Computer Crime
Computer Crime Quiz Crafted By-
Akhil B. Parippallil
Scientific Officer
Sherlock Institute of Forensic Science India Pvt. Ltd, New Delhi
Introduction to Computer Crime
cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
Let's look at the questions and their answer.
Ques 1. Most of the chat and instant message conversations are stored in computer in
a) Hard disk
b) RAM
c) Wintex
d) Slack space
Answer-b) RAM
Ques 2. Which of the following program is run to examine network traffic
a) Net dump
b) TICP dump
c) Slack dump
d) Core dump
Answer- b) TICP dump
Ques 3. Data can be retrieved from a mobile device using which software
a) Q-Pass Analyzer
b) Pass- Analyzer forensic
c) Oxygen forensic suite
d) Doc- center forensic
Answer- c) Oxygen forensic suite
Ques 4. Which of the following types of images store graphic information in a grid of individual pixels?
a) Vector
b) Raster
c) Bitmaps
d) Metafiles
Answer-b) Raster
Ques 5. The famous computer program which provides cryptographic privacy and authentication for data communication, based in public-key encryption algorithm is:
a) PGP
b) TGEP
c) GPP
d) CGE
Answer- a) PGP
Ques 6. An Android device’s encrypted data can be wiped remotely using:
a) Find my phone service
b) Google Sync
c) iCloud
d) Search My Sync
Answer- b) Google Sync
Ques 7. How many phases are present in “Enhanced Integrated Digital Investigation Process” Model invented by Baryamureeba and Tushabe in 2004?
a) 5
b) 1
c) 9
d) 7
Answer-a) 5
Ques 8. Assertion (A): Digital image technology is a powerful tool for recording the crime scene.
Reason (R): Digital imaging allows real time access to the crime scene even one is away from the scene.
a) (A) is correct, but (R) is wrong
b) Both (A) and (R) are correct
c) (A) is incorrect, but (R) is correct
d) (A) & (R) both are wrong
Answer- b) Both (A) and (R) are correct.
Ques 9. Which of the following techniques are used during computer forensics investigation?
a) Cross-drive analysis
b) Live analysis
c) Deleted files
d) All of the above
Answer- d) All of the above
Ques 10. You are supposed to maintain three types of records. Which answer is not a record?
a) Chain of custody
b) Documentation of the crime scene
c) Searching the crime scene
d) Document your actions
Answer- c) Searching the crime scene