On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 3

Q1 | In crimes against individuals the ______ period leading up to the crime often contains the most important clues regarding the relationship between the offender and the victim.
Q2 | The type of report that is a preliminary summary of findings is known as:
Q3 | Creating a histogram of times to reveal periods of high activity is an example of which form of investigative reconstruction?
Q4 | Investigators should not rely on one piece of digital evidence when examining an alibi – they should look for an associated _______.
Q5 | It is quite difficult to fabricate an alibi on a network successfully because:
Q6 | Types of digital evidence that might corroborate an alibi include:
Q7 | To demonstrate that someone is lying about an alibi, it is necessary to:
Q8 | In confirming an alibi involving an obscure piece of equipment, if no documentation is available, the manufacturer is no longer in business, or the equipment/network is so complicated that nobody fully understands how it works, you should:
Q9 | Absence of evidence refutes an alibi.
Q10 | An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:
Q11 | When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:
Q12 | That part of cyberstalking where the offender is using the Internet to find a victim is known as:
Q13 | The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.
Q14 | When you have developed a theory, what can you do to confirm that your hypothesis is correct?
Q15 | Of particular significance in the scientific method is the weight attached to finding evidence which supports a particular hypothesis
Q16 | When reconstructing evidence surrounding a violent crime, it is generally helpful to:
Q17 | Computers and mobile devices are treated as _________ crime scenes in violent crime investigations.
Q18 | Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence.
Q19 | In the course of conducting forensic analysis, which of the following actions are carried out?
Q20 | Security Measures Needed to protect ________ during their transmission
Q21 | __________ means knowledge obtained from investigation, study , intelligence new ,facts .
Q22 | Prevention of the unauthorised used of Resources refers too?
Q23 | Protection against Denial by one of these parties in a communication refers to?
Q24 | Which One of them is Passive attack?
Q25 | What is lying of IP address called as?