Cyber-I Cyber Crime Investigation Quiz 1.March 2017

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cyberi_MPA
C
Cyberi_MPA
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,379
Questions: 25 | Attempts: 2,379

SettingsSettingsSettings
Cyber-I Cyber Crime Investigation Quiz 1.March 2017 - Quiz


Questions and Answers
  • 1. 

    What Term usually describes a person who gains access to computer system illegally?

    • A.

      Hacker

    • B.

      Phisher

    • C.

      Con artist

    • D.

      Fraudster

    Correct Answer
    A. Hacker
    Explanation
    The term "hacker" usually describes a person who gains unauthorized access to a computer system. Hackers use their technical skills to exploit vulnerabilities in computer systems and networks, often with malicious intent. They may steal sensitive information, disrupt services, or cause other types of harm. While the other options listed (phisher, con artist, fraudster) may also engage in illegal activities, "hacker" specifically refers to someone who gains unauthorized access to computer systems.

    Rate this question:

  • 2. 

    What term refers to uncovering computer-stored information suitable for use as evidence in courts of law.

    • A.

      Computer Investigation

    • B.

      Computer Detection

    • C.

      Computer Forensics

    • D.

      Computer Probing

    Correct Answer
    C. Computer Forensics
    Explanation
    Computer forensics refers to the process of uncovering computer-stored information that can be used as evidence in courts of law. It involves the collection, analysis, and preservation of digital evidence to investigate and prevent computer-related crimes. This field combines elements of computer science and law enforcement to identify, recover, and analyze data from digital devices such as computers, smartphones, and storage media. Computer forensics plays a crucial role in modern legal proceedings, helping to uncover and present digital evidence in a forensically sound manner.

    Rate this question:

  • 3. 

    A ___________ attack occurs when hackers bombard a site with more request for service than it can possibly handle,preventing legitimate users from accessing the site.

    • A.

      Digital Bomb

    • B.

      Service error

    • C.

      Denial of service

    • D.

      Computer

    Correct Answer
    C. Denial of service
    Explanation
    A denial of service attack occurs when hackers overwhelm a website with an excessive number of service requests, causing it to become unavailable to legitimate users. This is typically achieved by using multiple compromised devices to flood the site's server with traffic, leading to a service overload. The intention behind this attack is to disrupt the normal functioning of the targeted website and prevent users from accessing its services.

    Rate this question:

  • 4. 

    Illegal interception,illegal access, data interference, and system interference are all  apart of cybercrime.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true because illegal interception, illegal access, data interference, and system interference are all types of cybercrime. Cybercrime refers to any criminal activity that is carried out using computers or the internet, and these actions are specifically categorized as cybercrimes. Illegal interception refers to the unauthorized interception of data or communications, illegal access refers to unauthorized access to computer systems or networks, data interference refers to unauthorized modification or deletion of data, and system interference refers to unauthorized disruption or manipulation of computer systems. Therefore, all these actions fall under the umbrella of cybercrime.

    Rate this question:

  • 5. 

    Continuous online sexual harrasment by a male to female,comes under which category of cyber crime.

    • A.

      Cyber Harrasment

    • B.

      Cyber spoofing

    • C.

      Cyber Phising

    • D.

      Cyber Stalking

    Correct Answer
    D. Cyber Stalking
    Explanation
    Continuous online sexual harassment by a male to female falls under the category of cyber stalking. Cyber stalking refers to the persistent and unwanted pursuit or harassment of an individual using electronic communication, such as emails, messages, or social media platforms. In this case, the male's behavior of continuously harassing the female online qualifies as cyber stalking as it involves unwanted and persistent actions that cause distress and invade the female's privacy.

    Rate this question:

  • 6. 

    192.169.23.56 can be used to access Internet.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true because 192.169.23.56 is an IP address, and IP addresses are used to access the Internet. IP addresses are numerical labels assigned to devices connected to a computer network, and they serve as the address for sending and receiving data over the Internet. Therefore, 192.169.23.56 can be used to access the Internet.

    Rate this question:

  • 7. 

    Smallest unit of storage on the Hard Disk is called as..

    • A.

      Cluster

    • B.

      Sector

    • C.

      Track

    • D.

