CyberShaktiQuiz

CyberShaktiQuiz

University

20 Qs

quiz-placeholder

Similar activities

Storage Devices

Storage Devices

University

24 Qs

Synonyms and Antonyms

Synonyms and Antonyms

University

15 Qs

Computer Hardware/ Playful Priska

Computer Hardware/ Playful Priska

University

20 Qs

Week 3  - Computer Components Quiz

Week 3 - Computer Components Quiz

6th Grade - University

20 Qs

Flashcards

Flashcards

4th Grade - University

15 Qs

CyberShaktiQuiz

CyberShaktiQuiz

Assessment

Quiz

English

University

Hard

Created by

cyR3N cyR3N

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Network forensic investigations often rely on capturing live traffic. What tool is commonly used for this purpose?

Firewall

Antivirus software

Packet Sniffer

Encryption software

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is NOT considered a publicly available source for OSINT gathering?

Social media profiles (e.g., Facebook, Twitter)

Government agency reports and press releases

Public corporate filings and financial statements

Internal company documents accessed through hacking

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Smallest unit of storage on the Hard Disk is called as-

Cluster

Sector

Track

Byte

4.

MULTIPLE SELECT QUESTION

20 sec • 5 pts

What does the CIA Triad stand for in the context of cybersecurity?

Cybernetic Information Agency

Confidentiality, Integrity, Accessibility

Central Intelligence Agency

Confidentiality, Integrity, Availability

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is the purpose of examining metadata in forensic analysis of flash drives and memory cards?

To recover deleted files

To analyze system processes

To identify the owner of the device

To understand usage patterns and file history

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Rooting of Mobile phone mean-

Creating root directory in mobile phone

Obtaining administrative access of mobile phone

Formatting the mobile

Root cause of mobile

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is a common technique used in digital steganography?

Least Significant Bit (LSB) Embedding

Advanced Encryption Standard (AES)

SQL Injection

Packet Sniffing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for English