Cyber Crime and Forensic Science Quiz Crafted By-
Ankit Tripathi
Introduction to Cyber Crime and Forensic Science
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about digital information. Although it is most often associated with the investigation of a wide variety of computer crimes, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail. Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted.
Let's look at the questions and their answers.
Ques 1. Which of the following is threats for electronic payment system?
a) Computer worms
b) Trojan Horse
c) Computer Virus
d) All of the above
Answer- a) Computer worms
Ques 2. To protect your computer from hacker, you should turn on
a) Accounts
b) Ease of Access
c) Firewall
d) Personalization
Answer- c) Firewall
Ques 3. Which scams are attempts by individual to obtain confidential information from you to falsifying their identity
a) Spyware Scams
b) Phishing Scams
c) Trojan scams
d) Computer virus
Answer- b) Phishing Scams
Ques 4. Which of the following is not come under cyber-crime?
a) Forgery
b) Damage of data
c) Damage of system
d) Installing antivirus for protection
Answer-d) Installing antivirus for protection
Ques 5. Which of the following is an example of a computer as weapon cyber-crime?
a) Leakage of credit card
b) IPR Violation
c) Pornography
d) All of the above
Answer- d) All of the above
Ques 6. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT act holds?
a) Stealing hardware components
b) Stealing data from the computer
c) Cracking of illegally hack into any system
d) Putting virus into the victim
Answer- b) Stealing data from the computer
Ques 7. What are the main causes of cyber-crime?
a) Complex Coading
b) Easy Access System
c) Storing data in small space
d) All of the above
Answer- d) All of the above
Ques 8. Use of electronic messaging systems to send unsolicited bulk messages are called
a) Spamming
b) Phishing
c) Cyber Stalking
d) Email Bombing
Answer- a) Spamming
Ques 9. What term is used for the hide information inside a picture?
a) Bitmapping
b) Rootkits
c) Cryptography
d) Steganography
Answer- d) Steganography
Ques 10. Hacking is an example of
a) Computer-assisted crime
b) Computer-related crime
c) Computer integrity crime
d) Computer malfeasance crime
Answer- c) Computer integrity crime