Home / Engineering / Information Cyber Security (ICS) MCQs / Page 3

Information Cyber Security (ICS) MCQs | Page - 3

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.17K Points
Coach

Q. 21) SSL stands for?

(A) secured socket layer
(B) secured shell layer
(C) system socket layer
(D) system secured layer
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 22) What is the most important activity in system hacking?

(A) information gathering
(B) cracking passwords
(C) escalating privileges
(D) covering tracks
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 23) Why would HTTP Tunneling be used?

(A) to identify proxy servers
(B) web activity is not scanned
(C) to bypass a firewall
(D) http is a easy protocol to work with
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 24) The domain name space (tree) is devided into---------different sections

(A) 3
(B) 2
(C) 4
(D) none
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 25) The _____domains define registered hosts according to their generic behaviour.

(A) generic
(B) country
(C) inverse
(D) none
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 26) In crimes against individuals the ______ period leading up to the crime often contains the most important clues regarding the relationship between the offender and the victim.

(A) 24-hour
(B) 28-hour
(C) 60-minute
(D) 15-minute
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 27) The type of report that is a preliminary summary of findings is known as:

(A) sitrep
(B) threshold assessment report
(C) full investigative report
(D) field notes
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 28) Creating a histogram of times to reveal periods of high activity is an example of which form of investigative reconstruction?

(A) functional
(B) intentional
(C) relational
(D) temporal
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 29) Investigators should not rely on one piece of digital evidence when examining an alibi – they should look for an associated _______.

(A) cybertrail
(B) piece of physical evidence
(C) statement
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 30) It is quite difficult to fabricate an alibi on a network successfully because:

(A) an offender may not have the proper access.
(B) an offender would need system administrator access level to make the necessary changes.
(C) an individual rarely has the ability to falsify digital evidence on all the computers that are involved.
(D) creating an alibi on a network could take months of work.
View Answer Discuss Share