Cyber Forensics MCQ
Cyber Forensics MCQ
Computer Application
of blindly believing what was contained in the mails. During investigation, it was revealed that
the person sending those emails was none other than Meena's stepfather. He had sent these
emails so as to break up the marriage. The girl's marriage would have caused him to lose control
of her property of which he was the guardian till she go.
2. A student of the Air Force Balbharati School, Surat, was teased by all his classmates for having
a pockmarked face. Tired of the cruel jokes, he decided to get back at his tormentors. He
scanned photographs of his classmates and teachers, morphed them with nude photographs
and put them up on a website that he uploaded on to a free web hosting service. It was only
after the father of one of the class girls featured on the website objected and lodged a complaint
with the police that any action was taken.
4.Mrs.Kohli got unwanted messages and repeated calls at every odd hours forcing her to talk
and chat with the different people. Her husband’s friend stealed her phone number and gave it
to his friends to harrasher. She was fed up and this messages created havoc in her personal life
and she reported to police and filed an FIR against them. Read the case carefully and answer the
following.
i. Identify the cybercrime.
ii. Name the category to which this cybercrime belongs.
iii. Write the definition of identified cybercrime.
5.Arun was using the internet hours of Suresh without the knowledge of him. He downloaded
the materials which were not freely available on web. Identify the crime with proper definition.
6. Suzzane and James are two NRIs who were influencing and motivating children to give
pornographic pictures.
Read the above statement and answer the following questions.
a) What are this NRI’s known as ?
b) Name the crime committed by them.
3) How this people work to commit such crime?
2) Any illegal behavior, directed by means of electronic operation, that targets the security of
computer systems and the data proceed by them
a) Cyber Crime
b) E-crime
c) High-tech crime
d) All
3) Worldwide network of computer networks that uses the TCP/IP for communication to
facilitate transmission and exchange of data
a) Shared Database
b) Cyber Space
c) E mail
d) Internet
d) Cyber Crime
6) Email is one that appears to originate from one source but actually has been sent from
another source.
a) Forwarded Email
b) Spam Email
c) Spoofed Email
d) Bulk Email
7) Which are the cyber crime comes under Cybercrime against Society
a) Forgery
b) Cyber terrorism
c) Web jacking
d) All
10) People whom physically or psychologically force minors to engage in sexual activities, which
the minors would not consciously consent.
a) Pedophiles
b) Physiologist
c) Genuine People
d) Teenagers
6) Searching through object residue to acquire sensitive data without authorization is know as
a) Binning
b) Scavenging
c) Stalking
d) Bulling
7) Which are the types of Stalkers ?
a) Online
b) Computer Based
c) Offline
d) (a) and (c) both
8) When the internet, cell phones or other devices are used to send or post text or images
intended to hurt or embarrass another person is know as
a) Cyber stalking
b) Cyber bullying
c) Cyber squatting
d) Cyber Engineering
9) __________________ is network of computers infected with a malicious program that allows
cybercriminals to control the infected machines remotely without the user knowledge
a) Shared WiFi
b) World Wide Web
c) Botnet
d) Intranet
10) An attacker can gain access to computer or to a network server to deliver a payload or
malicious outcome is known as
a) Botnet renting
b) Active Vector
c) Botnet selling
d) Attack Vector
3) _____________ is an attack where fragmented packets are forged to overlap each other when the
receiving host tries to reassemble them
a) Smurf attack
b) SYN attack
c) Flood Attack
d) Teardrop Attack
5) A small piece of code used as a payload in the exploitation of software vulnerability, is called
a) Assembly code
b) Shell code
c) C and C++ code
d) Malicious code
9. What is X.509?
10. What do you mean by certificate user?
2) __________ is a trusted entity that issues and revokes public-key certificates and CRLs
a) Certification Authority
b) Registration Authority
c) Certifying Authorities
d) Electronic Signature
10) The tie between technical issues associated with the digital forensics evidence and the
legal theories is the job of
a) Expert witness
b) Digital Forensics Department
c) Technology expert
d) All
6) The ______________ number of a cell phone is a very important starting point for the FIR
a) Mobile
b) IMEI
c) Model
d) EIR
9) MOBILedit cannot allows examiner to acquire logically, search, examine and report data from
a) CDMA
b) PCA
c) GSM
d) PDD
10) Before 100 years ago the first Mobile telephone was invented and patented by
a) Dr. Joel S. Engel
b) Nathan B. Stubblefield
c) Martin Copper
d) John F. Mitchell