

MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
101. |
Absence of evidence refutes an alibi. |
A. | true |
B. | false |
Answer» C. | |
102. |
In confirming an alibi involving an obscure piece of equipment, if no documentation is available, the manufacturer is no longer in business, or the equipment/network is so complicated that nobody fully understands how it works, you should: |
A. | state that the alibi is considered unproven |
B. | search the internet for any pertinent information |
C. | recreate the events surrounding the alibi |
D. | contact other investigators and average their opinions |
Answer» D. contact other investigators and average their opinions | |
103. |
To demonstrate that someone is lying about an alibi, it is necessary to: |
A. | find evidence that clearly demonstrates the lie |
B. | require the suspect to submit to a polygraph |
C. | interrogate the suspect using a number of methods |
D. | show that no evidence confirming the alibi is available |
Answer» B. require the suspect to submit to a polygraph | |
104. |
Types of digital evidence that might corroborate an alibi include: |
A. | evidence of computer usage when the offense was supposed to occurred |
B. | computer records from credit cards, the telephone company, or subway ticket usage |
C. | gps information from mobile devices indicating the user’s location and time |
D. | all of the above |
Answer» E. | |
105. |
It is quite difficult to fabricate an alibi on a network successfully because: |
A. | an offender may not have the proper access. |
B. | an offender would need system administrator access level to make the necessary changes. |
C. | an individual rarely has the ability to falsify digital evidence on all the computers that are involved. |
D. | creating an alibi on a network could take months of work. |
Answer» D. creating an alibi on a network could take months of work. | |
106. |
Investigators should not rely on one piece of digital evidence when examining an alibi – they should look for an associated _______. |
A. | cybertrail |
B. | piece of physical evidence |
C. | statement |
D. | none of the above |
Answer» B. piece of physical evidence | |
107. |
Creating a histogram of times to reveal periods of high activity is an example of which form of investigative reconstruction? |
A. | functional |
B. | intentional |
C. | relational |
D. | temporal |
Answer» E. | |
108. |
The type of report that is a preliminary summary of findings is known as: |
A. | sitrep |
B. | threshold assessment report |
C. | full investigative report |
D. | field notes |
Answer» C. full investigative report | |
109. |
In crimes against individuals the ______ period leading up to the crime often contains the most important clues regarding the relationship between the offender and the victim. |
A. | 24-hour |
B. | 28-hour |
C. | 60-minute |
D. | 15-minute |
Answer» B. 28-hour | |
110. |
Investigative reconstruction is composed of three different forms. Which of the following is NOT one of those three forms? |
A. | functional |
B. | intentional |
C. | relational |
D. | temporal |
Answer» C. relational | |
111. |
A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection. |
A. | vnp |
B. | vpn |
C. | vsn |
D. | vspn |
Answer» C. vsn | |
112. |
The crime scene preservation process includes all but which of the following: |
A. | protecting against unauthorized alterations |
B. | acquiring digital evidence |
C. | confirming system date and time |
D. | controlling access to the crime scene |
Answer» D. controlling access to the crime scene | |
113. |
The process model whose goal is to completely describe the flow of information in a digital investigation is known as: |
A. | the physical model |
B. | the staircase model |
C. | the evidence flow model |
D. | the subphase model |
Answer» D. the subphase model | |
114. |
The first step in applying the scientific method to a digital investigation is to: |
A. | form a theory on what may have occurred |
B. | experiment or test the available evidence to confirm or refute your prediction |
C. | make one or more observations based on events that occurred |
D. | form a conclusion based on the results of your findings |
Answer» D. form a conclusion based on the results of your findings | |
115. |
Forensic analysis involves the following: |
A. | assessment, experimentation, fusion, correlation, and validation |
B. | seizure and preservation |
C. | recovery, harvesting, filtering, organization, and search |
D. | all of the above |
Answer» B. seizure and preservation | |
116. |
An investigation can be hindered by the following: |
A. | preconceived theories |
B. | improperly handled evidence |
C. | offender concealment behavior |
D. | all of the above |
Answer» E. | |
117. |
The fact that with modern technology, a photocopy of a document has become acceptable in place of the original is known as: |
A. | best evidence rule |
B. | due diligence |
C. | quid pro quo |
D. | voir dire |
Answer» B. due diligence | |
118. |
When assessing the reliability of digital evidence, the investigator is concerned with whether the computer that generated the evidence was functioning normally, and: |
A. | whether chain of custody was maintained |
B. | whether there are indications that the actual digital evidence was tampered with |
C. | whether the evidence was properly secured in transit |
D. | whether the evidence media was compatible with forensic machines |
Answer» C. whether the evidence was properly secured in transit | |
119. |
The process of documenting the seizure of digital evidence and, in particular, when that evidence changes hands, is known as: |
A. | chain of custody |
B. | field notes |
C. | interim report |
D. | none of the above |
Answer» B. field notes | |
120. |
The following specializations exist in digital investigations: |
A. | first responder (a.k.a. digital crime scene technician) |
B. | forensic examiner |
C. | digital investigator |
D. | all of the above |
Answer» E. | |
121. |
Computers can play the following roles in a crime: |
A. | target, object, and subject |
B. | evidence, instrumentality, contraband, or fruit of crime |
C. | object, evidence, and tool |
D. | symbol, instrumentality, and source of evidence |
Answer» C. object, evidence, and tool | |
122. |
A digital Signature is |
A. | a bit string giving identity of a correspondent |
