500 ETI MCQ Must Do
500 ETI MCQ Must Do
500 ETI MCQ Must Do
22) Ethical hacker does not require ______ for effective operation.
a) Assets to be protected
b) Potential Threat source
c) Support by organization
d) Development life cycle
Ans :d)
23) _______ jack allows connection of analog TVs and other similar output
devices.
a) RCA
b) Audio out
c) USB
d) HDMI
Ans : (a)
24) ________ is competitor OS for Microsoft
a) Linux
b) Windows
c) Symbian
d) All of above
Ans : (a)
25) Which of the following is not community hacked port number
a) 18
b) 19
c) 20
d) 21
Ans : (a)
26) Forest Fire Detection is an example of _____
a) IOT Level 5
b) IOT Level 6
c) IOT Level 2
d) IOT Level 1
Ans :(a)
27) Keeping the software up to date is sign of
a) Good security
b) Bad security
c) A and B
d) None
Ans : (a)
28) Key criteria for handling of digital evidence is :
a) Proper protocol should be followed for acquisition of evidence
b) All material should be date and time stamped
c) All Artifacts physical and digital should be collected and retained
Ans : (d)
29) Which of the following is a part of social engineering life cycle?
a) Gaining information
b) User Identification
c) System monitoring
d) Shoulder Surfing
Ans : (a)
30) A chain of custody form is used to document which of the following?
a) Investigator who has been in contact with evidence in a case
b) Anyone who has not been in contact with evidence in a case
c) Anyone who has been in contact with evidence in an case
Ans : (c)
31) _______ is one with very little knowledge about hacking but uses free
tools and internet to perform malicious act.
a) Ex Employee
b) Script kiddies
c) Malicious Users
d) Gray Hat
Ans : (b)
32) Web server provide ______ as security mechanism.
a) ACL
b) Root directory
c) Both A and B
d) None
Ans : (c)
33) _______ tool is most versatile security tool for such security checks as
port scanning and firewall testing
a) Ether peek
b) Ettercap
c) Net cat
d) Nmap
Ans : (c)
34) Which of the following term suits more to White Hat Hackers?
a) Formar Black Hat
b) Formar Gray Hat
c) Fame Gainer
d) Security Professional
Ans : (d)
35) IOT stands for
a) Internet of Technology
b) Intranet of Things
c) Internet of Things
d) Information of Things
Ans : (c)
36) TCP is most widely used _______ protocol, that is used by web
browsers(along with HTTP,HTTPS application layer protocols), email
programs(SMPT application layer protocol)and file transfer(FTP).
a) Application Layer
b) Transport Layer
c) Network Layer
d) Link Layer
Ans : (b)
37) The correct Procedure followed according to the chain of custody for
electronic evidence is :
a] save the original material
b] Take photos of physical evidence
c] Take screenshots of digital evidence
d] Inject a Bit-for-Bit clone of digital evidence
e] Document , data ,time and any other information of receipt
f] Perform hash test analysis to further authenticate
Options :
a) A-b-c-e-d-f
b) A-c-b-d-e-f
c) C-a-d-f-e-b
d) C-a-d-e-f-b
Ans : (a)
38) One of the example of hackers on the basis of their work and mind set is
_____
a) Evading an intrusion prevention system
b) Supporting security
c) Promoting pollution in environment
d) None of these
Ans : (a)
39) IEEE 802.11 is a collection of wireless local area network(WLAN)
communication standards, including extensive description of the _____
a) Link layer
b) Application layer
c) Transport layer
d) Network layer
Ans : (a)
40) SQLMap supports __________
a) Open source and cross platforms
b) Supports database engines
c) Sniffing networks
d) All of these
Ans : (d)
41) What is rootkit?
a) A simple tool to gain access to the root of the windows system
b) An invasive program that affects file , including the kernal and libraries.
c) Tool to perform a buffer overflow
Ans : (b)
42) Computer programs that mimic the way of human brain processes
information is called________
a) Computer networks
b) Circuits Network
c) Neural Network
d) Humal Network
Ans : (c)
55) The message transfer capability can be set up on connections, either using
handshakes such as __ or without handshakes/acknowledgements such as
_____
a) TCP,UDP
b) UDP,TCP
c) HTTP,CoAP
d) CoAP,HTTP
Ans : (a)
56) Piggybacking onto a network through an insecure wireless configuration
is a _____
a) Default windows OS configuration
b) Weak SQL server administrator password
c) Operating system attack
d) Network infrastructure attack
Ans : (d)
57) When assessing the reliability of digital evidence, the investigator is
concerned with whether the computer that generated the evidence was
functioning normally and :
a) Whether chain of custody was maintained
b) Whether there are indications that the actual digital evidence was tampered
with
c) Whether the evidence was properly secured in transmit
d) Whether the evidence media compatible with forensic machines
Ans :b)
58) In forensic investigation, in which format the computer and data would
be, during the acquisition of the media
a) Protected
b) Non protected
c) Partially protected
d) Hidden
Ans : (a)
59) In an e-mail harassment case, the act of sending threatening messages via
a web-based e-mail service can leave a number of traces. Investigator can
obtain information from
a) Offende’s hard drive
b) Web server access logs
c) IP addresses
d) All of the mentioned
Ans : (d)
60) ____ is executed through the searching of single host for open ports
Ans : Port Scanning
61) ___ is not a commercial firewall
a) Nmap
b) EtherPeek
c) Ethereal
d) WebInspect
Ans : (a)
62) At what point should computer security professionals stop handling
digital evidence and contact law enforcement?
