

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Animation SY (BSC [animation]) , Bachelor of Science in Animation (BSc animation) .
51. |
In crimes against individuals the ______ period leading up to the crime often contains the most important clues regarding the relationship between the offender and the victim. |
A. | 24-hour |
B. | 28-hour |
C. | 60-minute |
D. | 15-minute |
Answer» A. 24-hour |
52. |
The type of report that is a preliminary summary of findings is known as: |
A. | sitrep |
B. | threshold assessment report |
C. | full investigative report |
D. | field notes |
Answer» B. threshold assessment report |
53. |
Creating a histogram of times to reveal periods of high activity is an example of which form of investigative reconstruction? |
A. | functional |
B. | intentional |
C. | relational |
D. | temporal |
Answer» D. temporal |
54. |
Investigators should not rely on one piece of digital evidence when examining an alibi – they should look for an associated _______. |
A. | cybertrail |
B. | piece of physical evidence |
C. | statement |
D. | none of the above |
Answer» A. cybertrail |
55. |
It is quite difficult to fabricate an alibi on a network successfully because: |
A. | an offender may not have the proper access. |
B. | an offender would need system administrator access level to make the necessary changes. |
C. | an individual rarely has the ability to falsify digital evidence on all the computers that are involved. |
D. | creating an alibi on a network could take months of work. |
Answer» C. an individual rarely has the ability to falsify digital evidence on all the computers that are involved. |
56. |
Types of digital evidence that might corroborate an alibi include: |
A. | evidence of computer usage when the offense was supposed to occurred |
B. | computer records from credit cards, the telephone company, or subway ticket usage |
C. | gps information from mobile devices indicating the user’s location and time |
D. | all of the above |
Answer» D. all of the above |
57. |
To demonstrate that someone is lying about an alibi, it is necessary to: |
A. | find evidence that clearly demonstrates the lie |
B. | require the suspect to submit to a polygraph |
C. | interrogate the suspect using a number of methods |
D. | show that no evidence confirming the alibi is available |
Answer» A. find evidence that clearly demonstrates the lie |
58. |
In confirming an alibi involving an obscure piece of equipment, if no documentation is available, the manufacturer is no longer in business, or the equipment/network is so complicated that nobody fully understands how it works, you should: |
A. | state that the alibi is considered unproven |
B. | search the internet for any pertinent information |
C. | recreate the events surrounding the alibi |
D. | contact other investigators and average their opinions |
Answer» C. recreate the events surrounding the alibi |
59. |
Absence of evidence refutes an alibi. |
A. | true |
B. | false |
Answer» B. false |
60. |
An implication from studies indicating that many stalkers had prior acquaintance with their victims is that: |
A. | part of the blame can be assigned to the victim. |
B. | the offender is likely to be found in the same area as the victim |
C. | investigators should pay particular attention to acquaintances of the victim |
D. | investigators should always check the immediate family |
Answer» C. investigators should pay particular attention to acquaintances of the victim |
61. |
When a cyberstalking case is stalled, it is a good idea to interview the victim again, because: |
A. | the victim might have been withholding information during the first interview. |
B. | the information that investigators have gathered might help the victim recall additional details. |
C. | the time between the first and second interviews has given the victim time to seek counseling. |
D. | none of the above |
Answer» B. the information that investigators have gathered might help the victim recall additional details. |
62. |
That part of cyberstalking where the offender is using the Internet to find a victim is known as: |
A. | profiling |
B. | trolling |
C. | surreptitious monitoring |
D. | none of the above. |
Answer» C. surreptitious monitoring |
63. |
The _____________ documentation specifies who handled the evidence, when, where, and for what purpose. |
A. | evidence inventory |
B. | . chain of custody |
C. | evidence intake |
D. | preservation notes |
Answer» B. . chain of custody |
64. |
When you have developed a theory, what can you do to confirm that your hypothesis is correct? |
A. | predict, based on your hypothesis, where artifacts should be located |
B. | perform experiments to test results and rule out alternate explanations |
C. | conclude, based on your findings, whether the evidence supports the hypothesis |
D. | all of the above |
Answer» D. all of the above |
65. |
Of particular significance in the scientific method is the weight attached to finding evidence which supports a particular hypothesis |
A. | true |
B. | false |
Answer» A. true |
66. |
When reconstructing evidence surrounding a violent crime, it is generally helpful to: |
A. | lay out all the evidence so it can be viewed in its entirety |
B. | work with the crime scene technicians so that a better understanding of the crime is achieved |
C. | construct a timeline of events from digital evidence |
D. | begin the process of converting field notes to a final report |
Answer» C. construct a timeline of events from digital evidence |
67. |
Computers and mobile devices are treated as _________ crime scenes in violent crime investigations. |
A. | temporary |
