Digital Forensics: Cyber Crime and Web Security Applied Scenarios
Published:
Questions
30
Duration
30 min
Faculty-reviewed
0
Updated
20 May 2026
Practice with national-level exam (FACT, FACT Plus, NET, CUET, etc.) mocks, learn from structured notes, and get your doubts solved in one place.
Published:
Questions
30
Duration
30 min
Faculty-reviewed
0
Updated
20 May 2026
Score, per-question explanations and topic breakdown shown right after you submit.
Free ForensicSpot account required to save your progress — you’ll sign in when you start.
FACT Digital Forensics paper applied-scenario drill on cyber crime and web security, calibrated at the medium band where distractors are near-neighbour sister concepts and the student must match each fact pattern to the correct statute or technique. The set distinguishes Section 66, 66B, 66C, 66D, 66E, and 66F of the Information Technology Act 2000 against specific scenarios, separates phishing variants from spear phishing and whaling through tailoring and targeting cues, classifies ransomware families across WannaCry, LockBit, Conti, and the NotPetya wiper from their behavioural signatures, and applies malware taxonomy to operational evidence such as command-and-control beacons and SMB scanning. Web-security questions cover SQL injection sub-types (UNION-based, blind time-based, error-based), the three cross-site scripting variants (stored, reflected, DOM-based) from code snippets, email authentication results under SPF (RFC 7208), DKIM (RFC 6376), and DMARC (RFC 7489), and the same-origin policy, Content Security Policy directives, and TLS handshake reasoning at the transport layer. The cyberstalking and cyberbullying boundary is mapped to Section 354D of the Indian Penal Code 1860 and the carried-forward Section 78 of the Bharatiya Nyaya Sanhita 2023 effective from 1 July 2024.
For FACT aspirants and MSc digital forensics students working through cyber crime and information security modules at the applied level, and useful as a calibration drill before NFSU MSc entrance, GCFA, CHFI, and OSCP-track examinations. Questions emphasise statute mapping to fact patterns, sub-type distinction across malware and web-attack families, and protocol reasoning grounded in the IT Act 2000 with its 2008 amendment and the carried-forward BNS 2023 provisions.
Topics covered:
Useful for revision and self-testing before the FACT Digital Forensics paper.
Allow 30 minutes.
Questions are written and edited by the ForensicSpot team and cited from peer-reviewed forensic textbooks, official syllabi and primary case law. Each one is verified before publishing. Detailed explanations show after you submit, so the test stays a real test. See a mistake? Tell us.