 

      True

    • B. 

      False

  • 11. 
    1 sector consists of ..bytes
    • A. 

      8

    • B. 

      1024

    • C. 

      512

    • D. 

      2048

  • 12. 
    1 cluster is equivalent to how many sectors?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 13. 
    In order to find out private IP address of your computer,which of the following command will you use?
    • A. 

      Ipconfig

    • B. 

      Tracert

    • C. 

      Ipconfig /all

    • D. 

      Ipconfig -all

  • 14. 
    In order to find out Public IP address of your computer, following website can be use?
    • A. 

      Www.whatismyip.com

    • B. 

      Www.getmyip.com

    • C. 

      Www.tellmyip.com

    • D. 

      Www.routerip.com

  • 15. 
    Webhosting means.....
    • A. 

      Creating domain name for your website

    • B. 

      Uploading your website on the internet

    • C. 

      Creating email id's for your website

    • D. 

      Making alteration in your website

  • 16. 
    Webhosting and Domain name registration are one and the same thing
    • A. 

      True

    • B. 

      False

  • 17. 
    Wayback machine is used for
    • A. 

      Take back up of database

    • B. 

      To see snapshots of a website taken previously

    • C. 

      To go Wayback in earlier time in the history

    • D. 

      To clone email box of website

  • 18. 
    Grabify can be used to find out IP address of a website.
    • A. 

      True

    • B. 

      False

  • 19. 
    Rooting of Mobile phone means..
    • A. 

      Creating root directory in mobile phone

    • B. 

      Obtaining administrative access of mobile phone

    • C. 

      Formatting the mobile

    • D. 

      Root cause of mobile

  • 20. 
    Section 65(B) is in respect of admissibility of electronic evidence is apart of
    • A. 

      Criminal procedure code

    • B. 

      Indian Penal code

    • C. 

      Indian Evidence act

    • D. 

      Information Technology Act

  • 21. 
    The power of investigations of offences under Information Technology Act are given to
    • A. 

      Station House Officer

    • B. 

      Officers of and above the rank of PSI

    • C. 

      Officers of and above the rank of Police Inspector

    • D. 

      Dy.S.P. and above.

  • 22. 
    In order to find out IP address details of a computer located in India,you will use following website...
    • A. 

      Www.apnic.net

    • B. 

      Www.arin.net

    • C. 

      Www.lacnic.net

    • D. 

      Www.ripe.net