B. | a unique identification of a sender |
C. | an authentication of an electronic record by trying it uniquely to a key only a sender knows |
D. | an encrypted signature of sender |
Answer» D. an encrypted signature of sender | |
123. |
Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology. |
A. | criminal investigation |
B. | prosecution |
C. | defense work |
D. | all of the above |
Answer» E. | |
124. |
Cybertrails are advantageous because: |
A. | they are not connected to the physical world. |
B. | nobody can be harmed by crime on the internet. |
C. | they are easy to follow. |
D. | offenders who are unaware of them leave behind more clues than they otherwise would have. |
Answer» E. | |
125. |
In terms of digital evidence, the Internet is an example of: |
A. | open computer systems |
B. | communication systems |
C. | embedded computer systems |
D. | none of the above |
Answer» C. embedded computer systems | |
126. |
What are the three general categories of computer systems that can contain digital evidence? |
A. | desktop, laptop, server |
B. | personal computer, internet, mobile telephone |
C. | hardware, software, networks |
D. | open computer systems, communication systems, embedded systems |
Answer» E. | |
127. |
A valid definition of digital evidence is: |
A. | none of the below |
B. | data stored or transmitted using a computer |
C. | digital data of probative value |
D. | any digital evidence on a computer |
Answer» D. any digital evidence on a computer | |
128. |
How does machine learning benefit IDSes/IPSes? |
A. | by lowering the volume of attacks analyzed |
B. | by adding heuristic anomaly detection capabilities |
C. | by searching for similar patterns to known attacks |
D. | by helping identify signatures more quickly |
Answer» D. by helping identify signatures more quickly | |
129. |
The features of traditional IPSes are found in all of these modern systems, except: |
A. | next-generation firewalls |
B. | antimalware |
C. | unified threat management appliances |
D. | network behavior analysis systems |
Answer» C. unified threat management appliances | |
130. |
A false positive can be defined as: |
A. | an alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior |
B. | an alert that indicates nefarious activity on a system that, upon further inspection, turns out to truly be nefarious activity |
C. | the lack of an alert for nefarious activity |
D. | all of the above |
Answer» B. an alert that indicates nefarious activity on a system that, upon further inspection, turns out to truly be nefarious activity | |
131. |
Which is true of a signature-based IDS? |
A. | it cannot work with an ips |
B. | it only identifies on known signatures |
C. | it detects never-before-seen anomalies |
D. | it works best in large enterprises. |
Answer» C. it detects never-before-seen anomalies | |
132. |
What port does Telnet use? |
A. | 22 |
B. | 80 |
C. | 20 |
D. | 23 |
Answer» E. | |
133. |
A full domain name is sequence of lables seperated by____ |
A. | semicolons |
B. | dots |
C. | colons |
D. | none |
Answer» C. colons | |
134. |
The root of DNS tree is____ |
A. | a string of characters |
B. | a string of 63 characters |
C. | an empty string |
D. | none |
Answer» D. none | |
135. |
In the DNS the names are defined in _____ sturucture |
A. | a linear list |
B. | an invertred tree |
C. | a graph |
D. | none |
Answer» C. a graph | |
136. |
DNS can use services of________using the well known port 53 |
A. | udp |
B. | tcp |
C. | either (a) or (b) |
D. | none of the above |
Answer» D. none of the above | |
137. |
The _____domains define registered hosts according to their generic behaviour. |
A. | generic |
B. | country |
C. | inverse |
D. | none |
Answer» B. country | |
138. |
The domain name space (tree) is devided into---------different sections |
A. | 3 |
B. | 2 |
C. | 4 |
D. | none |
Answer» B. 2 | |
139. |
Why would HTTP Tunneling be used? |
A. | to identify proxy servers |
B. | web activity is not scanned |
C. | to bypass a firewall |
D. | http is a easy protocol to work with |
Answer» D. http is a easy protocol to work with | |
140. |
What is the most important activity in system hacking? |
A. | information gathering |
B. | cracking passwords |
C. | escalating privileges |
D. | covering tracks |
Answer» C. escalating privileges | |
141. |
SSL stands for? |
A. | secured socket layer |
B. | secured shell layer |
C. | system socket layer |
D. | system secured layer |
Answer» B. secured shell layer | |
142. |
What is Firewall? |
A. | firewalls are network based security measures that control the flow of incoming and outgoing traffic |
B. | firewall is a program that encrypts all programs that access the internet |
C. | a firewall is a program that keeps other programs from using the internet |
D. | firewall are the interrupts that automatically disconnect from the internet when a threat appears. |
Answer» B. firewall is a program that encrypts all programs that access the internet | |
143. |
An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL |
A. | 40; 80 |
B. | 60; 620 |
C. | 80; 443 |
D. | 620; 80 |
Answer» D. 620; 80 | |
144. |
Which component is included in IP security? |
A. | authentication header (ah) |
B. | encapsulating security payload (esp) |
C. | internet key exchange (ike) |
D. | all of the mentioned |
Answer» E. | |
145. |
IPSec is designed to provide security at the _________ |
A. | transport layer |
B. | network layer |
C. | application layer |
D. | session layer |
Answer» C. application layer | |
146. |
Why would a hacker use a proxy server? |
A. | to create a stronger connection with the target. |
B. | to create a ghost server on the network. |
C. | to obtain a remote access connection |
D. | to hide malicious activity on the network. |
Answer» E. | |
147. |
Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text. |
A. | cross-site scripting |
B. | sql injection |
C. | packet sniffing |
D. | a and b |
Answer» E. | |
148. |
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense. |
A. | true |
B. | false |
Answer» B. false | |
149. |
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs. |
A. | true |
B. | false |
Answer» B. false | |
150. |
Stealing of digital files comes under __________ of the Indian IT Act. |
A. | section 66-a |
B. | section 66-b |
C. | section 66-c |
D. | section 66-d |
Answer» D. section 66-d | |