Search Header Logo

Cyber Forensics - Introduction Ver 1,0

Authored by Udhayakumar Shanmugam

Computers

University

Used 2+ times

Cyber Forensics - Introduction Ver 1,0
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not the correct definition of Digital/Cyber/Computer Forensics.

The art of collecting, inspecting, interpreting, reporting, electronic evidence for identification of cyber fraud

Cyber forensics is a process of extracting data as proof for a crime (that involves electronic devices) while following proper investigation rules to nab the culprit by presenting the evidence to the court.

“A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices, digital media, that can be presented in a court of law in a coherent and meaningful format"

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Approximate Global Cyber Crime Damages cost is.................................................

6 to 8 Trillion $ Annually

50 to 60 Billion $ Annually

50 to 60 Million $ Annually

6000 to 8000 Trillion $ Annually

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The First Official Digital Forensics Program is ........................................

PRISM Program of NSA

The Magnet Media Program of FBI

Honeypot program of Berkeley National Lab

Meta program from Mark Zuckerberg

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spamming is a Types of Cyber Crime that is against...............................................

Property

Organization

Individual

Society

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of financial crime.?

Email Bombing

Data diddling

Web Jacking

Salami Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.......................................... tools provide detailed information about traffic and monitor user’s activity on the Internet

Network analyzer

Data Capture

Email Analyser

Registry analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of digital forensics is also called live acquisition.

MALWARE FORENSICS

DISK FORENSICS

DATABASE FORENSICS

MEMORY FORENSICS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?