B. | immediate |
C. | remote |
D. | secondary |
Answer» D. secondary |
68. |
Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence. |
A. | true |
B. | false |
Answer» A. true |
69. |
In the course of conducting forensic analysis, which of the following actions are carried out? |
A. | critical thinking |
B. | fusion |
C. | validation |
D. | all of the above |
Answer» D. all of the above |
70. |
Security Measures Needed to protect ________ during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» B. data |
71. |
__________ means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» C. information |
72. |
Prevention of the unauthorised used of Resources refers too? |
A. | data integrity |
B. | data confidentiality |
C. | acess control |
D. | none of these |
Answer» C. acess control |
73. |
Protection against Denial by one of these parties in a communication refers to? |
A. | non-repudiation |
B. | data integrity |
C. | authentication |
D. | none of these |
Answer» A. non-repudiation |
74. |
Which One of them is Passive attack? |
A. | denial of service |
B. | modify message in transit |
C. | replay previous message |
D. | obtain message contain |
Answer» D. obtain message contain |
75. |
What is lying of IP address called as? |
A. | ip spoofing |
B. | ip scamming |
C. | ip lying |
D. | none of theses |
Answer» A. ip spoofing |
76. |
What is full form of DDoS? |
A. | derived denial of service |
B. | distributed denial of service |
C. | denial of service |
D. | none of these |
Answer» B. distributed denial of service |
77. |
A hacker guessing suggested password to a program is call as? |
A. | password guessing |
B. | dictionary attack |
C. | default password attack |
D. | none of these |
Answer» C. default password attack |
78. |
Symmetric key encryption is also called as? |
A. | public key encryption |
B. | private key encryption |
C. | both of these |
D. | none of these |
Answer» B. private key encryption |
79. |
Conversion of Cypher text to plain text? |
A. | encryption |
B. | decryption |
C. | simple text |
D. | none of these |
Answer» B. decryption |
80. |
__is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» A. program policy |
81. |
An act of protecting information from unauthorised disclouser to an entity.- |
A. | intergrity |
B. | avability |
C. | confidentiality |
D. | none of these |
Answer» C. confidentiality |
82. |
A way to ensure that the entity is indeed what it claims to be.- |
A. | authentication |
B. | accountability |
C. | identification |
D. | security |
Answer» A. authentication |
83. |
The__model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» B. osi |
84. |
The full form of OSI is OSI model__. |
A. | open systems interconnection |
B. | open software interconnection |
C. | open connection |
D. | open system internet |
Answer» A. open systems interconnection |
85. |
The technique in which when one character is replaced by another Character is called as? |
A. | transposition |
B. | substitution |
C. | combinational |
D. | none of these |
Answer» B. substitution |
86. |
Conversion of plain text into Cipher text is called as________. |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» A. encryption |
87. |
In Symmetric schemes requires both parties to share how many secret key? |
A. | one |
B. | two |
C. | three |
D. | four |
Answer» A. one |
88. |
Blum Blum Shub Generator is based on which Algorithm? |
A. | private key |
B. | public key |
C. | both a & b |
D. | none of these |
Answer» B. public key |
89. |
In DES step both LPT and RPT undergoes in how much key Rounds? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» B. 16 |
90. |
What is the 4th step in DES Algorithm? |
A. | key transformation |
B. | s-box substitution |
C. | p-box permutation |
D. | expansion permutation |
Answer» C. p-box permutation |
91. |
In AES in which Round Subkeys are Generated from Original key for each round? |
A. | key expansion |
B. | initial round |
C. | finale round |
D. | none of these |
Answer» A. key expansion |
92. |
AES stands for ? |
A. | authorized encryption standard |
B. | advance encryption standard |
C. | advance encryption strategy |
D. | none of these |
Answer» B. advance encryption standard |
93. |
Which of them is type of Cipher? |
A. | stream cipher |
B. | block cipher |
C. | both of them |
D. | none of these |
Answer» C. both of them |
94. |
The message which is not understandable is called as? |
A. | cipher text |
B. | plain text |
C. | hidden text |
D. | both a & c |
Answer» A. cipher text |
95. |
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction. |
A. | network security |
B. | database security |
C. | information security |
D. | physical security |
Answer» C. information security |
96. |
_______ platforms are used for safety and protection of information in the cloud. |
A. | cloud workload protection platforms |
B. | cloud security protocols |
C. | aws |
D. | one drive |
Answer» A. cloud workload protection platforms |
97. |
Compromising confidential information comes under _________ |
A. | bug |
B. | threat |
C. | vulnerability |
D. | attack |
Answer» B. threat |
98. |
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ |
A. | cyber-crime |
B. | cyber attack |
C. | system hijacking |
D. | digital crime |
Answer» B. cyber attack |
99. |
The CIA triad is often represented by which of the following? |
A. | triangle |
B. | diagonal |
C. | ellipse |
D. | circle |
Answer» A. triangle |
100. |
Related to information security, confidentiality is the opposite of which of the following? |
A. | closure |
B. | disclosure |
C. | disaster |
D. | disposal |
Answer» B. disclosure |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.