Top 20 Cyber Security Questions & Answers 6

Top 20 Cyber Security Questions & Answers

In today’s society, which is becoming more and more digital, cyber security is very important because data breaches and cyberattacks pose big risks to people, companies, and governments. To do well here, you need to know what you’re doing and be careful. The 20 questions and answers on this list cover a wide range of topics, from the basics of internet safety to more complex topics like finding threats and handling incidents. This guide will help you keep your digital life and things safe, no matter how much you know about hacking.

Now, let’s move on to the top 20 Cyber Security Questions & Answers

Q1. Which type of evidence is stored in a computer’s memory, as well as on storage devices as in files, and must be accompanied by documentation that validates the evidence’s authenticity?

a. Real
b. Documentary
c. Testimonial
d. Demonstrative

Q2. True or False? Time stamps correspond to computer log files to help coordinate a sequence of events and are accurate to at least the second.

Select one:
a. True
b. False

Q3. Lin is a digital forensic specialist who works in a forensic lab. She is evaluating diagnostic forensic software to add to the lab’s toolkit. She wants a tool that is open source that can also be used for penetration testing. Which tool should she choose?

a. Kali Linux
b. SForensics
c. EnCase
d. The Forensic Toolkit (FTK)

Q4. Which type of computer crime often involves nation-state attacks by well-funded cybercriminals?

a. Cyberstalking
b. Cyberterrorism
C. Online fraud
d. Identity theft

Q5. Susan is a digital forensic examiner. She is investigating a case in which a driver has been accused of vehicular homicide. She has the driver’s mobile device and cellular records. What type of mobile device evidence is most likely to reveal whether the driver was actively using a mobile device when the incident occurred?

a. Global positioning system (GPS) information and history
b. Network connection information and history
c. Text messages
d. Device information

Q6. True or False? The process of collecting evidence is called evidence preservation.

Select one:
a. True
b. False

Q7. True or False? The U.S. Department of Defense (DoD) Cyber Crime Center (DC3) sets standards for digital evidence processing, analysis, and diagnostics.

Select one:
a. True
b. False

Q8. True or False? A hash function is a mathematical function that takes arbitrary data as input and returns a fixed-length output (number).

Select one:
a. True
b. False

Q9. Which of the following is not true of mobile devices and forensics?

a. Mobile devices can be volatile and remotely managed.
b. Mobile devices do not need to follow ordinary chain of custody techniques.
c. Although options are available for breaking mobile device access controls, there is no guarantee that you will be able to access the device’s data without the owner’s cooperation.
d. The process of accessing evidence on a mobile device is similar to that on a normal computer.

Q10. What is the determination that evidence is either acceptable or unacceptable to a court of law?

a. Legal hold
b. Preservation
c. Admissibility
d. Order of volatility

Q11. True or False? The term “computer crime” typically refers to crimes that target computer resources, either data that computers store or the services they provide (or both).

Select one:
a. True
b. False

Q12. True or False? Operating systems remove data when a file is deleted

Select one:
a. True
b. False

Q13. A computing device does not play which role in a crime?

a. Perpetrator
b. Target
c. Instrument
d. Repository

Q14. Which type of evidence is information collected from individuals that supports and helps to interpret other types of evidence?

a. Real
b. Documentary
c. Testimonial
d. Demonstrative

Q15. True or False? The term “firmware” indicates that software is stored on a separate storage unit within a file system, as opposed to directly in the hardware.

Select one:
a. True
b. False

Q16. True or False? Cyberterrorism is the use of online media and assets to harass individuals.

Select one:
a. True
b. False

Q17. In which type of computer crime do cybercriminals engage in activities to either impersonate victims or to convince victims to carry out transactions that benefit the criminals, with a focus on extracting revenue from victims?

a. Cyberstalking
b. Exfiltrating data
c. Online fraud
d. Nonaccess computer crime

Q18. True or False? Forensic labs may use both open source and commercial software for digital analysis.

Select one:
a. True
b. False

Q19. True or False? An example of a nonaccess computer crime is crashing a target’s critical functionality to prevent normal (revenue- creating) processes from occurring.

Select one:
a. True
b. False

Q20. Which of the following is a digital forensics specialist least likely to need in-depth knowledge of?

a. Computer memory, such as cache and random access memory (RAM)
b. Storage devices
c. Mainframes
d. Operating systems, such as Windows, Linux, and macOS

Answers

  1. b
  2. a
  3. a
  4. b
  5. c
  6. b
  7. a
  8. a
  9. b
  10. c
  11. a
  12. b
  13. a
  14. c
  15. b
  16. b
  17. c
  18. a
  19. a
  20. c