a) Stop an contact law enforcement whenever they detect a crime
b) When their organization’s policy specifies
c) When the task is beyond their training and experience
d) When they would be committing an offense by performing an action
Ans : (c)
63) Which of the following statement is wrong?
a) Investigator should not declare any confidential matters.
b) Investigator should respect privacy of others
c) Investigator should be honest and trustworthy
Ans :may be d-None
64) In ____ system has a single node as well as data is stored and analyzed
in the cloud application is cloud based.
a) IOT Level 1
b) IOT Level 2
c) IOT Level 3
d) IOT Level 4
Ans : (b)
65) In _______ multiple large messages can quickly fill total storage capacity
of an email server
a) Storage overload
b) Bandwidth blocking
c) A & B
d) None
Ans : (a)
66) _______ and _______ supports methods such as GET, PUT, POST and
DELETE.
a) HTTP,CoAP
b) Websocket,MQTT
c) XMPP,AMQP
d) None of these
Ans : (a)
67) The ARM micro-controller architecture is _______
a) Load-Store RISC Architecture
b) Load Store CISC Architecture
c) ROM Based Architecture
d) Hardwired Architecture
Ans : (a)
68) ZigBee is one of the most popular wireless technologies used by _____
a) WSN
b) MANET
c) Both a and b
d) None of the above
Ans : (a)
69) _________ form the basis of various applications.
a) Algorithms
b) Programs
c) Code
d) Testing
Ans : (a)
70) Scanning is performed in which phase of a pen test?
a) Pre-Attack
b) Attack
c) Post-Attack
d) Reconnaissance
Ans : (a)
71) 802.15.4 also called as _________
a) Ethernet
b) Wifi
c) WiMax
d) LR-WPAN
Ans : (d)
72) Which of the following are network analysing tools are supported by unix
OS
a) Ethereal
b) Ettercap
c) Dsniff
d) All of above
Ans : (d)
73) Digital Evidences may be in the form of
a) Email Messages
b) Office file
c) Registry
d) All of the above
Ans : (d)
a) IOT Level 3
b) IOT Level 4
c) IOT Level 5
d) IOT Level 6
Ans : (b)
74) To access the security of the system one must understand _____ of the
hacker.
a) Nature
b) Hobbies
c) Mindset
d) None of these
Ans : (c)
75) Do not store old sensitive or otherwise non public files on your web
server is countermeasure for
a) Directory traversal attack
b) XSS
c) SQL injection
d) All of above
Ans : (a)
76) 6LOWPAN provides data transfer rates of _________
a) 250Kb/s
b) 1.5 Mb/s
c) 100Mbit/s
d) 1 Gbit/s
Ans : (a)
77) WebSocket APIs ______ network traffic and latency as there is no
overhead for connection setup and termination requests for each messages.
a) Reduce
b) Increase
c) Both a and b
d) None of the above
Ans : (a)
78) ALU of ARM Microcontroller is ______ bit
a) 8
b) 32
c) 64
d) 10
Ans : (b)
79) To determine what evidence to collect first, you should access evidences
in ______ order of volatility.
a) Increasing
b) Decreasing
c) Any None of the above
Ans : (b)
80) IBMs Watson supercomputer comes under __________
a) General AI
b) Super AI
c) Narrow AI
d) All of these
Ans : (c)
81) SQL stands for
a) Simple Query Language
b) Structured Query Language
c) Standard Query Language
d) None
Ans : (b)
82) The most difficult task for an evidence handler is to substantiate the
________ at the judicial proceedings.
a) Copied Evidences
b) Persistent Evidence
c) Collected Evidence
d) Lost Evidence
Ans : (c)
83) The amateur in the field of hacking who don’t have may skills about
coding and in-depth working of security and hacking tools are called _____
a) Sponsored hackers
b) Whistle hackers
c) Hacktivists
d) Script Kiddies
Ans : (d)
84) ______ Sensors are used in smartphones, vehicles, aircrafts and other
applications to detect orientation of an object shake, tap, tilt, motion,
positioning, shock or vibration.
a) IR
b) Accelerometer
c) Image
d) Proximity
Ans : (b)
85) Ethical Hacking can be_______
a) Technical
b) Non-Technical
c) Both A and B
d) None of the above
Ans : (c)
86) An IOT device can collect various types of data from the on-board or
attached sensors, such as
a) Temperature
b) Humidity
c) Motion
d) All of the above
Ans : (d)
87) Hackers use a proxy server ___________
a) To create a stronger connection with target
b) To create a ghost server on the network
c) To obtain a remote access connection
d) To hide malicious activity on the network
Ans : (d)
88) Artificial Intelligence is the ability of a computer program to ________
a) Learn and Earn
b) Learn and Experience
c) Learn and Think
d) Learn and Teach
Ans : (c)
89) Some AI Languages are ______
a) PROLOG
b) LISP
c) NLP
d) All of the above
Ans : (d)
90) Case Background : The accused in the case were working in BPO, that
was handling the business of a multinational bank. The accused, during the
course of their work hand obtained the personal identification numbers (PIN)
and other confidential information of the bank’s customers
a) A-b-c-d-e
b) E-d-c-b-a
c) B-c-a-e-d
d) D-b-c-e-A
Ans :
91) Which of the following tool cannot be use to crack password?
