Home / Engineering / Information Cyber Security (ICS) MCQs / Page 4

Information Cyber Security (ICS) MCQs | Page - 4

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.17K Points
Coach

Q. 31) Types of digital evidence that might corroborate an alibi include:

(A) evidence of computer usage when the offense was supposed to occurred
(B) computer records from credit cards, the telephone company, or subway ticket usage
(C) gps information from mobile devices indicating the user’s location and time
(D) all of the above
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 32) To demonstrate that someone is lying about an alibi, it is necessary to:

(A) find evidence that clearly demonstrates the lie
(B) require the suspect to submit to a polygraph
(C) interrogate the suspect using a number of methods
(D) show that no evidence confirming the alibi is available
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 33) In confirming an alibi involving an obscure piece of equipment, if no documentation is available, the manufacturer is no longer in business, or the equipment/network is so complicated that nobody fully understands how it works, you should:

(A) state that the alibi is considered unproven
(B) search the internet for any pertinent information
(C) recreate the events surrounding the alibi
(D) contact other investigators and average their opinions
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 34) Absence of evidence refutes an alibi.

(A) true
(B) false
(C) ---
(D) ---
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 35) An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:

(A) part of the blame can be assigned to the victim.
(B) the offender is likely to be found in the same area as the victim
(C) investigators should pay particular attention to acquaintances of the victim
(D) investigators should always check the immediate family
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 36) When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:

(A) the victim might have been withholding information during the first interview.
(B) the information that investigators have gathered might help the victim recall additional details.
(C) the time between the first and second interviews has given the victim time to seek counseling.
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 37) That part of cyberstalking where the offender is using the Internet to find a victim is known as:

(A) profiling
(B) trolling
(C) surreptitious monitoring
(D) none of the above.
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 38) The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.

(A) evidence inventory
(B) . chain of custody
(C) evidence intake
(D) preservation notes
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 39) When you have developed a theory, what can you do to confirm that your hypothesis is correct?

(A) predict, based on your hypothesis, where artifacts should be located
(B) perform experiments to test results and rule out alternate explanations
(C) conclude, based on your findings, whether the evidence supports the hypothesis
(D) all of the above
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 40) Of particular significance in the scientific method is the weight attached to finding evidence which supports a particular hypothesis

(A) true
(B) false
(C) ---
(D) ---
View Answer Discuss Share