      Byte

    Correct Answer
    B. Sector
    Explanation
    The smallest unit of storage on a Hard Disk is called a sector. A sector is a subdivision of a track on the disk and represents the minimum amount of data that can be read or written at a time. It typically consists of a fixed number of bytes, such as 512 bytes. Sectors are organized into tracks, and multiple tracks form a cluster. The sector size is important for disk formatting, file systems, and data storage efficiency.

    Rate this question:

  • 8. 

    You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company.What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?

    • A.

      Trademark Law

    • B.

      Copyright Law

    • C.

      Printright Law

    • D.

      Brandmark Law

    Correct Answer
    A. Trademark Law
    Explanation
    The employee is violating Trademark Law. This is because the employee is using a graphic symbol that is similar to the company's trademark, with only the wording in the graphic being different. Trademark law protects against the unauthorized use of similar marks that may cause confusion among consumers. In this case, the employee's use of the similar graphic symbol could potentially create confusion in the marketplace and dilute the company's trademark rights.

    Rate this question:

  • 9. 

    Minimum how many copies we should make of "Single source evidence hard disk" for Forensics analysis purpose..

    • A.

      A. 1

    • B.

      B..2

    • C.

      C.NONE

    • D.

      D. 3

    Correct Answer
    B. B..2
    Explanation
    To ensure the integrity and preservation of the original evidence, it is recommended to make at least two copies of the "Single source evidence hard disk" for forensic analysis purposes. Having multiple copies allows for redundancy and ensures that in case of any issues or errors during the analysis process, there are backup copies available. This also allows different forensic investigators to work on separate copies simultaneously, reducing the risk of accidental alteration or damage to the original evidence.

    Rate this question:

  • 10. 

    Integrity of the original evidence can be violated in the interest of investigation of the case.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the integrity of the original evidence should never be violated in the interest of investigating a case. Maintaining the integrity of evidence is crucial to ensure fairness and accuracy in the legal process. Any tampering or violation of the original evidence can compromise its reliability and potentially lead to wrongful convictions or the dismissal of a case. Therefore, it is important to handle and preserve evidence carefully to maintain its integrity throughout the investigation.

    Rate this question:

  • 11. 

    1 sector consists of ..bytes

    • A.

      8

    • B.

      1024

    • C.

      512

    • D.

      2048

    Correct Answer
    C. 512
    Explanation
    In computer memory, a sector is a fixed-size unit of storage typically consisting of 512 bytes. This means that each sector can hold 512 bytes of data. Therefore, the correct answer is 512.

    Rate this question:

  • 12. 

    1 cluster is equivalent to how many sectors?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    D. 4
    Explanation
    In computer storage, a cluster is a unit of allocation on a disk. It is the smallest addressable unit of disk space that can be allocated to hold a file. Sectors, on the other hand, are the smallest units of storage on a disk. A sector typically contains 512 bytes of data. Since a cluster is made up of multiple sectors, the correct answer is 4.

    Rate this question:

  • 13. 

    In order to find out private IP address of your computer,which of the following command will you use?

    • A.

      Ipconfig

    • B.

      Tracert

    • C.

      Ipconfig /all

    • D.

      Ipconfig -all

    Correct Answer
    C. Ipconfig /all
    Explanation
    The correct answer is ipconfig /all. This command is used to display the complete configuration information of all network interfaces on a computer, including the private IP address. The /all flag ensures that all details are shown, providing a comprehensive view of the network settings.

    Rate this question:

  • 14. 

    In order to find out Public IP address of your computer, following website can be use?

    • A.

      Www.whatismyip.com

    • B.

      Www.getmyip.com

    • C.

      Www.tellmyip.com

    • D.

      Www.routerip.com

    Correct Answer
    A. Www.whatismyip.com
    Explanation
    www.whatismyip.com is the correct website to find out the Public IP address of your computer. This website provides a simple and straightforward method to display your Public IP address. By accessing this website, it will automatically detect and display your Public IP address on the webpage, allowing you to easily identify it.

    Rate this question:

  • 15. 

    Webhosting means.....

    • A.

      Creating domain name for your website

    • B.

      Uploading your website on the internet

    • C.

      Creating email id's for your website

    • D.

      Making alteration in your website

    Correct Answer
    B. Uploading your website on the internet
    Explanation
    Webhosting refers to the process of uploading your website on the internet. It involves storing and serving the files and data of a website on a server, making it accessible to users on the internet. This allows individuals and businesses to make their websites accessible to others by providing them with a unique domain name and hosting their website's files on a server that is connected to the internet.