a) LC4bs
b) Pwdump
c) John the Ripper
d) SuperScan
Ans : (d)
92) A couple of considerations are involved when dealing with digital
evidence check , the incorrect consideration involved:
a) Work with the original evidence to develop procedures
b) Use clean Collecting media
c) Document any extra scope
d) Consider safety of personnel at the scene
Ans : (a)
93) Criminal minded individuals who work for terrorist organizations and
steal information of nations and other secret intelligence for economical and
revenge type of gain are _____
a) State sponsored hackers
b) White hat hackers
c) Cyber terrorists
d) Red hat hackers
Ans : (c)
94) What is the meaning of CART in forensics science?
a) Statistical Application development Report Team
b) Classification and Regression Tree
c) Computer Analysis and Response team
d) Computer Application Research team
Ans : (c)
95) Following is not web application security vulnerability
a) SQL injection
b) Cross Site Scripting
c) Firewall
d) Directory traversal
Ans : (c)
96) In Mobile communication , 4G includes _
a) LTE
b) UMTS
c) CDMA
d) CDMA 2000
Ans : (a)
97) WAF stands for
a) Web Application Firewall
b) Wireless Application Firewall
c) Wired Application Firewall
d) Wide Application Firewll
Ans : (a)
163) How many phases in Road map for digital forensic research
a) 5
b) 6
c) 4
d) 7
Ans : b)
164) Which is not a context involved in identifying a piece of digital evidence
a) Physical
b) Logical
c) Electrical
d) Legal
Ans : c)
165) Digital evidence report does contain
a) Identity of the reporting agency
b) Case Investigator
c) Descriptive list of items submitted for examination
d) All of the mentioned
Ans : d)
166) Having a member of the search team trained to handle digital evidence
a) Can reduce the number of people who handle the evidence
b) Can help in the presentation of the case
c) Can help in the Integrity of the evidence
d) All of the above
Ans : d)
167) What is the primary of goal of Ethical hacker?
a) Avoid detection
b) Hacking
c) Find Security weakness
d) Testing
Ans : c)
168) Ethical hacker does not make user _____ in finding system
vulnerabilities?
a) Penetrating testing
b) Red teaming
c) Shoulder surfing
d) Intrusion testing
Ans : c)
169) What type of Ethical hack tests access to the physical infrastructure?
a) Internal Network
b) Remote Network
c) External Network
d) Physical access
Ans : d)
170) Knowledge of ethical hacker for evaluation results may consists of _____
a) Evaluating result
b) Corelating specific vulnerabilities
c) Simple evaluation process
d) All of these
Ans : d)
171) Which is the most secure operating system out of the following?
a) Windows
b) DOS
c) Novell Netware
d) Android
Ans : c)
172) Which of the following is likely to have highest knowledge about system
vulnerabilities?
a) Gray hat
b) White hat
c) Malicious users
d) Script kiddies
Ans : b)
173) _______ that sends social/, political messages may be as rumors.
a) Cracking
b) Analysis
c) Hactivism
d) Exploitation
Ans : c)
174) The theory of mechanization was developed by_____
a) Bertland Russel
b) Turing
c) Aristotle
d) Charles Babbage
Ans : b)
175) If a security audit is conducted by network administrator on internal
network then it is known as _____
a) Security testing
b) Gray Box testing
c) Black Box testing
d) White Box testing
Ans : d)
176) Ethical hacking means ____
a) Identifying weaknesses in computer system and network
b) Coming up with counter measures that protect the weaknesses
c) Tests organization information system against a verity of attacks
Ans : d)
177) Hacker attacks against insecure web applications via HTTP make up the
majority of all
a) Internet related attack
b) Message related attack
c) A & B
d) None
Ans : a)
178) Cracking passwords and encryption mechanism
a) Non -technical attack
b) Application attack
c) Network-infrastructure attack
d) Operating system attack
Ans : d)
179) An Excessive amount of ARP request can not be sign of ___
a) ARP poisoning attack
b) ARP spoofing
c) ARP tracking
d) None of these
Ans : b)
180) _____ is a common example of supervised learning
a) Voice recognition
b) Programming
c) Coding
d) None of these
Ans : a)
181) In Mobile communication, 3G includes____ and ____
a) UMTS and CDMA 2000
b) GSM and CDMA
c) GSM and UMTS
d) GMS and CDMA 2000
Ans : a)
182) _____ makes sense of unlabelled data without having any predefined
dataset for its training.
