0% found this document useful (0 votes)
191 views2 pages

Cyber Security and Digital Forensic Oral Questions

Uploaded by

t.moin06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views2 pages

Cyber Security and Digital Forensic Oral Questions

Uploaded by

t.moin06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Cyber Security and digital Forensic Oral Questions

1) What is Cyber Security? What is its need?


2) Define Cyber Crime. Which are the common types of Cyber
Crimes?
3) What is Information Assurance?
4) What is drug Trafficking?
5) What is Computer Virus? Its types.
6) What is internet Cracking?
7) What is hacking? Its types.
8) What is digital forensics?
9) What are different application of digital forensics?
10) Which are different types of evidences?
11) Which are different tools and technologies used in cyber
forensics?
12) Tell the names of software forensic tools and hardware forensic
tools.
13) What is the difference between cyber forensics and digital
forensics?
14) What are the key components of a cyber forensic lab?
15) What is the importance of preserving digital evidence?
16) What is the role of a cyber forensic investigator?
17) What are the different techniques used in cyber forensic
investigations?
18) What is data acquisition in cyber forensics?
19) What is data analysis in cyber forensics?
20) What is data recovery in cyber forensics?
21) What is data preservation in cyber forensics?
22) How do you handle and analyze mobile device data in a cyber
forensic investigation ?
23) How do you handle and analyze cloud data in a cyber forensic
investigation ?
24) How do you handle and analyze network data in a cyber
forensic investigation ?
25) How do you handle and analyze social media data in a cyber
forensic investigation ?
26) How do you communicate and present your findings in a cyber
forensic investigation?
27) How do you stay updated on the latest trends and techniques
in cyber forensics?
28) What are the key goals of cyber forensics?
29) What are the basic steps involved in a cyber forensics
investigation?
30) How do you handle volatile data in a cyber forensics
investigation?
31) How can you recover deleted files in a cyber forensics
investigation?
32) Explain the term ‘steganography’ and its relevance in cyber
forensics?
33) What is the concept of disk imaging in cyber forensics?
34) What is hashing and how is it used in cyber forensics?
35) How does network forensics differ from traditional cyber
forensics?
36) What is RAM analysis in cyber forensics?
37) Explain the concept of timeline analysis in Cyber forensics?
38) What is log analysis and how is it used in cyber forensics?
39) What is the role of forensic imaging in cyber forensics?
40) What is network packet analysis and how does it contribute to
cyber forensic?

You might also like