1.
What Term usually describes a person who gains access to computer system illegally?
Correct Answer
A. Hacker
Explanation
The term "hacker" usually describes a person who gains unauthorized access to a computer system. Hackers use their technical skills to exploit vulnerabilities in computer systems and networks, often with malicious intent. They may steal sensitive information, disrupt services, or cause other types of harm. While the other options listed (phisher, con artist, fraudster) may also engage in illegal activities, "hacker" specifically refers to someone who gains unauthorized access to computer systems.
2.
What term refers to uncovering computer-stored information suitable for use as evidence in courts of law.
Correct Answer
C. Computer Forensics
Explanation
Computer forensics refers to the process of uncovering computer-stored information that can be used as evidence in courts of law. It involves the collection, analysis, and preservation of digital evidence to investigate and prevent computer-related crimes. This field combines elements of computer science and law enforcement to identify, recover, and analyze data from digital devices such as computers, smartphones, and storage media. Computer forensics plays a crucial role in modern legal proceedings, helping to uncover and present digital evidence in a forensically sound manner.
3.
A ___________ attack occurs when hackers bombard a site with more request for service than it can possibly handle,preventing legitimate users from accessing the site.
Correct Answer
C. Denial of service
Explanation
A denial of service attack occurs when hackers overwhelm a website with an excessive number of service requests, causing it to become unavailable to legitimate users. This is typically achieved by using multiple compromised devices to flood the site's server with traffic, leading to a service overload. The intention behind this attack is to disrupt the normal functioning of the targeted website and prevent users from accessing its services.
4.
Illegal interception,illegal access, data interference, and system interference are all apart of cybercrime.
Correct Answer
A. True
Explanation
The given statement is true because illegal interception, illegal access, data interference, and system interference are all types of cybercrime. Cybercrime refers to any criminal activity that is carried out using computers or the internet, and these actions are specifically categorized as cybercrimes. Illegal interception refers to the unauthorized interception of data or communications, illegal access refers to unauthorized access to computer systems or networks, data interference refers to unauthorized modification or deletion of data, and system interference refers to unauthorized disruption or manipulation of computer systems. Therefore, all these actions fall under the umbrella of cybercrime.
5.
Continuous online sexual harrasment by a male to female,comes under which category of cyber crime.
Correct Answer
D. Cyber Stalking
Explanation
Continuous online sexual harassment by a male to female falls under the category of cyber stalking. Cyber stalking refers to the persistent and unwanted pursuit or harassment of an individual using electronic communication, such as emails, messages, or social media platforms. In this case, the male's behavior of continuously harassing the female online qualifies as cyber stalking as it involves unwanted and persistent actions that cause distress and invade the female's privacy.
6.
192.169.23.56 can be used to access Internet.
Correct Answer
A. True
Explanation
The given statement is true because 192.169.23.56 is an IP address, and IP addresses are used to access the Internet. IP addresses are numerical labels assigned to devices connected to a computer network, and they serve as the address for sending and receiving data over the Internet. Therefore, 192.169.23.56 can be used to access the Internet.
7.
Smallest unit of storage on the Hard Disk is called as..
Correct Answer
B. Sector
Explanation
The smallest unit of storage on a Hard Disk is called a sector. A sector is a subdivision of a track on the disk and represents the minimum amount of data that can be read or written at a time. It typically consists of a fixed number of bytes, such as 512 bytes. Sectors are organized into tracks, and multiple tracks form a cluster. The sector size is important for disk formatting, file systems, and data storage efficiency.
8.
You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company.What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?
Correct Answer
A. Trademark Law
Explanation
The employee is violating Trademark Law. This is because the employee is using a graphic symbol that is similar to the company's trademark, with only the wording in the graphic being different. Trademark law protects against the unauthorized use of similar marks that may cause confusion among consumers. In this case, the employee's use of the similar graphic symbol could potentially create confusion in the marketplace and dilute the company's trademark rights.
9.
Minimum how many copies we should make of "Single source evidence hard disk" for Forensics analysis purpose..
Correct Answer
B. B..2
Explanation
To ensure the integrity and preservation of the original evidence, it is recommended to make at least two copies of the "Single source evidence hard disk" for forensic analysis purposes. Having multiple copies allows for redundancy and ensures that in case of any issues or errors during the analysis process, there are backup copies available. This also allows different forensic investigators to work on separate copies simultaneously, reducing the risk of accidental alteration or damage to the original evidence.
10.
Integrity of the original evidence can be violated in the interest of investigation of the case.
Correct Answer
B. False
Explanation
The statement is false because the integrity of the original evidence should never be violated in the interest of investigating a case. Maintaining the integrity of evidence is crucial to ensure fairness and accuracy in the legal process. Any tampering or violation of the original evidence can compromise its reliability and potentially lead to wrongful convictions or the dismissal of a case. Therefore, it is important to handle and preserve evidence carefully to maintain its integrity throughout the investigation.
