Search Header Logo

FI Quiz 1

Authored by Om Das

Computers

Professional Development

Used 1+ times

FI Quiz 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consider a scenario where a forensic investigator is performing malware analysis on a memory dump acquired from a victim’s computer. The investigator uses Volatility Framework to analyze RAM contents; which plugin helps investigator to identify hidden processes or injected code/DLL in the memory dump?

Mallist

Malfind

Pslist

Malscan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe is also using a graphical generator that supports SHA1. What password technique is being used?

Rainbow Tables / Winrtgen

Brute-force / MScache

Dictionary attack / Cisco PIX

  Cain & Able / Rten

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true regarding SMTP Server?

SMTP server breaks the recipient's address into recipient's name and his/her designation before passing it to the DNS server

SMTP server breaks the recipient's address into recipient's name and domain name before passing it to the DNS server

SMTP server breaks the recipient's address into recipient's name and recipient's address before passing it to the DNS server

SMTP server breaks the recipient's address into recipient's name and his/her initial before passing it to the DNS server

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Storage location of Recycle Bin for NTFS file systems (Windows Vista and later) is located at:

Drive:\$Recycle.Bin

Drive:\RECYCLER

Drive:\REYCLED

Drive:\RECYCLE.BIN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to explain his/her actions and the impact of those actions on the evidence, in the court.” Which ACPO principle states this?

Principle 2

Principle 3

Principle 1

Principle 4

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which among the following acts has been passed by the U.S. Congress to protect investors from the possibility of fraudulent accounting activities by corporations?

Federal Information Security Management act of 2002

Gramm-Leach-Bliley act

Health Insurance Probability and Accountability act of 1996

Sarbanes-Oxley act of 2002

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cybercriminals sometimes use compromised computers to commit other crimes, which may involve using computers or networks to spread malware or illegal information. Which type of cybercrime stops users from using a device or network, or prevents a company from providing a software service to its customers?

Ransomware attack

Malware attack

Denial-of-Service (DoS) attack

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?