Hack Investigation & Security

Cybersecurity Engineer Test

Hack Investigation & Security

Personal Cyber Security Quiz  (Forensic & Hack removal)

1 / 85

Category: Forensics

 1. Which of the followings you should check as identification items while investigating cybercrime? (Choose all applicable answers)

2 / 85

Category: Forensics

2. Which of the following isn’t digital evidence?

3 / 85

Category: Forensics

 3. Which of the following is a memory acquisition tool?

4 / 85

Category: Forensics

 4. While preparing an iOS device for image acquisition,you should keep at least_____ charge on the device.

5 / 85

Category: Forensics

5. While preparing an iOS device for image acquisition,you should keep device switched off.

6 / 85

Category: Forensics

6. To acquire an encrypted iOS backup with AXIOM:

7 / 85

Category: Forensics

7. If SSH is present on an iOS device, AXIOM Process tries to connect to the device automatically by using the default SSH credentials

8 / 85

Category: Forensics

8. Which are default SSH credentials of an iOS device?

9 / 85

Category: Forensics

9. What is the requirement for memory acquisition of an iOS device?

10 / 85

Category: Forensics

10. To acquire a computer drive with AXIOM:

11 / 85

Category: Forensics

11. Which of the followings are forensic tool? (Choose all applicable answers)

12 / 85

Category: Forensics

12. What is “.lnk” file?

13 / 85

Category: Forensics

13. Which of the followings  tools can help us parse “Prefetch files” of Windows ? (Choose all applicable answers)

14 / 85

Category: Forensics

14. Which of the following is not Registry Analysis Tool?

15 / 85

Category: Forensics

15. Which of the followings  should be present in a forensic report? (Choose all applicable answers)

16 / 85

Category: Forensics

16. While doing forensic“Analysis” process comes after:

17 / 85

Category: Forensics

17. Which of the followings are browser artifacts? (Choose all applicable answers)

18 / 85

Category: Forensics

18. Prefetch files can be found in:

19 / 85

Category: Forensics

19. To turn on Windows 10 Timeline:

20 / 85

Category: Forensics

20. Install.log file has an immense value to see all the installations on  Mac.

21 / 85

Category: Forensics

21. On Mac Os  Key Chain  can be found in:

22 / 85

Category: Forensics

22. Background System Process on Mac OS can be found at “/System/Library/LaunchDaemons/”.

23 / 85

Category: Forensics

23. Background User Process on Mac OS can be found at: (Choose all applicable answers)

24 / 85

Category: Forensics

24. Which commands you can use to see what's 'Installed' on Mac? (Choose all applicable answers)

25 / 85

Category: Forensics

25. MacOs Key Chain  can be found in:

26 / 85

Category: Forensics

26. ExifTool is a command-line application used to read, write or edit file metadata information.

27 / 85

Category: Forensics

27. “/etc/resolv.conf” is the configuration file for local DNS name assignment on Linux.

