Cyber-i_ig Nashik Range Officers_26 &27 May 2017

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cyber_IG_Range_N
C
Cyber_IG_Range_N
Community Contributor
Quizzes Created: 1 | Total Attempts: 121
| Attempts: 121 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. As per law an officer who is authorised to investigate cyber crime cases....

Explanation

The correct answer is "PI and above". According to the law, only officers with the rank of Police Inspector (PI) and above are authorized to investigate cyber crime cases. This indicates that higher-ranking officers have the necessary expertise and knowledge to handle complex cyber crime cases.

Submit
Please wait...
About This Quiz
Cyber-i_ig Nashik Range Officers_26 &27 May 2017 - Quiz

This quiz for Cyber-IG Nashik Range officers held on May 26 & 27, 2017, assesses knowledge on cybersecurity topics like ransomware, cyber crimes, hacking, and denial of service attacks. It is designed to test the understanding of various cyber threats and defensive measures.

Personalize your quiz and earn a certificate with your name on it!
2. What Term usually describes a person who gains access to computer system illegally?

Explanation

A hacker is a term used to describe a person who gains unauthorized access to computer systems. Hackers use their technical skills and knowledge to exploit vulnerabilities in computer networks and bypass security measures. They may steal sensitive information, disrupt operations, or cause damage to the system. While some hackers engage in illegal activities, others use their skills for ethical purposes, such as identifying and fixing security flaws.

Submit
3. Facebook cannot be used for

Explanation

Facebook is a social media platform primarily used for connecting with friends, sharing posts, uploading videos, and sharing photos. However, it does not provide a dedicated feature for email communication. While Facebook does have a messaging feature, it is not designed to replace traditional email communication. Therefore, Facebook cannot be used for email communication.

Submit
4. Illegal interception, illegal access, data interference and system interference are all part of cyber crime

Explanation

The statement is true because illegal interception, illegal access, data interference, and system interference are all types of activities that fall under the category of cybercrime. Cybercrime refers to criminal activities that are committed using computers or the internet, and these activities involve unauthorized access, interference with data or computer systems, and interception of communications without permission. Therefore, it can be concluded that illegal interception, illegal access, data interference, and system interference are indeed part of cybercrime.

Submit
5. Algorithm of HASH value

Explanation

The given answer "SHA 1" is the correct answer because SHA-1 is a widely used cryptographic hash function that takes an input (in this case, the value 123) and produces a fixed-size output (the hash value). It is commonly used for data integrity checks and digital signatures. The algorithm used in SHA-1 ensures that even a small change in the input will result in a significantly different hash value, making it difficult to reverse-engineer the original input from the hash value.

Submit
6. A ___________ attack occurs, when hacker bombard a website with more request for service that it can possibly handle,preventing legitimate users preventing from accessing the service.

Explanation

A denial of service attack occurs when a hacker overwhelms a website with an excessive number of service requests, causing the website to become unavailable for legitimate users. This can be achieved by flooding the website's servers with traffic or exploiting vulnerabilities in the website's infrastructure. The intention is to disrupt the normal functioning of the website and prevent users from accessing the desired service.

Submit
7. While conducting raid on call centre,We should directly access the data from any server

Explanation

When conducting a raid on a call center, it is not necessary to directly access the data from any server. The correct procedure would be to follow legal protocols and obtain the necessary warrants or permissions to access the data. This may involve working with law enforcement agencies and following proper legal channels to ensure the admissibility of any evidence collected during the raid. Therefore, the statement is false.

Submit
8. As an investigator we can change the details of evidence to show the relativity of crime and Criminal

Explanation

As an investigator, it is unethical and illegal to change the details of evidence. The evidence should be presented as it is, without any manipulation, in order to maintain the integrity and reliability of the investigation. Changing the details of evidence would compromise the fairness of the investigation and could lead to wrongful accusations or judgments. Therefore, the statement is false.

Submit
9. Section for Identity theft  as Information Technology Act(amended)

Explanation

not-available-via-ai

Submit
10. Continuous online sexual harassment comes under which category of cyber crime.