a) Unsupervised learning
b) Supervised learning
c) Human learning
d) Machine learning
Ans : a)
183) RMDFR stands for _____
a) Regional Marketing Director flood Retail
b) Road Map for digital forensic Research
c) Real managing Director for research
Ans : b)
184) ______ analyses the training data and produces function, which can be
used for mapping new examples.
a) Unsupervised learning
b) Deep learning Algorithm
c) Supervised learning algorithm
d) Neural network algorithm
Ans : c)
185) ARM________ handles all the computations that make a computer work
(taking input , doing calculations and producing output)
a) CPU
b) GPU
c) Both a and b
d) None of these
Ans : a)
186) ______ provides the users the ability to develop and deploy application
in the cloud using the development tools , application programming
interfaces(APIs), software libraries and services provided by the cloud service
provider.
a) LasS
b) PasS
c) SaaS
d) All of these
Ans : b)
187) ______ security mainly focuses on overall IOT system to identify
different security challenges, to design different security frameworks and to
provide proper security guidelines in order to maintain the security of a
network.
a) System
b) Application
c) Network
d) All of these
Ans : a)
188) Which of the following is capable of making systems that can learn new
tasks without human guidance but require prior training?
a) Deep Learning
b) Neural Networks
c) Machine learning
d) None of these
Ans : c)
189) Which is not IOT based home application
a) Smoke detectors
b) Intrusion Detection system
c) Gas detectors
d) Whether monitoring
Ans : d)
190) An IOT system comprises of _____ that provide sensing,actuation,
monitoring and control functions.
a) Communication
b) Device
c) Security
d) Application
Ans : b)
191) Noise Monitoring is an example of ____
a) IOT Level 3
b) IOT Level 4
c) IOT Level 5
d) IOT Level 6
Ans : b)
192) IOT devices are usually integrated into the _____ that allows them to
communicate and exchange data with other devices and systems
a) Internet
b) Intra network
c) Inter network
d) Information network
Ans : d)
193) The ________ layers are responsible for sending IP Datagram from the
source network to the destination network.
a) Network layer
b) Application layer
c) Transport layer
d) Link layer
Ans : a)
194) ________ is useful for time-sensitive applications that have very small
data units to exchange and do not want the overhead of connection setup.
a) TCP
b) UDP
c) CoAP
d) HTTP
Ans : b)
195) The AI system that can interact with the computer and understand natural
language spoken by human is called______
a) Gaming
b) Natural Language Processing
c) Expert Systems
d) Speech Recognition systems
Ans : b)
196) _______ is a data-centric middleware standard for device-to-device or
machine to machine-to-machine communication.
a) WebSocket
b) Data Distribution Service
c) Constrained Application protocol
d) None of these
Ans : b)
197) _____ Is based on TCP and allows streams of messages to be send back
and forth between the client and server while keeping the TCP connection open.
a) WebSocket
b) MQTT
c) DDS
d) AMQP
Ans : a)
198) Power consumption of ASIC is ________
a) High
b) Low
c) Zero
d) None of these
Ans : b)
199) Which of the following is not involved in audit report of system security?
a) Review Business Process
b) Checklist
c) Security Policies
d) Measures to prevent attacks
Ans : d)
200) Information gathered by Netscan tool pro do not include
a) Start IP Address
b) No of target IP addresses
c) Encryption key
d) All of these
Ans : (c)
201) _____ Specialize in clustering information and recognizing complex
patterns, giving computers the ability to use more sophisticated process to
analyse data
a) Artificial Intelligence
b) Machine Larning
c) Neural Network
d) Deep Learning
Ans : (c)
202) IOT Protocols in _____ are HTTP, CoAP, Websockets, MQTT, XMPP,
DDS, AMQP
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
Ans : (a)
203) In which of the following , learning means recognizing and understanding
the input data and making wise decision based on the supplied data.
a) Actual learning
b) Machine learning
c) Virtual learning
d) Deep Learning
Ans : (b)
204) ______ sensors detect the presence or absence of a nearby object without
any physical contact
a) Proximity
b) Image
c) Accelerometer
d) IR
Ans : (a)
205) _____ is data-centric middleware standard for device-to-device or
machine-to-machine communication
a) DDS
b) XMPP
c) AMQP
d) None of the above
Ans : (a)
206) Like HTTP, ______ is a web transfer protocol and uses a request-
response model, however it runs on top of UDP instead of TCP.
a) MQTT
b) CoAP
c) XMPP
d) AMQP
Ans : (b)
207) To validate your evidence, you must have___
a) Education
b) Trust
c) Knowledge
d) Power and skill
Ans : (d)
208) REST architectural constraints are as follows:
a) Client-server and stateless
b) cacheable and uniform interface
c) Layered system and code on demand
d) All of these
Ans : (d)
209) _______ is a branch of science that deals with programming the systems
in such way that they automatically learn and improve with experience
a) Artificial Intelligence
b) Machine learning
c) Neural network
d) Deep learning
Ans : (b)
210) When assessing the reliability of digital evidence.The investigator is
concerned with whether the computer that generated the evidence was
functioning normally, and :
a) Whether chain of custody was maintained
b) Whether there are indications that the actual digital evidence was tampered
with
c) Whether the evidence was properly secured in transmit
Ans : b)
211) Forensic categories of devices where evidence can be found________
a) Internet-based
b) Stand-alone computers or devices
c) Mobile devices
d) All of the mentioned
Ans : (d)
212) Do not store old sensitive or otherwise non public files on your web
server is countermeasure for
a) Directory traversal attack
b) XSS
c) SQL injection
d) All of above
Ans : (a)
213) Which was the first FBI Ragional computer laboratory was recognized in
2000?
