Cyber-i_ig Nashik Range Officers_26 &27 May 2017

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cyber_IG_Range_N
C
Cyber_IG_Range_N
Community Contributor
Quizzes Created: 1 | Total Attempts: 121
Questions: 20 | Attempts: 121

SettingsSettingsSettings
Cyber-i_ig Nashik Range Officers_26 &27 May 2017 - Quiz

Cyber-i_IG Nashik Range officers_26 &27 May 2017


Questions and Answers
  • 1. 

    Name the latest Ransomeware attack

    • A.

      HappyHack

    • B.

      Wannacry

    • C.

      Ransome

    • D.

      Virus

    Correct Answer
    B. Wannacry
    Explanation
    Wannacry is the correct answer because it is the name of the latest ransomware attack. In May 2017, the Wannacry ransomware spread rapidly across the globe, infecting hundreds of thousands of computers. It encrypted files on the infected systems and demanded a ransom in Bitcoin for their release. The attack affected various organizations, including hospitals, businesses, and government institutions, causing widespread disruption and financial losses.

    Rate this question:

  • 2. 

    Illegal interception, illegal access, data interference and system interference are all part of cyber crime

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because illegal interception, illegal access, data interference, and system interference are all types of activities that fall under the category of cybercrime. Cybercrime refers to criminal activities that are committed using computers or the internet, and these activities involve unauthorized access, interference with data or computer systems, and interception of communications without permission. Therefore, it can be concluded that illegal interception, illegal access, data interference, and system interference are indeed part of cybercrime.

    Rate this question:

  • 3. 

    What Term usually describes a person who gains access to computer system illegally?

    • A.

      Hacker

    • B.

      Fisher

    • C.

      Con Artist

    • D.

      Cyber Thief

    Correct Answer
    A. Hacker
    Explanation
    A hacker is a term used to describe a person who gains unauthorized access to computer systems. Hackers use their technical skills and knowledge to exploit vulnerabilities in computer networks and bypass security measures. They may steal sensitive information, disrupt operations, or cause damage to the system. While some hackers engage in illegal activities, others use their skills for ethical purposes, such as identifying and fixing security flaws.

    Rate this question:

  • 4. 

    A ___________ attack occurs, when hacker bombard a website with more request for service that it can possibly handle,preventing legitimate users preventing from accessing the service.

    • A.

      Digital bomb

    • B.

      Service error

    • C.

      Denial of service

    • D.

      Time out

    Correct Answer
    C. Denial of service
    Explanation
    A denial of service attack occurs when a hacker overwhelms a website with an excessive number of service requests, causing the website to become unavailable for legitimate users. This can be achieved by flooding the website's servers with traffic or exploiting vulnerabilities in the website's infrastructure. The intention is to disrupt the normal functioning of the website and prevent users from accessing the desired service.

    Rate this question:

  • 5. 

    Continuous online sexual harassment comes under which category of cyber crime.

    • A.

      Cyber Stalking

    • B.

      Cyber Harassment

    • C.

      Cyber spoofing

    • D.

      Cyber phishing

    Correct Answer
    A. Cyber Stalking
    Explanation
    Continuous online sexual harassment falls under the category of cyber stalking. Cyber stalking refers to the persistent and unwanted pursuit or harassment of an individual online. In this case, the continuous online sexual harassment qualifies as cyber stalking as it involves the repeated and unwanted sexual advances or messages directed towards the victim. Cyber stalking is a serious cyber crime that can cause emotional distress and harm to the victim.

    Rate this question:

  • 6. 

    192.256.11.29 is the IP address user can use for internet surfing.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given IP address, 192.256.11.29, is not a valid IP address. In the octet "256", the value exceeds the maximum limit of 255. Therefore, this IP address cannot be used for internet surfing.

    Rate this question:

  • 7. 

    Facebook cannot be used for

    • A.

      Post

    • B.

      Video uploading

    • C.

      Photo sharing

    • D.

      Email communication

    Correct Answer
    D. Email communication
    Explanation
    Facebook is a social media platform primarily used for connecting with friends, sharing posts, uploading videos, and sharing photos. However, it does not provide a dedicated feature for email communication. While Facebook does have a messaging feature, it is not designed to replace traditional email communication. Therefore, Facebook cannot be used for email communication.

    Rate this question:

  • 8. 

    Primary evidence must be supported with certificate of 65 B as per Indian Evidence Act.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    According to the given statement, primary evidence must be supported with a certificate of 65 B as per the Indian Evidence Act. However, this statement is false. The Indian Evidence Act does not require primary evidence to be supported with a certificate of 65 B. Primary evidence refers to the original document itself, such as a contract or a photograph, and does not require any additional certification.

