IIIT KOTA COURSE Cyber Security and Digital Forensics Quiz Answers

Cyber Security and Digital Forensics

Cyber-security and digital forensics aims to provide secure environment to the organizations and individuals from cyber attacks. The course is designed to cover the wide spectrum starting from basics of cybersecurity upto the security measures used by organizations to avoid data breaches and other cyber attacks.

Apply Link

Quiz Answers:

Introduction to Cyber Security
Quiz9
Q1. Information security consists of: –
Ans. D

Q2. Property which protects data from modification by unauthorized user:
Ans. B

Q3. Malwares are………………….
Ans. A

Q4. Unauthorized users trying to access your computer are called
Ans. D

Q5. What is an attack?
Ans. C

System Administrator
Quiz3
Q1. Which service is used to centrally manage all the information related to users, systems, applications, groups, and devices of the entire network in a single place in the Windows operating system?
Ans. A

Q2. IP Address 172.16.0.10 is the IP address of which class?
Ans. B

Q3. Domain user can login from any of the computer which is part of that domain.
Ans. C

Q4. Which command(s) is/are used to find private IP Address?
Ans. C

Quiz5
Q1. Which service is used to centrally manage all the information related to users, systems, applications, groups, and devices of the entire network in a single place in the Windows operating system?
Ans. D

Q2. IP Address 172.16.0.10 is the IP address of which class?
Ans. B

Q3. Domain user can login from any of the computer which is part of that domain.
Ans. B

Q4. Which command(s) is/are used to find private IP Address?
Ans. C

Network Administrator
Quiz9
Q1. Why networking is done?
Ans. D

Q2. What is not true about IP address?
Ans. C

Q3. Which Tool helps us in analyzing the packets flowing over the network?
Ans. A

Q4. What is the responsibility of a network administrator?
Ans. D

Q5. Identify the device which is not necessary to create a network.
Ans. D

Vulnerability Assessment And Pen-Testing
Quiz2
Q1. What are the examples of vulnerabilities?
Ans. D

Q2. Which of the following statements is true?
Ans. A

Q3. Executive Report is the detailed report explaining each issue identified?
Ans. B

Q4. Manual VAPT is always __ than automated tools in terms of results.
Ans. B

Quiz5
Q1. Which of the following methods do not send requests to the target system for getting its information?
Ans. A

Q2. Netcraft tool is which type of information gathering tool?
Ans. B

Q3. Active information gathering has a chance of triggering the systems IDS/IPS and thus alert people?
Ans. A

Quiz7
Q1. Which of the following options is not available in Nessus scan options?
Ans. C

Q2. Which of the following tabs is/are available while doing Basic Network Scan?
Ans. B

Q3. Does Nessus provide remediations of identified vulnerabilities?
Ans. A

Digital Forensics Analyst-5
Quiz4
Q1. Which of the following statement(s) is/are true?
Ans. E

Q2. What describes an examination of a system while it is still running?
Ans. A

Q3. Volatile data resides in ?
Ans. D

Quiz6
Q1. Memory forensic help in the analysis of __ data?
Ans. A

Q2. Does the memory image contain details of registry changes?
Ans. B

Q3. What is registry in windows?
Ans. B

Quiz9
Q1. Volatility tool plugins are developed in which of the following languages?
Ans. C


Q2. Which of the following Volatility plugin is used to get process details along with its command line arguments?
Ans. B


Q3. Which option is used to specify process id in procdump and memdump plugins?
Ans. B

Q4. Which command is used to get lines having a specific string/pattern in given text?
Ans. D

Blockchain Engineer-6
Quiz8
Q1. Each block of the blockchain consists of:-
Ans. D

Q2. What is not the property of a blockchain?
Ans. C

Q3. Which Hash function is used in blockchain?
Ans. A

Q4. Identify a valid cryptocurrency?
Ans. D

Q5. What is smart contract?
Ans. A

error: Content is protected !!
Scroll to Top