a) Multimedia Laboratory
b) Programming Laboratory
c) Forensic laboratory
d) Software laboratory
Ans : (c)
214) _________ sensors are used in smartphones, vehicles, aircrafts and other
applications to detected orientation of an object, shake, tap, tilt, motion,
positioning, shock or vibration.
a) IR
b) Accelerometer
c) Image
d) Proximity
Ans : (b)
215) Which of the following is not a characteristics of 5G?
a) Low data transfer speed
b) Low latency
c) Higher download speeds
d) Increased network coverage
Ans : (a)
216) ____ cause havoc on system availability and storage space.
a) Inbox mails
b) Bulk mail
c) Draft mails
d) Spam(Junk e-mail)
Ans : (d)
217) ______ sensors are used in IOT systems to monitor systems and devices
that are driven by pressure signals.
a) Smoke
b) Pressure
c) Gas
d) Humidity
Ans : (b)
218) P2P stands for _____?
a) Private to public
b) Password to Password
c) Peer to peer
d) Process to product
Ans : (c)
219) If your wireless LAN network is compromised, you can experience ___
a) Loss of client server functions
b) Loss of sensitive information, including passwords , customer data and
intellectual property.
c) Establishment of client with new server connection
d) Only loss of network accessibility
Ans : (b)
220) In Digital Evidence, According to which principle , Contact between two
items will result in an exchange?
a) Cyber forensic exchange principle
b) Locard’s exchange principle
c) Best Evidence Principle
d) Culley’s principle
Ans : (b)
221) Media Gateways are located in ___ of NGN
a) Access layer
b) Transport layer
c) Control layer
d) Service layer
Ans : (a)
222) Running too many tests too quickly on a system causes____
a) Many system lockups
b) Crashing of system
c) Erasing of data
d) Restarting a system
Ans : (a)
223) In IDIP Model(which phase requires an investigator to walk through the
physical crime scene and identify pieces of physical evidence?
a) Documentation phase
b) Survey phase
c) Presentation phase
d) Reconstruction phase
Ans : (b)
224) A qualitative color scale is used when _____
a) Colors are used to represent data values
b) Colors are used to highlight
c) Colors are used to distinguish discrete items
d) Colors are used to represent descriptive data
Ans : (c)
225) Blockchain 2,0 is born in the year__
a) 2009
b) 2014
c) 2017
d) 2018
Ans : (b)
226) __ are the welcome sreens that divulge software version numbers and
other systems information on network hosts.
a) Hoardings
b) Posters
c) Clusters
d) Banners
Ans : (d)
227) MQTT stands for _____
a) Message Queue Telemetry Things
b) Message Queue Transport Things
c) Message Queue Telemetry Transport
d) Message Queue Transport Telemetry
Ans : (c)
228) Ethical hacking is _____
a) Identifying weakness in computer systems and / or computer networks and
coming up with counter measure that protect the weaknesses.
b) Identifying weakness in programmer and coming up with counter measure
that protect the weaknesses.
Ans : (a)
229) The victim computers think they need to send traffic to the attackers
computer , rather than the true destination computer, when communicating on
the network this is often referred to as a_____
a) Banner Grabbing
b) Man-in-the-Middle(MiTM) attack
c) Passive capturing
d) Port sweeping action
Ans : (b)
230) The block which has no previous block for reference is called as____?
a) Block 0
b) Block 1
c) Block 2
d) Block 3
Ans : (a)
231) WildPacketEtherPeek is used to for ________
a) Dozens of network security assessment functions
b) Including ping sweeps, port scanning and SMTP relay testing
c) Ping seeps and port scanning
d) Network analysis
e) Network scanning
Ans : (d)
232) In the retail industry, ________ sensors are used to monitor customers
visiting the store through IOT networks.
a) Motion
b) Gas
c) IR
d) Image
Ans : (d)
233) Nmap is a____
a) Widely used paid, and licensed security tool
b) Widely used commercial, freeware and open-source security tool
c) General paid security tool
d) Widely used commercial , freeware and open-source hacking tool
Ans : (b)
234) Which type of attack is “breaking file system security”?
a) Operating system attack
b) Network infrastructure attack
c) Technical attack
d) Application attack
Ans : (a)
235) In section 65, Tampering with computer source documents leads to the
penalty as:
a) Imprisonment upto three years, or / and with fine upto a, ‘200,000
b) Imprisonment upto three years, or / and with fine upto a, ‘100,000
c) Imprisonment upto three years, or / and with fine upto a, ‘500,000
d) Imprisonment upto life.