    Rate this question:

  • 9. 

    As an investigator we can change the details of evidence to show the relativity of crime and Criminal

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    As an investigator, it is unethical and illegal to change the details of evidence. The evidence should be presented as it is, without any manipulation, in order to maintain the integrity and reliability of the investigation. Changing the details of evidence would compromise the fairness of the investigation and could lead to wrongful accusations or judgments. Therefore, the statement is false.

    Rate this question:

  • 10. 

    What is the command to see any computer’s MAC ID for investigation purpose

    • A.

      MAC/ID

    • B.

      WHAT IS MY MAC ID

    • C.

      Domaintools

    • D.

      Ipconfig /all

    Correct Answer
    D. Ipconfig /all
    Explanation
    The command "ipconfig /all" is used to see the MAC ID of any computer for investigation purposes. This command displays detailed information about the network configuration of the computer, including the MAC (Media Access Control) address. The MAC address is a unique identifier assigned to the network interface card of a device, and it can be used to track or identify the device on a network.

    Rate this question:

  • 11. 

    Algorithm of HASH value

    • A.

      HASH 1

    • B.

      VAULE 123

    • C.

      SHA 1

    • D.

      CALCULATOR

    Correct Answer
    C. SHA 1
    Explanation
    The given answer "SHA 1" is the correct answer because SHA-1 is a widely used cryptographic hash function that takes an input (in this case, the value 123) and produces a fixed-size output (the hash value). It is commonly used for data integrity checks and digital signatures. The algorithm used in SHA-1 ensures that even a small change in the input will result in a significantly different hash value, making it difficult to reverse-engineer the original input from the hash value.

    Rate this question:

  • 12. 

    Section for Identity theft  as Information Technology Act(amended)

    • A.

      66C

    • B.

      66A

    • C.

      65B

    • D.

      65D

    Correct Answer
    A. 66C
  • 13. 

    While conducting raid on call centre,We should directly access the data from any server

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    When conducting a raid on a call center, it is not necessary to directly access the data from any server. The correct procedure would be to follow legal protocols and obtain the necessary warrants or permissions to access the data. This may involve working with law enforcement agencies and following proper legal channels to ensure the admissibility of any evidence collected during the raid. Therefore, the statement is false.

    Rate this question:

  • 14. 

    Process to maintain the transfer and handling details of Digital evidence, is known as

    • A.

      Evidence Handling

    • B.

      Panchnama

    • C.

      Transfer Book

    • D.

      Chain of Custody

    Correct Answer
    D. Chain of Custody
    Explanation
    Chain of custody refers to the process of maintaining the transfer and handling details of digital evidence. It involves documenting the movement of evidence from the time it is collected until it is presented in court. This process ensures that the evidence is properly secured, preserved, and not tampered with, thus maintaining its integrity and admissibility in legal proceedings.

    Rate this question:

  • 15. 

    We must work on original digital evidence for perfect analysis of cyber crime

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Working on original digital evidence is not necessary for a perfect analysis of cyber crime. While it is ideal to have access to original evidence, forensic experts can still analyze copies or duplicates of digital evidence to gather important information and evidence. In some cases, the original evidence may not be available or accessible, but this does not necessarily hinder the analysis process. Therefore, the statement is false.

    Rate this question:

  • 16. 

    As per law an officer who is authorised to investigate cyber crime cases....

    • A.

      PSI

    • B.

      PI and above

    • C.

      Cyber officer

    • D.

      Cyber Lab Head

    Correct Answer
    B. PI and above
    Explanation
    The correct answer is "PI and above". According to the law, only officers with the rank of Police Inspector (PI) and above are authorized to investigate cyber crime cases. This indicates that higher-ranking officers have the necessary expertise and knowledge to handle complex cyber crime cases.

    Rate this question:

  • 17. 

    All internet service provider can be termed as ________________,as they are custodian of data in terms of Storage,Process and Transfer. and they are responsible to assist in any cyber crime investigation.

    • A.

      Service provider

    • B.

      Investigator

    • C.

      Databank

    • D.

      Intermediary

    Correct Answer
    D. Intermediary
    Explanation
    The correct answer is "Intermediary." An intermediary is someone or something that acts as a mediator or middleman between two parties. In the context of internet service providers, they can be considered intermediaries because they store, process, and transfer data on behalf of their customers. Additionally, they have a responsibility to assist in any cybercrime investigations, further emphasizing their role as intermediaries in the digital realm.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 26, 2017
    Quiz Created by
    Cyber_IG_Range_N
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.