Explanation

Continuous online sexual harassment falls under the category of cyber stalking. Cyber stalking refers to the persistent and unwanted pursuit or harassment of an individual online. In this case, the continuous online sexual harassment qualifies as cyber stalking as it involves the repeated and unwanted sexual advances or messages directed towards the victim. Cyber stalking is a serious cyber crime that can cause emotional distress and harm to the victim.

Submit
11. What is the command to see any computer's MAC ID for investigation purpose

Explanation

The command "ipconfig /all" is used to see the MAC ID of any computer for investigation purposes. This command displays detailed information about the network configuration of the computer, including the MAC (Media Access Control) address. The MAC address is a unique identifier assigned to the network interface card of a device, and it can be used to track or identify the device on a network.

Submit
12. 192.256.11.29 is the IP address user can use for internet surfing.

Explanation

The given IP address, 192.256.11.29, is not a valid IP address. In the octet "256", the value exceeds the maximum limit of 255. Therefore, this IP address cannot be used for internet surfing.

Submit
13. Primary evidence must be supported with certificate of 65 B as per Indian Evidence Act.

Explanation

According to the given statement, primary evidence must be supported with a certificate of 65 B as per the Indian Evidence Act. However, this statement is false. The Indian Evidence Act does not require primary evidence to be supported with a certificate of 65 B. Primary evidence refers to the original document itself, such as a contract or a photograph, and does not require any additional certification.

Submit
14. All internet service provider can be termed as ________________,as they are custodian of data in terms of Storage,Process and Transfer. and they are responsible to assist in any cyber crime investigation.

Explanation

The correct answer is "Intermediary." An intermediary is someone or something that acts as a mediator or middleman between two parties. In the context of internet service providers, they can be considered intermediaries because they store, process, and transfer data on behalf of their customers. Additionally, they have a responsibility to assist in any cybercrime investigations, further emphasizing their role as intermediaries in the digital realm.

Submit
15. Name the latest Ransomeware attack

Explanation

Wannacry is the correct answer because it is the name of the latest ransomware attack. In May 2017, the Wannacry ransomware spread rapidly across the globe, infecting hundreds of thousands of computers. It encrypted files on the infected systems and demanded a ransom in Bitcoin for their release. The attack affected various organizations, including hospitals, businesses, and government institutions, causing widespread disruption and financial losses.

Submit
16. Process to maintain the transfer and handling details of Digital evidence, is known as

Explanation

Chain of custody refers to the process of maintaining the transfer and handling details of digital evidence. It involves documenting the movement of evidence from the time it is collected until it is presented in court. This process ensures that the evidence is properly secured, preserved, and not tampered with, thus maintaining its integrity and admissibility in legal proceedings.

Submit
17. We must work on original digital evidence for perfect analysis of cyber crime

Explanation

Working on original digital evidence is not necessary for a perfect analysis of cyber crime. While it is ideal to have access to original evidence, forensic experts can still analyze copies or duplicates of digital evidence to gather important information and evidence. In some cases, the original evidence may not be available or accessible, but this does not necessarily hinder the analysis process. Therefore, the statement is false.

Submit
18. Match the following
Submit
19. Match the following
Submit
20. Steps while taking custody of suspects mobile phone in ascending order-if the phone is on
Submit
View My Results

Quiz Review Timeline (Updated): Mar 14, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 26, 2017
    Quiz Created by
    Cyber_IG_Range_N
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
As per law an officer who is authorised to investigate cyber crime...
What Term usually describes a person who gains access to computer...
Facebook cannot be used for
Illegal interception, illegal access, data interference and system...
Algorithm of HASH value
A ___________ attack occurs, when hacker bombard a website with more...
While conducting raid on call centre,We should directly access the...
As an investigator we can change the details of evidence to show the...
Section for Identity theft  as Information Technology...
Continuous online sexual harassment comes under which category of...
What is the command to see any computer's MAC ID for investigation...
192.256.11.29 is the IP address user can use for internet surfing.
Primary evidence must be supported with certificate of 65 B as per...
All internet service provider can be termed as ________________,as...
Name the latest Ransomeware attack
Process to maintain the transfer and handling details of Digital...
We must work on original digital evidence for perfect analysis of...
Match the following
Match the following
Steps while taking custody of suspects mobile phone in ascending...
Alert!

Advertisement