Ans : (a)
236) Which of the following is not a characteristics of IOT?
a) Self configuring
b) Unique identity
c) Self-adapting
d) Artificial-intelligence
Ans : (d)
237) Contracts, wills, invoices are examples of _____ ?
a) Illustrative evidence
b) Documented evidence
c) Explainable evidence
d) Substantial Evidence
Ans : (b)
238) The first block of blockchain is called as____?
a) Genesis block
b) Transaction block
c) Hash block
d) Famous block
Ans : (a)
239) Port-scan tests take time. The length of time depends on ____
a) Only the number of users in the network
b) Only the bandwidth of the network
c) Only the number of port scanned
d) The number of hosts in network, the number of ports scanned, the tools used,
and the speed of network links.
Ans : (d)
257) ___ is a software tool that basically scans the network to see how the
network is laid out and helps to identify unauthorized hosts or applications.
a) Piggybacking
b) Network analysis
c) Port Scanner
d) Google Dorking
Ans : (c)
258) Hypertext transfer protocol (HTTP) and Simple Mail Transfer
protocol(SMTP) application are frequently attacked because:
a) They are very simple
b) Their security mechanisms are not configured to allow full access to these
program from the internet
c) More firewalls and other security mechanisms and configured to allow full
access of these programs
Ans : (c)
259) As an Ethical hacker, you should scan all _____ UDP and _____ TCP
ports on each network host that’s found by your scanner
a) 65535 65535
b) 65538 65538
c) 65530 65530
d) 65537 65537
Ans : (a)
260) ___________ Protocols determine how the data is physically send over
the networks physical layer or medium.
a) Link layer
b) Physical Layer
c) Network Layer
d) Transport Layer
Ans : (a)
261) IDIP stands for ____
a) Integrated digital investigation process
b) Initial Digital Investigation Process
c) Integrated Direct Investigation process
d) Integrated Direct Internal Process
Ans : (a)
262) Mobile apps face increasing attacks given their prevalence in business
settings is categorised under ____ attack
a) Operating system
b) Network infrastructure
c) Application and specialised
d) Technical
Ans : (c)
263) Which of the following is type of volatile evidence?
a) Main Memory and temporary files
b) Routing tables and process table
c) Both option A and B
d) None of these
Ans : (c)
264) Classify the following type of attack
A DOS attack shuts down internet connection or entire network
a) Operating system attack
b) Network infrastructure attack
c) Application specific attack
d) Technical attack
Ans : (b)
265) _____ involves comparing a companys security policies to whats actually
taking place.
a) Security Auditing
b) Business processes
c) Software
d) Client processes
Ans : (a)
266) Which of the following are the considerations involved with digital
evidence?
a) Use clean collecting media
b) Document any extra scope
c) Consider safety of personnel at the scene
d) All of the above
Ans : (d)
267) Authentication and Authorization is used ______
a) For deleting data that is no longer needed
b) To protect gateways to the network, including ports,routers,and connected
devices
c) To determine how an organization deals with a disaster ,such as a cyber attack,
natural disaster, or large-scale equipment failure.
d)
Ans : may be d
268) ____ is a branch of science which deals with helping machine find
solutions to complex problems in a more human-life fashion.
a) IOT
b) Embeded system
c) Artificial Intelligence
d) Cyber Security
Ans : (c)
269) Identify the missing step in the following from executing the plan in the
ethical hacking process.
1] start by getting adequate background information about you organization, you
network system names and IO addresses.
2] Assess your results to get more-in-depth know-how on what you uncovered
3]___-----------
4]Narrow your focus more, concentrate on a specific test, and execute scans and other
detailed tests
a)
b)
c) Proceed to the implementation of appropriate countermeasures mechanisms
recommended from the findings.
d)
Ans : (c)
271) ________ Systems use security cameras and sensors (PIR sensors and door
sensors) to detect intrusion and raise alters.
a) Smart Lighting
b) Smoke/Gas Detectos
c) Intrusion Detection
d) Smart Parking
Ans : (c)
272) Data visualization tools provides an accessible way to see and understand
_______ in data
a) trends
b) outliners
c) patterns
d) all of these
Ans : (d)
273) The raw data collected from volatile sources belongs to____
a) Non-volatile Evidence
b) Collection Evidence
c) Volatile Evidence
d) None of these
Ans : (c)
274)________ are highly technical and publicly known security experts who not only
monitor and track computer ,network , and application vulnerabilities but also write
the tool and other code to exploit them
a) Security researchers
b) Hactivists
c) Script kiddies
d) Cyberterrorrists
Ans : (a)
275) Which one amongst the following is a network infrastructure vulnerabilitiey.
a) Any unauthorized employee gaining access to the password of a system
b) A malicious employee using a network analyzer can steal confidential
information in emails and files sent over the network
c) A malicious employee gaining authentication to enter into system files and
making
Ans : (b)
276) What is a dApp?
a) Type of blockchain
b) A type of Cryptocurrency
c) A decentralized application
d) Smart Contract
Ans : (c)
277) The _____ is a computing concept that describes the idea of everyday physical
objects being connected to the internet and being able to identify themselves to the
devices
a) Internet of things
b) Embeded System
c) Intranet of Things
d) Microprocessor
Ans : (a)
278) ____ is most commonly used for clustering similar input into logical
groups.
