Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Online Re-Sessional 2Examination

th
Semester : 8 Sem Subject : DF
Sr.No Question Options Correct Answer
A. Financial information
B. Sabotage of data
and/or networks
Computer crimes include the
C. Theft of proprietary A. Financial
1 following, except:
information information
D. System penetration
from the outside and
denial of service
a. Data stored or
transmitted using a
computer
b. Information of c. Digital data of
A valid definition of digital
2 probative value probative value
evidence is:
c. Digital data of
probative value
d. Any digital evidence
on a computer
A. Do not turn on or
attempt to examine the
suspect computer. This
could result
The following are some helpful
in destruction of
tips that you can follow to help
evidence.
preserve data C. Run all in-
3 B. Identify all devices
for future computer forensic house computers
that may contain
examination, except:
evidence.
C. Run all in-house
computers.
D. Quarantine all in-
house computers.
A. Downloading or
Internal events are committed by distributing offensive
those with a substantial link to the material
intended B. Theft of intellectual D. Unintentional
victim, for example, a bank property or intentional
4 employee who siphons electronic C. Internal system addition or
funds from a intrusions damage of data
customer’s account. Other D. Unintentional or or systems
examples include the following, intentional addition or
except: damage of data or
systems
Each participant in a computer
forensics course who successfully
A. Computer evidence
completes the
processing
course should receive some sort of
B. Preservation of C. Troy horse
a certificate of completion that is
5 evidence programs
suitable for
C. Troy horse programs
framing. They should also leave
D. Computer forensics
the course with a good
documentation
understanding of the
following, except:
6 Private networks can be a richer a. They retain data for c. Private networks
source of evidence than the longer periods of time. contain a higher
Internet because: b. Owners of private concentration of
networks are more digital evidence.
cooperative with law
enforcement.
c. Private networks
contain a higher
concentration of digital
evidence.
d. All of the above.
7
a) Credit card fraudulent
Which of the following is not an
b) Spying someone
example of a computer as defense b) Spying someone
8 using keylogger
cyber-crime? using keylogger
c) IPR Violation
d) Pornography
A. Detect the extent of a
security breach.
B. Recover found data. B. Recover found
Forensic investigators perform the
9 C. Recover lost data. data.
following, except:
D. Determine how an
intruder got past
security mechanisms.
a) Used to create
evidence-grade
backups of hard disk
drives on Intel-based
computer systems
b) Used to exactly restore
archived SafeBack
images to another
10 The primary uses of SafeBack are
computer hard disk
d)All of them
drive of equal or
larger storage capacity
c) Used as an evidence
preservation tool in
law enforcement and
civil litigation matters
d) All of them
A. Electric power
The following are critical national
system
infrastructures as listed by the
B. Gas and oil storage C. Web site
11 executive
and transportation
order, except:
C. Web site
D. Banking and finance
a. Security reviews of
floppy diskettes for
storage anomalies
b. b. Duplication of
diskettes that are
Primary uses of Anadisk Diskette
12 Analysis Tool are
nonstandard or that d)All of them
involve storage
anomalies
c. c. Editing diskettes at a
physical sector level
d. All of them
13 For a strategy of deterrence to A. The incident must A. The incident must
work the following must hold, not be well defined. not be well defined.
except: B. The identity of the
perpetrator must be
unambiguous.
C. The will and ability
to carry out a deterrence
strike must be believed.
D. The perpetrator must
have something of value
at stake.
What is another data hiding
a) Cryptography
technique which can be used in
b) Steganography b)Steganography
14 conjunction with cryptography for
c) Tomography
the extra-secure method of
d) Chorography
protecting data.
A. Complex systems fail
in unpredictable ways
from causes that seem to
be
minor and, often,
obvious flaws in
retrospect.
B. Complex systems
pass in unpredictable
B. Complex systems
ways from causes that