    Rate this question:

  • 16. 

    Webhosting and Domain name registration are one and the same thing

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Webhosting and domain name registration are not the same thing. Webhosting refers to the service of storing and maintaining website files on a server, allowing the website to be accessible on the internet. On the other hand, domain name registration is the process of acquiring a unique website address (URL) for a specific period of time. While they are related and often offered together by web hosting companies, they are distinct services with different functions.

    Rate this question:

  • 17. 

    Wayback machine is used for

    • A.

      Take back up of database

    • B.

      To see snapshots of a website taken previously

    • C.

      To go Wayback in earlier time in the history

    • D.

      To clone email box of website

    Correct Answer
    B. To see snapshots of a website taken previously
    Explanation
    The Wayback machine is a tool used to see snapshots of a website taken previously. It allows users to access archived versions of websites, allowing them to view how a website looked and functioned in the past. This can be useful for historical research, tracking website changes, or accessing information that may no longer be available on the current version of the website. The Wayback machine does not involve taking backups of databases, going back in time, or cloning email boxes.

    Rate this question:

  • 18. 

    Grabify can be used to find out IP address of a website.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Grabify is a tool that allows users to create shortened URLs and track the IP address of anyone who clicks on those links. It does not provide the IP address of a website itself. Therefore, the statement that Grabify can be used to find out the IP address of a website is false.

    Rate this question:

  • 19. 

    Rooting of Mobile phone means..

    • A.

      Creating root directory in mobile phone

    • B.

      Obtaining administrative access of mobile phone

    • C.

      Formatting the mobile

    • D.

      Root cause of mobile

    Correct Answer
    B. Obtaining administrative access of mobile pHone
    Explanation
    Rooting of a mobile phone refers to the process of obtaining administrative access or privileges on the device. This allows the user to have complete control over the operating system and make changes that are normally restricted. Rooting enables users to install custom ROMs, remove pre-installed apps, and perform various other modifications that are not possible on a non-rooted device. It essentially grants the user full control and access to the device's system files and settings.

    Rate this question:

  • 20. 

    Section 65(B) is in respect of admissibility of electronic evidence is apart of

    • A.

      Criminal procedure code

    • B.

      Indian Penal code

    • C.

      Indian Evidence act

    • D.

      Information Technology Act

    Correct Answer
    C. Indian Evidence act
    Explanation
    Section 65(B) of the Indian Evidence Act is related to the admissibility of electronic evidence. This section provides guidelines for the admissibility of electronic records as evidence in court proceedings. It specifies the conditions under which electronic evidence can be admitted, such as ensuring the authenticity and integrity of the electronic record. Therefore, the correct answer is Indian Evidence Act.

    Rate this question:

  • 21. 

    The power of investigations of offences under Information Technology Act are given to

    • A.

      Station House Officer

    • B.

      Officers of and above the rank of PSI

    • C.

      Officers of and above the rank of Police Inspector

    • D.

      Dy.S.P. and above.

    Correct Answer
    C. Officers of and above the rank of Police Inspector
    Explanation
    The correct answer is "Officers of and above the rank of Police Inspector." According to the given options, the power of investigations of offences under the Information Technology Act are given to officers of and above the rank of Police Inspector. This means that only Police Inspectors and higher-ranking officers have the authority to conduct investigations related to offences under the Information Technology Act.

    Rate this question:

  • 22. 

    In order to find out IP address details of a computer located in India,you will use following website...

    • A.

      Www.apnic.net

    • B.

      Www.arin.net

    • C.

      Www.lacnic.net

    • D.

      Www.ripe.net

    Correct Answer
    A. Www.apnic.net
    Explanation
    The website www.apnic.net is the correct answer because APNIC (Asia-Pacific Network Information Centre) is the regional internet registry responsible for allocating and managing IP addresses in the Asia-Pacific region, which includes India. Therefore, by visiting the APNIC website, one can find the IP address details of a computer located in India. The other websites mentioned (www.arin.net, www.lacnic.net, www.ripe.net) are regional internet registries for other parts of the world and may not provide accurate information for a computer in India.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 27, 2017
    Quiz Created by
    Cyberi_MPA
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.