28 / 85

Category: Forensics

28. Linux user account information are stored in______.

29 / 85

Category: Forensics

29. Linux failed login attempts records are found in ______.

30 / 85

Category: Forensics

30. Kali Linux “Live” provides a “forensic mode”.

31 / 85

Category: Forensics

31. What is “Xplico”?

32 / 85

Category: Forensics

32. Which of the followings are Linux Live CD used in forensic? (Choose all applicable answers)

33 / 85

Category: Forensics

33. What is “HELIX3 Free”?

34 / 85

Category: Forensics

34. Which of the followings are hex editor? (Choose all applicable answers)

35 / 85

Category: Forensics

 35. FTK Imager doesn’t have any portable version .

36 / 85

Category: Forensics

36. What is “Volatility”?

37 / 85

Category: Forensics

37. For Image OSINT,you can use:(Choose all applicable answers)

38 / 85

Category: Forensics

38. For Person OSINT:(Choose all applicable answers)

39 / 85

Category: Forensics

39. For Username OSINT,you can use:

40 / 85

Category: Forensics

40. You can use “ https://conifer.rhizome.org/“,for:

41 / 85

Category: Hack Removal

1. What is the process of checking battery performance in IOS devices?

42 / 85

Category: Hack Removal

2. Processes of checking whether the iPhone is JailBroken or not: (Choose all applicable answers)

43 / 85

Category: Hack Removal

3. Checking Crashing Apps in iPhone:

44 / 85

Category: Hack Removal

4. Write down the process of checking unknown applications in IOS devices:

45 / 85

Category: Hack Removal

5. Steps to clear history in IOS devices:

46 / 85

Category: Hack Removal

6. Steps of Resetting iPhone as a New One:

47 / 85

Category: Hack Removal

7. Steps to clear website data in IOS devices:

48 / 85

Category: Hack Removal

8. To backup from iTunes to Desktop iCloud needed to be Enabled:

49 / 85

Category: Hack Removal

9. To turn on "Find My iPhone" steps should be:

50 / 85

Category: Hack Removal

10. Steps to remotely wipe an iPhone once located with Find My iPhone:

51 / 85

Category: Hack Removal

11. Creating a longer password in IOS devices: (Choose all applicable answers)

52 / 85

Category: Hack Removal

12. Process of Auto-wipe iPhone content: (Choose all applicable answers)

53 / 85

Category: Hack Removal

13. What kind of symptoms are arise when a phone get hacked? (Choose all applicable answers)

54 / 85

Category: Hack Removal

14. How people get hacked in their mobile devices?

55 / 85

Category: Hack Removal

15. What is not responsible for hacking mobile devices?

56 / 85

Category: Hack Removal

16. Downloading unknown apps may the cause of mobile devices hacking.

57 / 85

Category: Hack Removal

17. Which one can be the cause for hacking mobile devices?

58 / 85

Category: Hack Removal

18. Which step needs to be taken to detect Hack/Malware in mobile devices?

59 / 85

Category: Hack Removal

19. Which are signs of Malware attack in a mobile device? (Choose all applicable answers)

60 / 85

Category: Hack Removal

20. Ways to get rid of Malware/Spyware/Hack in mobile devices: (Choose all applicable answers)

61 / 85

Category: Hack Removal

21. Clear History & Website Data is a way to get rid of Malware/Spyware/Hack in mobile devices.

62 / 85

Category: Hack Removal

22. Select a way thus a phone can be hacked: (Choose all applicable answers)

63 / 85

Category: Hack Removal

23. Sign of Hacking of a phone. (Choose all applicable answers)

64 / 85

Category: Hack Removal

24. Phone is being overheated even when it is not being used is a symptom of: (Choose all applicable answers)

65 / 85

Category: Hack Removal

25. Which one is not a sign of Hack/Malware/Spyware in mobile devices?

66 / 85

Category: Hack Removal

26. Which are the signs of phone being hacked or infected by malware? (Choose all applicable answers)

67 / 85

Category: Hack Removal

27. How to Check for Malware on Android using Google Play Protect:

68 / 85

Category: Hack Removal

28. The process of recovery of Facebook account if the password has changed: (Choose all applicable answers)

69 / 85

Category: Hack Removal

29. The process of recovery of Facebook account if no access to email:

70 / 85

Category: Hack Removal

30. The process of recovery of Facebook account if Password and email address changed:

71 / 85

Category: Hack Removal

31. If victim’s email address has been changed, then Facebook will send an email to victim’s previously entailing email address and notify victim about the email change.

72 / 85

Category: Hack Removal

32. "If victim did not do this, please secure victim’s account" appears in facebook when:

73 / 85

Category: Hack Removal

33. To recover Facebook account, victim may be asked to upload: (Choose all applicable answers)

74 / 85

Category: Hack Removal

34. Steps to recover a Facebook ID using Email Change Notification:

75 / 85

Category: Hack Removal

35. After sending victim’s ID, Facebook will response to victim in:

76 / 85

Category: Hack Removal

36. To request a login link in Instagram in Android:

77 / 85

Category: Hack Removal

37. To report a hacked account on Instagram on Android:

78 / 85

Category: Hack Removal

38. To report a hacked account on Instagram on IOS is: 

79 / 85

Category: Hack Removal

39. A photo of victim’s self-holding a paper with a handwritten code instagram provided to victim is needed to verify victim’s identity.

80 / 85

Category: Hack Removal

40. Steps to recovering Instagram account by using Facebook:

81 / 85

Category: Hack Removal

41. Which one contains LinkedIN hacked account recovery form?

82 / 85

Category: Hack Removal

42. What information needed to recover a hacked LinkedIN account?

83 / 85

Category: Hack Removal

43. How many ways to recover a google account?

84 / 85

Category: Hack Removal

44. What kind of information needed to recover a google account? (Choose all applicable answers)

85 / 85

Category: Hack Removal

45. Which is the correct path for checking Device Administrator permission on Android?

0%