Q1. What Is Digital Forensics? A. the Use of Computers to Solve Crimes B. the Examination

Total Page:16

File Type:pdf, Size:1020Kb

Q1. What Is Digital Forensics? A. the Use of Computers to Solve Crimes B. the Examination

INSS 300 Quiz 6

Q1. What is digital forensics? a. The use of computers to solve crimes b. The examination of electronic evidence c. The analysis of communication patterns on the internet d. The analysis of current crime patterns to understand crime in contemporary life Answer b

Q2. What is the difference between a computer virus and a worm? a. A worm is a type of virus that replicates and spreads itself throughout computer systems b. The goal of a virus is to replicate; a worm weaves in and out of systems like a snake c. Viruses target systems and application software; worms target computer files d. The terms virus and worms can be used interchangeably; there is no difference Answer a

Q3. What program records every keystroke and mouse click executed on a computer? a. Keyboard recorder b. Trojan horse c. Virus d.. Key logger

Answer d

Q4. What is identity theft? a. When a person losses that sense of self because of their heightened activities on the Web b. When a person, or group of people, take on another person's identify and then send email and other online communications under the fraudulent name c. When one person changes their features and dress to resemble another person d. When a person, or group of people, forge someone's identity for the purpose of fraud

Answer d

Q5. Who are computer security professionals who are hired by a company to break into its computer system? a. Hacker b. Thrill-seeker hacker c White-hat hacker d. Black-hat hacker Answer c

Q6. Who are cyber vandals? a. Crackers b. Thrill-seeker hackers c. White-hat hackers d. Black-hat hackers

Answer d

Q7. Can you recover a deleted computer file? a. Not unless you're in the "safe mode" b. No c. Yes, but only immediately after it has been deleted d. Yes, you can get it out of the recycling bin

Answer d

Q8. What is unsolicited email from businesses that advertise goods and services? a. Computer viruses b Spam c. Cookies d. Sneakware

Answer b

Q9. Why is a live analysis needed in digital forensics? a. To examine the information stored in RAM b. To search and detect internet predators c. To identify potential threats to computer resources d. To capture criminals in the act of a crime

Answer a

Q 10. What biometric device can store medical information about you and help state agencies find you if you get lost or are considered missing? a. Implant chip b. Biochip c. Nanochip d. Nanobots answer a

Q 11. If you were working in your kitchen and wanted to send information from the laptop computer that you were currently working on to your desktop computer located in the study, what wireless device would you need? a. RFID b. Bluetooth c. WiFi or Bluetooth d. Microwave answer c

Q12. If you were disposing of your computer along with its hard drive, what should you do beforehand to ensure that someone does not access and use your personal information? a. Make sure you've copied the application software b. Backup the documents stored in the My Documents folder c. Delete your files from My Documents, Temporary Internet folders, and Systems Preferences d. Delete personal files, defrag your computer, and run a disk cleanup

Answer d

Q13.. What happens when you delete a computer file? a. The file is erased from the appropriate disk drive and the space allocated to new files b It's name is removed from the disk's directory c. It is moved to the recycling bin d. The file is marked for deletion, moved to the recycling bin, and then erased from its original space.

Answer c

Q 14. Which phase of digital forensics requires careful handling of evidence to maintain authenticity? a. Collection phase b. Design phase c. Reporting phase d. Development phase answer a

Q 15. Which of the following is not used as a biometric device? a. eyes b. fingerprints c. facial features d. userid/password

Answer d

Q 16. Johnny was hired by company X to flood competitor’s website with thousands of requests. This would be an example of a. DDos b. Dos c. Bos d. all of the above answer b

Q17. How can you block a business' attempt to store information about your Web activities? a. Avoid the Internet and purchasing products and services on it b. Block cookies c. Install and use SpamWare d. Install and use SpyWare and SpamWare

Answer b

Q18. What is the empty space called that is left unused at the end of a file? a. Vacant space b. Slack space c. Spare room d. Breathing gap

Answer b

Q19.Which of the following is not a part of the e-mail privacy policy stipulations? A) It defines who legitimate e-mail users are B) It explains the backup procedures C) It describes the legitimate grounds for reading someone's e-mail D) It informs people that the organization has full control over e-mail once it is transmitted outside the organization Answer d

Q20. In a disk during digital forensic analysis phase where can you find hidden information? a. deleted files b. slack space c. post it d. all of the above answer d

Q21. Data transmission over networks must be encrypted due to ______programs that can steal password a. Trojan horse b. spyware c. sniffer d. adware answer c

Q22. Digital forensic analysis is closely comparable to a. Doctor’ work b. Detective’s work c. Car salesperson’s work d. Professor’s work answer b

Q23. Sammy, Johnny, Myra and ten other colleagues are sending (from all over the world) multiple requests to AT&T site. These requests flooded the website and brought it down. They are involved in ______attack a. DDos b. Dos c. Bos d. all of the above answer a

Q24. During authentication of evidence why is it necessary to make exact duplicate to time stamped data? a. so that we can resell the computer b. so that it can be erased c. so that it be acceptable as evidence d. so that it can be altered as needed answer c Q 25. Chiller451 was chatting online with 3L3tCowboy. “I can’t believe how lame some people are! :) I can get into any system by cracking the company’s code and destroy their files. Chiller451 is a ______

a) Phreaker b) hacker c) spammer d) streaker answer b

Recommended publications