questions set 4
sarada avadhanam
Question Bank for All India Duty Meet 18 Nov 2005
1.Forensic analysis of digital evidence that is distributed across a large computer network
Computer forensics
Cyber forensics
Network forensics
Software forensics [b]
2.Identifying the author of the malicious code
Computer forensics
Cyber forensics
Network forensics
Software forensics [d]
3.RAM in computer terminology means
Readily available memory
Read and maintain memory
Random access memory
Rarely available memory [c]
4.A group of bytes written on a track
Segment
Fragment
Sector
Cluster [c]
5.A collection of disk sectors
Segment
Fragment
Sector
Cluster [d]
6.Fingerprint of any message in the form of a unique value is
Harsh value
Hard value
Hard disk value
Hash value [d]
7.E-documents / records are authenticated by
Data signature
Cipher signature
Digital signature
Crypto signature [c]
8.Obscuring information in a manner to prevent its detection
Stagrography
Stagnography
Stegnography
Stageography [c]
9.Osama bin laden et al use this high tech to post instructions for terrorists
Cryptology
Stegnography
Encryption
Pornography [b]
10.The md5# is used for
Data validation
Data manipulation
Data deletion
Data addition [a]
11.Singapore is not a signatory to IT act T/F[F]
12.IT act contains
10 chapters 90 sections
12 chapters 94 sections
13 chapters 93 sections
13 chapters 94 sections [d]
13.many prevalent cyber offences have not been covered under IT act T/F[T]
14.A compensation not exceeding Rs 1 crore as charges towards damages is envisaged in section
42 of IT ACT
43 OF IT ACT
44 OF IT ACT
47 OF IT ACT [b]
15.sending unsolicited e-mails to the recipients
surfing
swamming
spamming
spanning [c]
16.FAT in computer means
File and tag
Fast action table
Figure access time
File allocation table [d]
17.the data storage space that exists from the end of the file to the end of the cluster assigned to the file is
suspense space
storage space
secret space
slack space [d]
18.information about a file regarding its creation deletion modification during work session is available in
slack space
RAM slack
ROM slack
buffer slack [b]
19.when user deletes a file operating system releases the clusters but the content of the file is not erased T/F[T]
20.file in which windows place anything that currently resides in RAM memory is
wrap file
strap file
swam file
swap file [d]
21.files for printing are spooled to a queue as soon as they are deleted they are deleted only from queue but not from these files
permanent files
temp files
transient files
tough files [b]
22.crimes in which tools or objects of crime employ digital technology are termed as
cyber crimes
computer frauds
hitech crimes
digital crimes [d]
23.net work interconnecting a limited 1 km is
LAN
WAN
VAN
CAN [A]
24.the device that lets the message in flow between the networks
ROWTERS
ROUTERS
RUTERS
ROTARS [B]
25.a host computer is identified with
UP
IP
HP
TP [b]
26.e-mail is not secure and can be accessed on intermediate computers located on the route T/F[T]
27.WEB utilizes
HTML
MTHL
TMHL
LTHM [A]
28.preventing the legitimate users of a service from using it
blockade attack
DS attack
DC attack
DM attack [b]
29.example for malicious code
Tarzan horse
frozen horse
Trojan horse
Torpedo horse [c]
30.external agency to bring out the loopholes
hacking
breaking
ethical breaking
ethical hacking [d]
31.altering master file records, posting transactions partially is
data manipulation
data mishandling
data diddling
data scrambling [c]
32.any chemical compound or mixture capable of decomposing with evolution of energy is a potential explosive T/F[T]
33.dust of combustible material with air forming a cloud in any proportion will be explosive T/F[F]
34.paint thinner vapour in air does not form an explosive T/F[F]
35.gelignite containing high proportion of nitro glycerine are gelatins T/F[T]
36.lightening is an example of phenomena of the discharge of static electricity T/F[T]
37.ventilation will cause a fire to spread away from the conical fire pattern T/F[T]
38.the act of gaining unauthorized access toa telephone system or network
frisking
phreaking
streaking
phrasing [b]
39. junk mail being downloaded in quantity
swapping
swamming
spamming
sparming [c]
40.the following is not a seed fibre
coconut
cotton
capok
none [a]
41.coir is
growth around seed
growth around the husk of the fruit
derived from the fibrous layers within plant
fibro vascular bundle in the leaves [b]
42.a temporary area set aside to store information which is frequently accessed in a computer
cache
cacke
caech
cahea [a]
43.a virus carrier in computer language is known as
dooper
dropper
dipper
dumper [b]
44. the central device in a star configured LAN
CUB
HEB
HUB
HAB [C]
45.a server in between your computer and rest of the internet which stores frequently accessed web pages and graphics
proactive server
proxy server
preventive server
paradoxy server [b]
46.ultrasonic cavitation is an etching method of restoring obliterated serial numbers T/F[T]
47.voice identification is based on manipulating the lips, teeth, tongue, soft palette ad jaw muscles T/F[T]
48.success of restoring engraved numbers is much more than in case of punched numbers T/F[T]
49.the obliteration on wood is restored by
boiling water
steam
mild alkali
organic acid [b]
50.gradual heating and cooling of the affected area on plastic restores the obliterated mark on it T/F[T]
********************************************************************
Labels: questions set 4
3 Comments:
Computer forensic Singapore
Corporate Investigation - AK Global Company is specialized for corporate investigation in Singapore. Our teams provide you a wide range of corporate investigation services in Singapore. Contact us now - + (65) 6222 7227
to get more - https://investigation-akg.com/cyber-crime/
6:48 PM
Background check in Singapore
Corporate Investigation - AK Global Company is specialized for corporate investigation in Singapore. Our teams provide you a wide range of corporate investigation services in Singapore. Contact us now - + (65) 6222 7227
to get more - https://investigation-akg.com/cyber-crime/
6:50 PM
Computer forensic Singapore
Get the best cybersecurity and computer forensic service in Singapore from AK Global Investigation Company. AK Global uses a number of techniques and forensic software applications to search for hidden information and deleted encrypted or damaged files.
to get more - https://investigation-akg.com/cyber-crime/
10:17 PM
Post a Comment
<< Home