
FI Quiz 1
Authored by Om Das
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Consider a scenario where a forensic investigator is performing malware analysis on a memory dump acquired from a victim’s computer. The investigator uses Volatility Framework to analyze RAM contents; which plugin helps investigator to identify hidden processes or injected code/DLL in the memory dump?
Mallist
Malfind
Pslist
Malscan
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe is also using a graphical generator that supports SHA1. What password technique is being used?
Rainbow Tables / Winrtgen
Brute-force / MScache
Dictionary attack / Cisco PIX
Cain & Able / Rten
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is true regarding SMTP Server?
SMTP server breaks the recipient's address into recipient's name and his/her designation before passing it to the DNS server
SMTP server breaks the recipient's address into recipient's name and domain name before passing it to the DNS server
SMTP server breaks the recipient's address into recipient's name and recipient's address before passing it to the DNS server
SMTP server breaks the recipient's address into recipient's name and his/her initial before passing it to the DNS server
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Storage location of Recycle Bin for NTFS file systems (Windows Vista and later) is located at:
Drive:\$Recycle.Bin
Drive:\RECYCLER
Drive:\REYCLED
Drive:\RECYCLE.BIN
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to explain his/her actions and the impact of those actions on the evidence, in the court.” Which ACPO principle states this?
Principle 2
Principle 3
Principle 1
Principle 4
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which among the following acts has been passed by the U.S. Congress to protect investors from the possibility of fraudulent accounting activities by corporations?
Federal Information Security Management act of 2002
Gramm-Leach-Bliley act
Health Insurance Probability and Accountability act of 1996
Sarbanes-Oxley act of 2002
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cybercriminals sometimes use compromised computers to commit other crimes, which may involve using computers or networks to spread malware or illegal information. Which type of cybercrime stops users from using a device or network, or prevents a company from providing a software service to its customers?
Ransomware attack
Malware attack
Denial-of-Service (DoS) attack
Phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?