1.
Name the latest Ransomeware attack
Correct Answer
B. Wannacry
Explanation
Wannacry is the correct answer because it is the name of the latest ransomware attack. In May 2017, the Wannacry ransomware spread rapidly across the globe, infecting hundreds of thousands of computers. It encrypted files on the infected systems and demanded a ransom in Bitcoin for their release. The attack affected various organizations, including hospitals, businesses, and government institutions, causing widespread disruption and financial losses.
2.
Illegal interception, illegal access, data interference and system interference are all part of cyber crime
Correct Answer
A. True
Explanation
The statement is true because illegal interception, illegal access, data interference, and system interference are all types of activities that fall under the category of cybercrime. Cybercrime refers to criminal activities that are committed using computers or the internet, and these activities involve unauthorized access, interference with data or computer systems, and interception of communications without permission. Therefore, it can be concluded that illegal interception, illegal access, data interference, and system interference are indeed part of cybercrime.
3.
What Term usually describes a person who gains access to computer system illegally?
Correct Answer
A. Hacker
Explanation
A hacker is a term used to describe a person who gains unauthorized access to computer systems. Hackers use their technical skills and knowledge to exploit vulnerabilities in computer networks and bypass security measures. They may steal sensitive information, disrupt operations, or cause damage to the system. While some hackers engage in illegal activities, others use their skills for ethical purposes, such as identifying and fixing security flaws.
4.
A ___________ attack occurs, when hacker bombard a website with more request for service that it can possibly handle,preventing legitimate users preventing from accessing the service.
Correct Answer
C. Denial of service
Explanation
A denial of service attack occurs when a hacker overwhelms a website with an excessive number of service requests, causing the website to become unavailable for legitimate users. This can be achieved by flooding the website's servers with traffic or exploiting vulnerabilities in the website's infrastructure. The intention is to disrupt the normal functioning of the website and prevent users from accessing the desired service.
5.
Continuous online sexual harassment comes under which category of cyber crime.
Correct Answer
A. Cyber Stalking
Explanation
Continuous online sexual harassment falls under the category of cyber stalking. Cyber stalking refers to the persistent and unwanted pursuit or harassment of an individual online. In this case, the continuous online sexual harassment qualifies as cyber stalking as it involves the repeated and unwanted sexual advances or messages directed towards the victim. Cyber stalking is a serious cyber crime that can cause emotional distress and harm to the victim.
6.
192.256.11.29 is the IP address user can use for internet surfing.
Correct Answer
B. False
Explanation
The given IP address, 192.256.11.29, is not a valid IP address. In the octet "256", the value exceeds the maximum limit of 255. Therefore, this IP address cannot be used for internet surfing.
7.
Facebook cannot be used for
Correct Answer
D. Email communication
Explanation
Facebook is a social media platform primarily used for connecting with friends, sharing posts, uploading videos, and sharing photos. However, it does not provide a dedicated feature for email communication. While Facebook does have a messaging feature, it is not designed to replace traditional email communication. Therefore, Facebook cannot be used for email communication.
8.
Primary evidence must be supported with certificate of 65 B as per Indian Evidence Act.
Correct Answer
B. False
Explanation
According to the given statement, primary evidence must be supported with a certificate of 65 B as per the Indian Evidence Act. However, this statement is false. The Indian Evidence Act does not require primary evidence to be supported with a certificate of 65 B. Primary evidence refers to the original document itself, such as a contract or a photograph, and does not require any additional certification.
9.
As an investigator we can change the details of evidence to show the relativity of crime and Criminal
Correct Answer
B. False
Explanation
As an investigator, it is unethical and illegal to change the details of evidence. The evidence should be presented as it is, without any manipulation, in order to maintain the integrity and reliability of the investigation. Changing the details of evidence would compromise the fairness of the investigation and could lead to wrongful accusations or judgments. Therefore, the statement is false.
10.
What is the command to see any computer’s MAC ID for investigation purpose
Correct Answer
D. Ipconfig /all
Explanation
The command "ipconfig /all" is used to see the MAC ID of any computer for investigation purposes. This command displays detailed information about the network configuration of the computer, including the MAC (Media Access Control) address. The MAC address is a unique identifier assigned to the network interface card of a device, and it can be used to track or identify the device on a network.
11.
Algorithm of HASH value
Correct Answer
C. SHA 1
Explanation
The given answer "SHA 1" is the correct answer because SHA-1 is a widely used cryptographic hash function that takes an input (in this case, the value 123) and produces a fixed-size output (the hash value). It is commonly used for data integrity checks and digital signatures. The algorithm used in SHA-1 ensures that even a small change in the input will result in a significantly different hash value, making it difficult to reverse-engineer the original input from the hash value.
12.
Section for Identity theft as Information Technology Act(amended)
Correct Answer
A. 66C
13.
While conducting raid on call centre,We should directly access the data from any server
Correct Answer
B. False
Explanation
When conducting a raid on a call center, it is not necessary to directly access the data from any server. The correct procedure would be to follow legal protocols and obtain the necessary warrants or permissions to access the data. This may involve working with law enforcement agencies and following proper legal channels to ensure the admissibility of any evidence collected during the raid. Therefore, the statement is false.
14.
Process to maintain the transfer and handling details of Digital evidence, is known as
Correct Answer
D. Chain of Custody
Explanation
Chain of custody refers to the process of maintaining the transfer and handling details of digital evidence. It involves documenting the movement of evidence from the time it is collected until it is presented in court. This process ensures that the evidence is properly secured, preserved, and not tampered with, thus maintaining its integrity and admissibility in legal proceedings.
15.
We must work on original digital evidence for perfect analysis of cyber crime
Correct Answer
B. False
Explanation
Working on original digital evidence is not necessary for a perfect analysis of cyber crime. While it is ideal to have access to original evidence, forensic experts can still analyze copies or duplicates of digital evidence to gather important information and evidence. In some cases, the original evidence may not be available or accessible, but this does not necessarily hinder the analysis process. Therefore, the statement is false.
16.
As per law an officer who is authorised to investigate cyber crime cases....
Correct Answer
B. PI and above
Explanation
The correct answer is "PI and above". According to the law, only officers with the rank of Police Inspector (PI) and above are authorized to investigate cyber crime cases. This indicates that higher-ranking officers have the necessary expertise and knowledge to handle complex cyber crime cases.
17.
All internet service provider can be termed as ________________,as they are custodian of data in terms of Storage,Process and Transfer. and they are responsible to assist in any cyber crime investigation.
Correct Answer
D. Intermediary
Explanation
The correct answer is "Intermediary." An intermediary is someone or something that acts as a mediator or middleman between two parties. In the context of internet service providers, they can be considered intermediaries because they store, process, and transfer data on behalf of their customers. Additionally, they have a responsibility to assist in any cybercrime investigations, further emphasizing their role as intermediaries in the digital realm.