a) Unsupervised learning
b) Supervised learning
c) Deep learning
d) Human and Machine Learning
Ans : (a)
279) In the 3 dimentional philosophy of AI, the X dimension is ____
a) Reasoning
b) Knowledge
c) Computation
d) Vision
Ans : (c)
280) _________ Systems are suitable for solutions where data are involved in big,
however , the primary analysis requirement is not computationally intensive and can
be done locally itself.
a) IOT Level 1
b) IOT Level 2
c) IOT Level 3
d) IOT Level 4
Ans : (b)
281) _____ is not a network hacking tool
a) Telent
b) NetCat
c) CleanlisLog
d) A & B
Ans : (c)
282) ____ is DC motor that move in descrete steps.
a) Servo motor
b) Linear Actuator
c) Induction Motor
d) Stepper Motor
Ans : (d)
283) IOT level which is used for smart irrigation system
a) Level – 1
b) Level – 2
c) Level – 3
d) Level – 4
Ans : (b)
284) 6LOWPAN works with the ____ link layer protocol and defines
compression mechanisms for IPV6 datagrams over IEEE 802.15.4 based networks.
a) 802.11
b) 802.3
c) 802.16
d) 802.15.4
Ans : (d)
285) _____ can recognize the shape of the letters and convert it into editable
text
a) Handwriting recognition system
b) Voice recognition system
c) Text recognition system
d) Speech recognition systems
Ans : (a)
286) Most commonly used units for measurement are relative humidity (RH),
dew/frost point (D/F PT) and parts million (PPM)
a) Temperature
b) Humidity
c) motion
d) All of these
Ans : (b)
287) ____ is a transaction oriented and stateless protocol
a) HTTP
b) CoAP
c) UDP
d) TCP
Ans : (c)
288) ____ is a program that simulated a psychotherapist interacting with a
patient and successfully passed a turing test.
a) MAYA
b) ALEXA
c) MALISKA
d) ELIZA
Ans : (d)
289) Need of Artificial Intelligence has grown because of ____
a) Big data which is normally unstructured and vast for humans to comprehend
b) Supervised learning has shown promising results
c) Neural network which is algorithm used as replacement to human
Ans : (a)
290) BMP180 is a popular digital ____ sensor for use in mobile phones , PDAs,
GPS navigation devices and outdoor equipment
a) Pressure
b) Gas
c) Smoke
d) Image
Ans : (a)
291) ARM microcontrollers support for ____
a) Low level programming language
b) High level programming language
c) Both a and b
d) None of these
Ans : (c)
292) The WSN nodes are prone to ___
a) Malicious attacks
b) Eavesdropping
c) Interfaces
d) All of these
Ans : (d)
293) Web-socket based API allows_____ communication between client and
server
a) Bi-directional , full duplex
b) Uni-directional, half duplex
c) bi-directional, half duplex
d) Uni-directional, full duplex
Ans : (a)
294) ____ ensures reliable transmission of packets in order and also provides
error detection capability so that duplicate packets can be discarded and lost packets
are retransmitted.
a) UDP
b) TCP
c) HTTP
d) CoAP
Ans : (b)
299) An information which has positive impact on the action occurred, such as
the information supporting the incident is an___
a) Irrelevant evidence
b) Relevant evidence
c) Cannot say
d) All of these
Ans : (b)
300) Embedded system consists of ____
a) Input device , Microcontroller, and output device
b) Hardware and software device
c) Transmitter and Receiver device
d) Wifi and Bluetooth
Ans : (a)
301) FBI stands for ___
a) Federal Bureau of intelligence
b) Federal Bureau of Investigation
c) Feedback bureu of investigation
d) Fabric building of integration
Ans : b)
302) Digital evidence are used establish credible link between ____
a) Attacker and victim and crime scene
b) Attacker and the crime scene
c) victim and crime scene
d) Attacker and information
Ans : a)
303) The application data typically data , typically in files ,is embedded by the
____ protocol and encapsulated in the ___ protocol which provides connection or
transaction oriented communication over the network.
a) Application layer, Transport layer
b) Transport layer, Application layer
c) network layer,link layer
d) Link layer, Network layer
Ans : a)
304) State the purpose of Presentation phase in EEDIP model?
a) To obtain and study digital evidence
b) To preserve the investigation and finding
c) To summerize the evidence found in the process of investigation
d) None of these
Ans : c)
305) ____ forensic model follows waterfall model as every activity occurs in
sequence.
a) EMCI
b) IDIP
c) UMDFPM
d) none of these
Ans : a)
306) A logon record tells us that , at a specific time
a) An unknown person logged into the system using the account
b) The owner of a specific account logged into the system
c) The account was used to log into the system
Ans : c)
307) When accessing the reliability of digital evidence the investigator is
concerned with whether the computer that generated the evidence was functioning
normally and :
a) Whether chain of custody was maintained
b) Whether there are indications that the actual digital evidence was tampered
with
c) Whether the evidence was properly secured in transmit
d) Whether the evidence media was …
Ans : b)
308) Dried blood and fingerprints are ____ type of evidence
a) Substantial Evidence
b) Illustrative Evidence
c) Electronic Evidence
d) Documented Evidence
Ans : a)
309) Select the basic questions raised by ethical hackers during penetration testing
among the following a) what can an attacker do with available information b) What
information/locations/systems caDoes anyone at the target – an attacker gain access c)
what system notice
a) a,b
b) a,c
c) b,d
d) a,b,c,d
Ans : d)
310) Ethical hacking will allow to ____ all the massive security breaches.
