Cyber-I Cyber Crime Investigation Quiz 1.March 2017

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cyberi_MPA
C
Cyberi_MPA
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,434
| Attempts: 2,434 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. What Term usually describes a person who gains access to computer system illegally?

Explanation

The term "hacker" usually describes a person who gains unauthorized access to a computer system. Hackers use their technical skills to exploit vulnerabilities in computer systems and networks, often with malicious intent. They may steal sensitive information, disrupt services, or cause other types of harm. While the other options listed (phisher, con artist, fraudster) may also engage in illegal activities, "hacker" specifically refers to someone who gains unauthorized access to computer systems.

Submit
Please wait...
About This Quiz
Cyber-I Cyber Crime Investigation Quiz 1.March 2017 - Quiz

Cyber-i Cyber Crime Investigation Quiz 1. March 2017 assesses knowledge on cyber crimes, including hacking, denial of service attacks, and cyber stalking. It covers key skills in identifying illegal online activities and computer forensics, crucial for professionals in IT security and law enforcement.

Personalize your quiz and earn a certificate with your name on it!
2. Illegal interception,illegal access, data interference, and system interference are all  apart of cybercrime.

Explanation

The given statement is true because illegal interception, illegal access, data interference, and system interference are all types of cybercrime. Cybercrime refers to any criminal activity that is carried out using computers or the internet, and these actions are specifically categorized as cybercrimes. Illegal interception refers to the unauthorized interception of data or communications, illegal access refers to unauthorized access to computer systems or networks, data interference refers to unauthorized modification or deletion of data, and system interference refers to unauthorized disruption or manipulation of computer systems. Therefore, all these actions fall under the umbrella of cybercrime.

Submit
3. 192.169.23.56 can be used to access Internet.

Explanation

The given statement is true because 192.169.23.56 is an IP address, and IP addresses are used to access the Internet. IP addresses are numerical labels assigned to devices connected to a computer network, and they serve as the address for sending and receiving data over the Internet. Therefore, 192.169.23.56 can be used to access the Internet.

Submit
4. What term refers to uncovering computer-stored information suitable for use as evidence in courts of law.

Explanation

Computer forensics refers to the process of uncovering computer-stored information that can be used as evidence in courts of law. It involves the collection, analysis, and preservation of digital evidence to investigate and prevent computer-related crimes. This field combines elements of computer science and law enforcement to identify, recover, and analyze data from digital devices such as computers, smartphones, and storage media. Computer forensics plays a crucial role in modern legal proceedings, helping to uncover and present digital evidence in a forensically sound manner.

Submit
5. Webhosting and Domain name registration are one and the same thing

Explanation

Webhosting and domain name registration are not the same thing. Webhosting refers to the service of storing and maintaining website files on a server, allowing the website to be accessible on the internet. On the other hand, domain name registration is the process of acquiring a unique website address (URL) for a specific period of time. While they are related and often offered together by web hosting companies, they are distinct services with different functions.

Submit
6. Rooting of Mobile phone means..

Explanation

Rooting of a mobile phone refers to the process of obtaining administrative access or privileges on the device. This allows the user to have complete control over the operating system and make changes that are normally restricted. Rooting enables users to install custom ROMs, remove pre-installed apps, and perform various other modifications that are not possible on a non-rooted device. It essentially grants the user full control and access to the device's system files and settings.

Submit
7. 1 cluster is equivalent to how many sectors?

Explanation

In computer storage, a cluster is a unit of allocation on a disk. It is the smallest addressable unit of disk space that can be allocated to hold a file. Sectors, on the other hand, are the smallest units of storage on a disk. A sector typically contains 512 bytes of data. Since a cluster is made up of multiple sectors, the correct answer is 4.

Submit
8. In order to find out Public IP address of your computer, following website can be use?

Explanation

www.whatismyip.com is the correct website to find out the Public IP address of your computer. This website provides a simple and straightforward method to display your Public IP address. By accessing this website, it will automatically detect and display your Public IP address on the webpage, allowing you to easily identify it.

Submit
9. A ___________ attack occurs when hackers bombard a site with more request for service than it can possibly handle,preventing legitimate users from accessing the site.

Explanation

A denial of service attack occurs when hackers overwhelm a website with an excessive number of service requests, causing it to become unavailable to legitimate users. This is typically achieved by using multiple compromised devices to flood the site's server with traffic, leading to a service overload. The intention behind this attack is to disrupt the normal functioning of the targeted website and prevent users from accessing its services.

Submit
10. Minimum how many copies we should make of "Single source evidence hard disk" for Forensics analysis purpose..

Explanation

To ensure the integrity and preservation of the original evidence, it is recommended to make at least two copies of the "Single source evidence hard disk" for forensic analysis purposes. Having multiple copies allows for redundancy and ensures that in case of any issues or errors during the analysis process, there are backup copies available. This also allows different forensic investigators to work on separate copies simultaneously, reducing the risk of accidental alteration or damage to the original evidence.

Submit
11. Integrity of the original evidence can be violated in the interest of investigation of the case.

Explanation

The statement is false because the integrity of the original evidence should never be violated in the interest of investigating a case. Maintaining the integrity of evidence is crucial to ensure fairness and accuracy in the legal process. Any tampering or violation of the original evidence can compromise its reliability and potentially lead to wrongful convictions or the dismissal of a case. Therefore, it is important to handle and preserve evidence carefully to maintain its integrity throughout the investigation.

