Home / Engineering / Information Cyber Security (ICS) MCQs / Page 13

Information Cyber Security (ICS) MCQs | Page - 13

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 121) A false positive can be defined as:

(A) an alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
(B) an alert that indicates nefarious activity on a system that, upon further inspection, turns out to truly be nefarious activity
(C) the lack of an alert for nefarious activity
(D) all of the above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 122) The features of traditional IPSes are found in all of these modern systems, except:

(A) next-generation firewalls
(B) antimalware
(C) unified threat management appliances
(D) network behavior analysis systems
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 123) How does machine learning benefit IDSes/IPSes?

(A) by lowering the volume of attacks analyzed
(B) by adding heuristic anomaly detection capabilities
(C) by searching for similar patterns to known attacks
(D) by helping identify signatures more quickly
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 124) A valid definition of digital evidence is:

(A) none of the below
(B) data stored or transmitted using a computer
(C) digital data of probative value
(D) any digital evidence on a computer
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 125) What are the three general categories of computer systems that can contain digital evidence?

(A) desktop, laptop, server
(B) personal computer, internet, mobile telephone
(C) hardware, software, networks
(D) open computer systems, communication systems, embedded systems
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 126) In terms of digital evidence, the Internet is an example of:

(A) open computer systems
(B) communication systems
(C) embedded computer systems
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 127) Cybertrails are advantageous because:

(A) they are not connected to the physical world.
(B) nobody can be harmed by crime on the internet.
(C) they are easy to follow.
(D) offenders who are unaware of them leave behind more clues than they otherwise would have.
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 128) Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology.

(A) criminal investigation
(B) prosecution
(C) defense work
(D) all of the above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 129) Computers can play the following roles in a crime:

(A) target, object, and subject
(B) evidence, instrumentality, contraband, or fruit of crime
(C) object, evidence, and tool
(D) symbol, instrumentality, and source of evidence
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 130) The following specializations exist in digital investigations:

(A) first responder (a.k.a. digital crime scene technician)
(B) forensic examiner
(C) digital investigator
(D) all of the above
View Answer Discuss Share