Computer Hardware and Networking/Information Cyber Security (ICS) MCQs Set 1 Sample Test,Sample questions

Question:
 A digital signature needs a

1. private-key system

2.shared-key system

3.public-key system

4.all of them

Posted Date:-2022-07-18 02:08:07


Question:
 A false positive can be defined as:

1.an alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior

2.an alert that indicates nefarious activity on a system that, upon further inspection, turns out to truly be nefarious activity

3.the lack of an alert for nefarious activity

4.All of the above

Posted Date:-2022-07-18 02:48:41


Question:
 A valid definition of digital evidence is:

1.none of the below

2.data stored or transmitted using a computer

3.digital data of probative value

4.any digital evidence on a computer

Posted Date:-2022-07-18 02:51:28


Question:
 Forensic analysis involves the following:

1. assessment, experimentation, fusion, correlation, and validation

2.seizure and preservation

3.recovery, harvesting, filtering, organization, and search

4.All of the above

Posted Date:-2022-07-18 03:34:28


Question:
 In crimes against individuals the ______ period leading up to the crime often contains the most important clues regarding the relationship between the offender and the victim.

1.24-hour

2.28-hour

3.60-minute

4. 15-minute

Posted Date:-2022-07-18 03:41:21


Question:
 In the DNS the names are defined in _____ sturucture

1.a linear list

2.an invertred tree

3. a graph

4.None of These

Posted Date:-2022-07-18 02:45:13


Question:
 Investigative reconstruction is composed of three different forms. Which of the following is NOT one of those three forms?

1.functional

2.intentional

3.relational

4.temporal

Posted Date:-2022-07-18 03:40:00


Question:
 Investigators should not rely on one piece of digital evidence when examining an alibi – they should look for an associated _______.

1.cybertrail

2.piece of physical evidence

3.statement

4.none of the above

Posted Date:-2022-07-18 03:43:48


Question:
 SSL stands for?

1.secured socket layer

2. secured shell layer

3.system socket layer

4.system secured layer

Posted Date:-2022-07-18 02:23:48


Question:
 The type of report that is a preliminary summary of findings is known as:

1.sitrep

2.threshold assessment report

3.full investigative report

4.field notes

Posted Date:-2022-07-18 03:42:21


Question:
 What is necessary for a cross-site script attack with cookies to be thwarted

1.captchas

2.virtual machines

3.proxies

4.firewalls

Posted Date:-2022-07-18 02:09:43


Question:
_____uses the idea of certificate trust levels

1. x509

2.pgp

3.kdc

4.none of them

Posted Date:-2022-07-17 23:26:55


Question:
A full domain name is sequence of lables seperated by____

1.semicolons

2.dots

3.colons

4.None of These

Posted Date:-2022-07-18 02:46:47


Question:
An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL

1.40; 80

2.60; 620

3.80; 443

4. 620; 80

Posted Date:-2022-07-17 23:24:25


Question:
An investigation can be hindered by the following:

1.preconceived theories

2.improperly handled evidence

3.offender concealment behavior

4.all of the above

Posted Date:-2022-07-18 03:33:40


Question:
Computers can play the following roles in a crime:

1. target, object, and subject

2.evidence, instrumentality, contraband, or fruit of crime

3.object, evidence, and tool

4.symbol, instrumentality, and source of evidence

Posted Date:-2022-07-18 03:08:05


Question:
Creating a histogram of times to reveal periods of high activity is an example of which form of investigative reconstruction?

1. functional

2.intentional

3.relational

4.temporal

Posted Date:-2022-07-18 03:42:58


Question:
Cybertrails are advantageous because:

1.they are not connected to the physical world.

2.nobody can be harmed by crime on the internet.

3.they are easy to follow.

4.offenders who are unaware of them leave behind more clues than they otherwise would have.

Posted Date:-2022-07-18 02:56:29


Question:
DNS can use services of________using the well known port 53

1.udp

2.tcp

3. either (a) or (b)

4.None of the above

Posted Date:-2022-07-18 02:43:58


Question:
For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.

1.ticket

2.local

3.token

4.user

Posted Date:-2022-07-18 02:14:20


Question:
For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.

1. key

2.realm

3.document

4.none of the mentioned

Posted Date:-2022-07-18 02:11:52


Question:
How does machine learning benefit IDSes/IPSes?