Submit
12. Webhosting means.....

Explanation

Webhosting refers to the process of uploading your website on the internet. It involves storing and serving the files and data of a website on a server, making it accessible to users on the internet. This allows individuals and businesses to make their websites accessible to others by providing them with a unique domain name and hosting their website's files on a server that is connected to the internet.

Submit
13. In order to find out IP address details of a computer located in India,you will use following website...

Explanation

The website www.apnic.net is the correct answer because APNIC (Asia-Pacific Network Information Centre) is the regional internet registry responsible for allocating and managing IP addresses in the Asia-Pacific region, which includes India. Therefore, by visiting the APNIC website, one can find the IP address details of a computer located in India. The other websites mentioned (www.arin.net, www.lacnic.net, www.ripe.net) are regional internet registries for other parts of the world and may not provide accurate information for a computer in India.

Submit
14. The power of investigations of offences under Information Technology Act are given to

Explanation

The correct answer is "Officers of and above the rank of Police Inspector." According to the given options, the power of investigations of offences under the Information Technology Act are given to officers of and above the rank of Police Inspector. This means that only Police Inspectors and higher-ranking officers have the authority to conduct investigations related to offences under the Information Technology Act.

Submit
15. You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company.What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?

Explanation

The employee is violating Trademark Law. This is because the employee is using a graphic symbol that is similar to the company's trademark, with only the wording in the graphic being different. Trademark law protects against the unauthorized use of similar marks that may cause confusion among consumers. In this case, the employee's use of the similar graphic symbol could potentially create confusion in the marketplace and dilute the company's trademark rights.

Submit
16. Match the following
Submit
17. Wayback machine is used for

Explanation

The Wayback machine is a tool used to see snapshots of a website taken previously. It allows users to access archived versions of websites, allowing them to view how a website looked and functioned in the past. This can be useful for historical research, tracking website changes, or accessing information that may no longer be available on the current version of the website. The Wayback machine does not involve taking backups of databases, going back in time, or cloning email boxes.

Submit
18. 1 sector consists of ..bytes

Explanation

In computer memory, a sector is a fixed-size unit of storage typically consisting of 512 bytes. This means that each sector can hold 512 bytes of data. Therefore, the correct answer is 512.

Submit
19. Match the following
Submit
20. Grabify can be used to find out IP address of a website.

Explanation

Grabify is a tool that allows users to create shortened URLs and track the IP address of anyone who clicks on those links. It does not provide the IP address of a website itself. Therefore, the statement that Grabify can be used to find out the IP address of a website is false.

Submit
21. Continuous online sexual harrasment by a male to female,comes under which category of cyber crime.

Explanation

Continuous online sexual harassment by a male to female falls under the category of cyber stalking. Cyber stalking refers to the persistent and unwanted pursuit or harassment of an individual using electronic communication, such as emails, messages, or social media platforms. In this case, the male's behavior of continuously harassing the female online qualifies as cyber stalking as it involves unwanted and persistent actions that cause distress and invade the female's privacy.

Submit
22. Smallest unit of storage on the Hard Disk is called as..

Explanation

The smallest unit of storage on a Hard Disk is called a sector. A sector is a subdivision of a track on the disk and represents the minimum amount of data that can be read or written at a time. It typically consists of a fixed number of bytes, such as 512 bytes. Sectors are organized into tracks, and multiple tracks form a cluster. The sector size is important for disk formatting, file systems, and data storage efficiency.

Submit
23. In order to find out private IP address of your computer,which of the following command will you use?

Explanation

The correct answer is ipconfig /all. This command is used to display the complete configuration information of all network interfaces on a computer, including the private IP address. The /all flag ensures that all details are shown, providing a comprehensive view of the network settings.

Submit
24. Match the following
Submit
25. Section 65(B) is in respect of admissibility of electronic evidence is apart of

Explanation

Section 65(B) of the Indian Evidence Act is related to the admissibility of electronic evidence. This section provides guidelines for the admissibility of electronic records as evidence in court proceedings. It specifies the conditions under which electronic evidence can be admitted, such as ensuring the authenticity and integrity of the electronic record. Therefore, the correct answer is Indian Evidence Act.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 27, 2017
    Quiz Created by
    Cyberi_MPA
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What Term usually describes a person who gains access to computer...
Illegal interception,illegal access, data interference, and system...
192.169.23.56 can be used to access Internet.
What term refers to uncovering computer-stored information suitable...
Webhosting and Domain name registration are one and the same thing
Rooting of Mobile phone means..
1 cluster is equivalent to how many sectors?
In order to find out Public IP address of your computer, following...
A ___________ attack occurs when hackers bombard a site with more...
Minimum how many copies we should make of "Single source evidence...
Integrity of the original evidence can be violated in the interest of...
Webhosting means.....
In order to find out IP address details of a computer located in...
The power of investigations of offences under Information Technology...
You are working for a large clothing manufacturer as a computer...
Match the following
Wayback machine is used for
1 sector consists of ..bytes
Match the following
Grabify can be used to find out IP address of a website.
Continuous online sexual harrasment by a male to female,comes under...
Smallest unit of storage on the Hard Disk is called as..
In order to find out private IP address of your computer,which of the...
Match the following
Section 65(B) is in respect of admissibility of electronic evidence is...
Alert!

Advertisement