In what has been called the seem to be pass in unpredictable
ways from causes
“complex-system issue,” the minor and, often,
obvious flaws in that seem to be
15 following are axioms, minor and, often,
except: retrospect.
obvious flaws in
C. The failure of a
complex system may be retrospect.
exceptionally difficult to
discover
and repair.
D. Complex systems fail
at inopportune
moments—usually during
demanding system use
when the consequences
of failure are highest.
a) suspicion
People will normally think it as a
b) decryption
16 normal/regular file and your secret a) suspicion
c) encryption
message will pass on without any
d) cracking
A. The resort to force
must have a just cause.
B. It must be authorized
by a competent
The following requirements of jus C. It is expected to
authority.
ad bellum were developed by produce a
C. It is expected to
17 Thomas preponderance of
produce a
Aquinas in the 13th century, evil over good.
preponderance of evil
except:
over good.
D. It must have a
reasonable chance of
success.
What is unnecessary software
a) Shareware
which infiltrates user’s system,
b) Spyware
18 spy on user’s activities, stealing b) Spyware
c) Ransomware
internet usage data & sensitive
d) Freeware
information of that user.
A. Offensive software
(viruses, worms, trojan
horses)
B. Sniffing or
“wiretapping”
software (enabling the
By changing perspectives from capture of an D. Directed non-
defense to offense, the following adversary’s energy weapons
are in the U.S. communications) (designed to destroy
19
arsenal to wage IW against an C. Chipping (malicious electronics, not
adversary, except: software embedded in humans
systems by and buildings)
manufacturer)
D. Directed non-energy
weapons (designed to
destroy electronics, not
humans
and buildings)
a) advertisers
Spyware collects user’s personal
b) dark-market
20 data & spreads it to which data- a) advertisers
c) antivirus company
firms, or its creator.
d) share market
A. Preserve
confidentiality
B. Protect flaws
Private citizens have legitimate C. Protect trade secrets B. Protect flaws
21 reasons to do the following,
D. Prevent legal or
except: medical records from
falling into strangers’
hands
a) Monitors your
internet activity
b) Track user’s login
Which of the following activity is details and passwords c) Uninstalls your
22
not done by spyware? c) Uninstalls your mobile browser
mobile browser
d) Spy on sensitive
information
A. You can keep doing
the same old tricks.
B. You can become a C. You can be hired
You only have three directions to
real criminal cracker. to hack other
23 go with hacking, except:
D. You can use those hackers.
skills wisely to build
new software and create
a more secureInternet.
a) Fast and slow
Which of the following are the b) Windows and d)Forensic and non-
24
two types of write protection? Linux forensic
c) Hardware and
software
d) Forensic and
non-forensic
A. Unauthorized access
Just as perpetrators such as
points
hackers and crackers have done to
B. Data interception
wired networks, D. Authorized
25 C. Denial-of-service
they can assault WLANs through access points
(DoS) attacks
the same methods, except:
D. Authorized access
points
a. Ignorance
Which of the following is not an
b. Trojan horses
26 external threat to a computer or a a. Ignorance
c. Adware
computer network
d. Crackers
A. Break into computers
through well-
documented holes (they
read security
alerts, too) when users
don’t install patches.
B. Enter networks
through old computers
that are no longer in use.
This can
Hackers can do the following, D. Physically
happen when
27 except: destroy a
administrators forget to
network.
disconnect an ex-
employee’s system
from the modem or
network.
C. Target data on a less-
protected off-site
machine that stores
backups.
D. Physically destroy a
network.
It is a program or hardware device a) Anti virus
that filters the information coming b) Firewall
28 b) Firewall
through an internet connection to a c) Cookies
network or computer system. d) Cyber safety
A. A defined
methodology
In order for a double tier approach A. A defined
B. Civil control
29 to work it is necessary to have: methodology
C. A breach of contract
D. Asset recovery

a) Plagiarism
b) Piracy
It is stealing ideas or creations of a) Plagiarism
30 c) Intellectual Property
others
Rights
d) All of the above

You might also like