11.
1 sector consists of ..bytes
Correct Answer
C. 512
Explanation
In computer memory, a sector is a fixed-size unit of storage typically consisting of 512 bytes. This means that each sector can hold 512 bytes of data. Therefore, the correct answer is 512.
12.
1 cluster is equivalent to how many sectors?
Correct Answer
D. 4
Explanation
In computer storage, a cluster is a unit of allocation on a disk. It is the smallest addressable unit of disk space that can be allocated to hold a file. Sectors, on the other hand, are the smallest units of storage on a disk. A sector typically contains 512 bytes of data. Since a cluster is made up of multiple sectors, the correct answer is 4.
13.
In order to find out private IP address of your computer,which of the following command will you use?
Correct Answer
C. Ipconfig /all
Explanation
The correct answer is ipconfig /all. This command is used to display the complete configuration information of all network interfaces on a computer, including the private IP address. The /all flag ensures that all details are shown, providing a comprehensive view of the network settings.
14.
In order to find out Public IP address of your computer, following website can be use?
Correct Answer
A. Www.whatismyip.com
Explanation
www.whatismyip.com is the correct website to find out the Public IP address of your computer. This website provides a simple and straightforward method to display your Public IP address. By accessing this website, it will automatically detect and display your Public IP address on the webpage, allowing you to easily identify it.
15.
Webhosting means.....
Correct Answer
B. Uploading your website on the internet
Explanation
Webhosting refers to the process of uploading your website on the internet. It involves storing and serving the files and data of a website on a server, making it accessible to users on the internet. This allows individuals and businesses to make their websites accessible to others by providing them with a unique domain name and hosting their website's files on a server that is connected to the internet.
16.
Webhosting and Domain name registration are one and the same thing
Correct Answer
B. False
Explanation
Webhosting and domain name registration are not the same thing. Webhosting refers to the service of storing and maintaining website files on a server, allowing the website to be accessible on the internet. On the other hand, domain name registration is the process of acquiring a unique website address (URL) for a specific period of time. While they are related and often offered together by web hosting companies, they are distinct services with different functions.
17.
Wayback machine is used for
Correct Answer
B. To see snapshots of a website taken previously
Explanation
The Wayback machine is a tool used to see snapshots of a website taken previously. It allows users to access archived versions of websites, allowing them to view how a website looked and functioned in the past. This can be useful for historical research, tracking website changes, or accessing information that may no longer be available on the current version of the website. The Wayback machine does not involve taking backups of databases, going back in time, or cloning email boxes.
18.
Grabify can be used to find out IP address of a website.
Correct Answer
B. False
Explanation
Grabify is a tool that allows users to create shortened URLs and track the IP address of anyone who clicks on those links. It does not provide the IP address of a website itself. Therefore, the statement that Grabify can be used to find out the IP address of a website is false.
19.
Rooting of Mobile phone means..
Correct Answer
B. Obtaining administrative access of mobile pHone
Explanation
Rooting of a mobile phone refers to the process of obtaining administrative access or privileges on the device. This allows the user to have complete control over the operating system and make changes that are normally restricted. Rooting enables users to install custom ROMs, remove pre-installed apps, and perform various other modifications that are not possible on a non-rooted device. It essentially grants the user full control and access to the device's system files and settings.
20.
Section 65(B) is in respect of admissibility of electronic evidence is apart of
Correct Answer
C. Indian Evidence act
Explanation
Section 65(B) of the Indian Evidence Act is related to the admissibility of electronic evidence. This section provides guidelines for the admissibility of electronic records as evidence in court proceedings. It specifies the conditions under which electronic evidence can be admitted, such as ensuring the authenticity and integrity of the electronic record. Therefore, the correct answer is Indian Evidence Act.
21.
The power of investigations of offences under Information Technology Act are given to
Correct Answer
C. Officers of and above the rank of Police Inspector
Explanation
The correct answer is "Officers of and above the rank of Police Inspector." According to the given options, the power of investigations of offences under the Information Technology Act are given to officers of and above the rank of Police Inspector. This means that only Police Inspectors and higher-ranking officers have the authority to conduct investigations related to offences under the Information Technology Act.
22.
In order to find out IP address details of a computer located in India,you will use following website...
Correct Answer
A. Www.apnic.net
Explanation
The website www.apnic.net is the correct answer because APNIC (Asia-Pacific Network Information Centre) is the regional internet registry responsible for allocating and managing IP addresses in the Asia-Pacific region, which includes India. Therefore, by visiting the APNIC website, one can find the IP address details of a computer located in India. The other websites mentioned (www.arin.net, www.lacnic.net, www.ripe.net) are regional internet registries for other parts of the world and may not provide accurate information for a computer in India.