
Cyber Forensics - Introduction Ver 1,0
Authored by Udhayakumar Shanmugam
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is not the correct definition of Digital/Cyber/Computer Forensics.
The art of collecting, inspecting, interpreting, reporting, electronic evidence for identification of cyber fraud
Cyber forensics is a process of extracting data as proof for a crime (that involves electronic devices) while following proper investigation rules to nab the culprit by presenting the evidence to the court.
“A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices, digital media, that can be presented in a court of law in a coherent and meaningful format"
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An Approximate Global Cyber Crime Damages cost is.................................................
6 to 8 Trillion $ Annually
50 to 60 Billion $ Annually
50 to 60 Million $ Annually
6000 to 8000 Trillion $ Annually
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The First Official Digital Forensics Program is ........................................
PRISM Program of NSA
The Magnet Media Program of FBI
Honeypot program of Berkeley National Lab
Meta program from Mark Zuckerberg
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spamming is a Types of Cyber Crime that is against...............................................
Property
Organization
Individual
Society
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of financial crime.?
Email Bombing
Data diddling
Web Jacking
Salami Attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
.......................................... tools provide detailed information about traffic and monitor user’s activity on the Internet
Network analyzer
Data Capture
Email Analyser
Registry analysis
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This type of digital forensics is also called live acquisition.
MALWARE FORENSICS
DISK FORENSICS
DATABASE FORENSICS
MEMORY FORENSICS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?