Learn Forensic Logo
CERTIFICATE
  • Home
  • Institute
    • Vision & Mission
    • Achievements
    • Our Associates
    • Our Faculty
    • Our Presence
    • Learning Presence
    • Student Speaks
    • Career
    • Blogs
  • Courses
    • Associate Degree Program
    • Foundation Courses
    • Value Added Courses
    • Professional Courses
    • Classroom Courses
  • Internship
    • Lab Based Internship
    • Online Internship
  • Training
    • Corporate Training
    • Onsite Training
    • Hands on Training
    • Online Training
  • Admission
    • Upload Documents
    • Terms & Conditions
  • Events
    • Forensic Events
    • Quiz Zone
    • Work Gallery
    • Visual Gallery
  • Reach Us
  • Home
  • Blog Details
  • Forensic Science
  • Crime Scene Investigation
  • Criminology & Victimology
  • Cyber Forensics
  • Cyber Security & Law
  • DNA Fingerprinting
  • Document Examination
  • Fingerprint Analysis
  • Forensic Accounting
  • Forensic Anthropology
  • Forensic Ballistics
  • Forensic Biology
  • Forensic Biometrics
  • Forensic Drugs Analysis
  • Forensic Engineering
  • Forensic Entomology
  • Forensic Medicine & Toxicology
  • Forensic Odontology
  • Forensic Photography
  • Forensic Psychology
  • Insurance Investigation
  • Private Investigation
  • Wildlife Forensics

Computer Crime

March 09, 2024 BY Akhil B. Parippallil

Computer Crime Quiz Crafted By-

Akhil B. Parippallil


Introduction to Computer Crime 

cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.


Let's look at the questions and their answers. 


Ques 1. Most of the chat and instant message conversations are stored in computer in

a) Hard disk

b) RAM

c) Wintex

d) Slack space

Answer-b) RAM


Ques 2. Which of the following program is run to examine network traffic

a) Net dump                                                      

b) TICP dump

c) Slack dump                                                        

d) Core dump

Answer- b) TICP dump


Ques 3. Data can be retrieved from a mobile device using which software

a) Q-Pass Analyzer                                                      

b) Pass- Analyzer forensic

c) Oxygen forensic suite                                                        

d) Doc- center forensic

Answer- c) Oxygen forensic suite


Ques 4. Which of the following types of images store graphic information in a grid of individual pixels?

 a) Vector

b) Raster

c) Bitmaps

d) Metafiles

Answer-b) Raster


Ques 5. The famous computer program which provides cryptographic privacy and authentication for data communication, based in public-key encryption algorithm is: 

a)  PGP                                                     

b) TGEP

c)  GPP                                                       

d) CGE

Answer- a) PGP


Ques 6. An Android device’s encrypted data can be wiped remotely using:

a) Find my phone service                                                      

b) Google Sync

c)  iCloud                                                       

d) Search My Sync

Answer- b) Google Sync


Ques 7. How many phases are present in “Enhanced Integrated Digital Investigation Process” Model invented by Baryamureeba and Tushabe in 2004?

a) 5                                                      

b) 1

c) 9                                                        

d) 7

Answer-a) 5


Ques 8. Assertion (A): Digital image technology is a powerful tool for recording the crime scene.

Reason (R): Digital imaging allows real time access to the crime scene even one is away from the scene. 

a) (A) is correct, but (R) is wrong                                                      

b) Both (A) and (R) are correct

c) (A) is incorrect, but (R) is correct                                                        

d) (A) & (R) both are wrong

Answer- b) Both (A) and (R) are correct.


Ques 9. Which of the following techniques are used during computer forensics investigation?

a) Cross-drive analysis                                                      

b) Live analysis

c) Deleted files                                                        

d) All of the above

Answer- d) All of the above


Ques 10. You are supposed to maintain three types of records. Which answer is not a record?

a) Chain of custody                                                      

b) Documentation of the crime scene

c)  Searching the crime scene                                                       

d) Document your actions

Answer- c) Searching the crime scene


Share on

Verify Certificate

Do you have a valid certificate?

Logo

A-14, Mahendru Enclave
Model Town, Delhi-110033
Telephone: 011- 47074263
Mobile:+91-7303913002
E-mail: info@sifs.in

TRAINING & INTERNSHIP
  • Lab Based Internship
  • Online Internship
  • Hands on Training
  • Online Training
FORENSIC COURSES
  • Associate Degree Program
  • Foundation Courses
  • Professional Courses
  • Value Added Courses
USEFUL LINKS
    Privacy Policy
  • Refund Policy
  • Terms & Conditions
  • Disclaimer
Modal title