Computer Forensics MCQ Questions And Answers
Computer Forensics MCQs : This section focuses on "Computer Forensics" in Cyber Security. These Multiple Choice Questions (MCQ) should be practiced to improve the Cyber Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
1. Computer forensics also known as?
A. digital forensic science
B. computer crime
C. computer forensic science
D. computer forensics investigations
View Answer
Ans : C
Explanation: Computer forensics also known as computer forensic science
2. Which method uses stochastic properties of the computer system to investigate activities lacking digital artifacts?
A. Steganography
B. Stochastic forensics
C. Both A and B
D. None of the above
View Answer
Ans : B
Explanation: A method which usesĀ stochasticĀ properties of the computer system to investigate activities lacking digital artifacts. Its chief use is to investigateĀ data theft.
3. computer forensics also be used in civil proceedings.
A. Yes
B. No
C. Can be yes or no
D. Can not say
View Answer
Ans : A
Explanation: Yes, computer forensics may also be used in civil proceedings.
4. Which of the following techniques are used during computer forensics investigations?
A. Cross-drive analysis
B. Live analysis
C. Deleted files
D. All of the above
View Answer
Ans : D
Explanation: All of the above are techniques are used during computer forensics investigations.
5. CCFP stands for?
A. Cyber Certified Forensics Professional
B. Certified Cyber Forensics Professional
C. Certified Cyber Forensics Program
D. Certified Cyber Forensics Product
View Answer
Ans : B
Explanation: CCFP : Certified Cyber Forensics Professional
6. How many c's in computer forensics?
A. 1
B. 2
C. 3
D. 4
View Answer
Ans : C
Explanation: There are three c's in computer forensics : confidence. credibility. Cost
7. You are suppose to maintain three types of records. Which answer is not a record?
A. Chain of custody
B. Documentation of the crime scene
C. Searching the crime scene
D. Document your actions
View Answer
Ans : C
Explanation: You are suppose to maintain three types of records. Searching the crime scene is not a record
8. Physical Forensics Discipline include which of the following?
A. Bloodstain
B. Eating
C. Searching
D. Watching
View Answer
Ans : A
Explanation: Physical Forensics Discipline include Bloodstain.
9. Volatile data resides in ?
A. registries
B. cache
C. RAM
D. All of the above
View Answer
Ans : D
Explanation: Volatile data resides in registries, cache, and random access memory (RAM). The investigation of this volatile data is called live forensics.
10. Deleted files is a common technique used in computer forensics is the recovery of deleted files.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A
Explanation: True, Deleted files is a common technique used in computer forensics is the recovery of deleted files.
Discussion