1.by lowering the volume of attacks analyzed

2. by adding heuristic anomaly detection capabilities

3. by searching for similar patterns to known attacks

4.by helping identify signatures more quickly

Posted Date:-2022-07-18 02:50:33


Question:
Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.

1.cross-site scripting

2.sql injection

3.packet sniffing

4.a and b

Posted Date:-2022-07-18 02:17:33


Question:
In terms of digital evidence, the Internet is an example of:

1.open computer systems

2. communication systems

3.embedded computer systems

4. none of the above

Posted Date:-2022-07-18 02:55:41


Question:
In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

1.transport

2.tunnel

3.either (a) or (b)

4.neither (a) nor (b)

Posted Date:-2022-07-17 23:23:44


Question:
It is quite difficult to fabricate an alibi on a network successfully because:

1.an offender may not have the proper access.

2. an offender would need system administrator access level to make the necessary changes.

3.an individual rarely has the ability to falsify digital evidence on all the computers that are involved.

4.creating an alibi on a network could take months of work.

Posted Date:-2022-07-18 03:44:42


Question:
Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology.

1.criminal investigation

2.prosecution

3.defense work

4.all of the above

Posted Date:-2022-07-18 03:07:07


Question:
The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

1.transport

2.tunnel

3.either (a) or (b)

4. neither (a) nor (b)

Posted Date:-2022-07-18 02:10:40


Question:
The _____domains define registered hosts according to their generic behaviour.

1.generic

2.country

3.inverse

4.none

Posted Date:-2022-07-18 02:42:31


Question:
The crime scene preservation process includes all but which of the following:

1.protecting against unauthorized alterations

2.acquiring digital evidence

3.confirming system date and time

4. controlling access to the crime scene

Posted Date:-2022-07-18 03:38:55


Question:
The domain name space (tree) is devided into---------different sections

1.3

2.2

3.4

4.None of the mentioned

Posted Date:-2022-07-18 02:41:53


Question:
The fact that with modern technology, a photocopy of a document has become acceptable in place of the original is known as:

1. best evidence rule

2. due diligence

3.quid pro quo

4.voir dire

Posted Date:-2022-07-18 03:32:08


Question:
The features of traditional IPSes are found in all of these modern systems, except:

1.next-generation firewalls

2.antimalware

3.unified threat management appliances

4.network behavior analysis systems

Posted Date:-2022-07-18 02:49:46


Question:
The first step in applying the scientific method to a digital investigation is to:

1. form a theory on what may have occurred

2. experiment or test the available evidence to confirm or refute your prediction

3.make one or more observations based on events that occurred

4.form a conclusion based on the results of your findings

Posted Date:-2022-07-18 03:36:54


Question:
The following specializations exist in digital investigations:

1.first responder (a.k.a. digital crime scene technician)

2.forensic examiner

3.digital investigator

4.All of the above

Posted Date:-2022-07-18 03:09:16


Question:
The process model whose goal is to completely describe the flow of information in a digital investigation is known as:

1. the physical model

2. the staircase model

3.the evidence flow model

4.the subphase model

Posted Date:-2022-07-18 03:37:55


Question:
The process of documenting the seizure of digital evidence and, in particular, when that evidence changes hands, is known as:

1.chain of custody

2. field notes

3.interim report

4.None of the above

Posted Date:-2022-07-18 03:10:13


Question:
The process of documenting the seizure of digital evidence and, in particular, when that evidence changes hands, is known as:

1.chain of custody

2. field notes

3.interim report

4.None of the above

Posted Date:-2022-07-18 03:17:07


Question:
The root of DNS tree is____

1.a string of characters

2.a string of 63 characters

3.an empty string

4.None of These

Posted Date:-2022-07-18 02:46:02


Question:
To demonstrate that someone is lying about an alibi, it is necessary to:

1.find evidence that clearly demonstrates the lie

2. require the suspect to submit to a polygraph

3. interrogate the suspect using a number of methods

4.show that no evidence confirming the alibi is available

Posted Date:-2022-07-18 03:46:57


Question:
Types of digital evidence that might corroborate an alibi include:

1.evidence of computer usage when the offense was supposed to occurred

2.computer records from credit cards, the telephone company, or subway ticket usage

3.. gps information from mobile devices indicating the user’s location and time

4.all of the above

Posted Date:-2022-07-18 03:45:49


Question:
What are the three general categories of computer systems that can contain digital evidence?

1.Desktop, laptop, server

2.personal computer, internet, mobile telephone

3. hardware, software, networks

4.open computer systems, communication systems, embedded systems

Posted Date:-2022-07-18 02:54:50


Question:
What are the two primary classifications of cross-site scripting?

1.dom based and persistent

2.traditional and dom based

3. traditional and non-persistent

4.non-persistent and persistent

Posted Date:-2022-07-18 02:15:28


Question:
What is Firewall?

1.firewalls are network based security measures that control the flow of incoming and outgoing traffic

2.firewall is a program that encrypts all programs that access the internet

3.a firewall is a program that keeps other programs from using the internet

4. firewall are the interrupts that automatically disconnect from the internet when a threat appears.

Posted Date:-2022-07-18 02:22:52


Question:
What is the most important activity in system hacking?

1.information gathering

2.cracking passwords

3.escalating privileges

4.covering tracks

Posted Date:-2022-07-18 02:25:44


Question:
What port does Telnet use?

1.22

2.80

3.20

4.23

Posted Date:-2022-07-17 23:25:01


Question:
When assessing the reliability of digital evidence, the investigator is concerned with whether the computer that generated the evidence was functioning normally, and:

1.whether chain of custody was maintained

2.whether there are indications that the actual digital evidence was tampered with

3. whether the evidence was properly secured in transit

4.whether the evidence media was compatible with forensic machines

Posted Date:-2022-07-18 03:31:15


Question:
Which is true of a signature-based IDS?

1.it cannot work with an ips

2.it only identifies on known signatures

3. it detects never-before-seen anomalies

4.it works best in large enterprises.

Posted Date:-2022-07-18 02:47:54


Question:
Why would a hacker use a proxy server?

1. to create a stronger connection with the target.

2. to create a ghost server on the network.

3. to obtain a remote access connection

4.to hide malicious activity on the network.

Posted Date:-2022-07-18 02:20:53


Question:
Why would HTTP Tunneling be used?

1.to identify proxy servers

2.web activity is not scanned

3. to bypass a firewall

4.http is a easy protocol to work with

Posted Date:-2022-07-18 02:40:51


More MCQS

  1. MCQ Questions from Computer Hardware Concept
  2. Computer Communication and Networking MCQS Quiz
  3. Computer Hardware Quiz Set 1
  4. Computer Hardware Quiz Set 2
  5. Computer Hardware Quiz Set 3
  6. Computer Hardware Quiz Set 4
  7. Computer Hardware Quiz Set 5
  8. Computer Hardware Quiz Set 6
  9. Computer Hardware Quiz Set 7
  10. Computer Hardware Quiz Set 8
  11. Computer Hardware Multiple Choice Questions(MCQs) and Answers
  12. Graphics Hardware and Display devices Input Devices
  13. Computer Hardware MCQ GK Questions Set 1
  14. Computer Hardware MCQ GK Questions Set 2
  15. Computer Hardware Multiple Choice Questions
  16. CDMA Multiple Choice Questions
  17. Network Security Multiple Choice questions
  18. Opengl Multiple Choice Questions
  19. Opengl Multiple Choice Questions.
  20. Web Development Multiple-choice Questions
  21. WiFi Multiple Choice Questions
  22. 4G Multiple Choice Question
  23. NETWORK MODELS MCQ
  24. INTERNET AND PROTOCOLS MCQ SET 1
  25. INTERNET AND PROTOCOLS MCQ SET 2
  26. INTERNET AND PROTOCOLS MCQ SET 3
  27. INTERNET AND PROTOCOLS MCQ SET 4
  28. INTERNET AND PROTOCOLS MCQ SET 5
  29. NETWORKING /PHYSICAL LAYER SET 1
  30. NETWORKING /PHYSICAL LAYER SET 2
  31. NETWORKING /PHYSICAL LAYER SET 3
  32. NETWORKING /PHYSICAL LAYER SET 4
  33. Information and Network Security Set 1
  34. Information and Network Security Set 2
  35. Information Cyber Security (ICS) MCQs Set 1
  36. Information Cyber Security (ICS) MCQs Set 2
  37. Information Cyber Security (ICS) MCQs Set 3
  38. Information Cyber Security (ICS) MCQs Set 4
  39. Information Cyber Security (ICS) MCQs Set 5
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!