a) remove
b) measure
c) reject
d) None of these
Ans : b)
311) Security assessments based around ethical hacking focus on ____
a) System vulnerabilities
b) Hacking processes
c) Password cracking
d) All of these
Ans : a)
312) ____ is not one of the different stages of hacking
a) Reconnaissance
b) Scanning
c) Compiling
d) Maintaining Access
Ans : c)
313) An examiner needs to access ___ immediately and extract that evidence before it
is lost
a) Disk
b) The cache and register
c) Archival Media
d) Log files
Ans : b)
314) Examples of hackers on basis of work and mind is / are ___
a) Exploiting a physical security
b) Bypassing web access controls
c) using overly trusting colleague’s user ID and password
d) All of these
Ans : d)
315) ______ ports are available in UDP
a) 66535
b) 66545
c) 66555
d) 66565
Ans : a)
316) ____determines email server version information based on how the server
responds to mail formed SMTP request.
a) Nmap scan
b) Tmap scan
c) Smtp scan
d) None
Ans : c)
317) which of the following is a wireless network attack
a) Encrypted traffic
b) Vulnerabilities wireless workstation
c) Rouge network
d) All of these
Ans : d)
318) ______ option tells Nmap to perform an faster scan
a) T3
b) T5
c) T4
d) T6
Ans : c)
319) Workstations have ton of security vulnerabilities like weak passwords to
unpatched security holes to storage of WEP keys such workstations are
a) Default Workstations
b) Vulnerable Workstations
c) Physical Workstations
d) None
Ans : b)
320) _____ attack can create never ending loop that bounces thousands of
messages back and forth between users
a) Autoresponder
b) Connection
c) Attachment overloading
d) None
Ans : a)
321) An EMIC model ______ is impacted by information from within and
outside the organization that will affect the investigation
a) Planning
b) Awareness
c) Authorization
d) Transport
Ans : a)
322) Which of the following port no is vulnerable to hacker HTTPs using TCP
protocol
a) 441
b) 442
c) 443
d) 444
Ans : c)
323) POP3 stands for
a) Post office program version 3
b) Post office protocol version 3
c) Post office process version 3
d) None
Ans : b)
324) Skills of ethical hackers may consists of ____
a) Trained hacker
b) Identify security problems with computer network
c) Capable of breaching security
d) all of these
Ans : d)
325) Which statement of the following is INCORRECT in view of ethical
hacker?
a) They are hired professional to penetrate in system
b) They find system vulnerabilities without proper authorization
c) They help making system secure and better
Ans : b)
326) _______ standards form the basis of specifications for high level
communication protocols such as ZigBee
a) IEEE 802.15.4
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.16
Ans : a)
327) Although crime scenes are typically photographed , it is good idea to create
diagrams of the crime scene because:
a) Diagtamming is a common crime scene technicians’s skill, however it
requires continual practice.
b) The process of creating a diagram can result in a digital investigator noticing
an important item of evidence that would otherwise have been missed.
Ans : b)
328) Some Arduino Board include ____ used for loading programs from the personal
computer
a) USB
b) HDMI
c) Rj45
d) none of these
Ans : a)
329) _____ is an actuator that creates motion in a straight line , in contrast to the
circular motion of a conventional electric motor
a) Relay
b) Solenoid
c) Linear Actuator
d) None of these
Ans : c)
330) In which system the forensic scienece plays as important role?
a) Criminal justice
b) Artifical intelligence
c) Machine learning
d) Deep Learning
Ans : a)
331) Whether Monitoring , Air Pollution Monitoring, Noise pollution Monitoring ,
Forest fire detection and River flood detection are belong to ____ domain specific IOT
a) Cities
b) Environment
c) Retail
d) Logistics
Ans : b)
332)The authentication, Authorization, Message and content integrity and data
security are functions of ____ functional block.
a) Service
b) Management
c) Security
d) Application
Ans : c)
333) _____ is a bi-directional, fully duplex communication model that uses a persistent
connection between the client and server.
a) Request-response
b) publish subscribe
c) Push-pull
d) Exclusive pair
Ans: d)
334) The ARM architecture users a _____ architecture which support separate data
and instruction buses for memories
a) Harvard
b) Von Neumann
c) Control ROM
d) Hardwired
Ans : a)
335) 6LOWPAN operates in the ____ frequency range.
a) 5GHz
b) 2.4GHz
c) 60GHz
d) 10GHz
Ans : b)
336) _____ does not provide guaranteed delivery, ordering of messages and duplicate
elimination.
a) CoAP
b) HTTP
c) TCP
d) UDP
Ans : d)
337) Coordinator acts as a gateway that connect the ____to the internet.
a) WSN
b) Sensors
c) Actuator
d) TCP
Ans : a)
338) ____ deals with learning a function from available training data.
a) Artificial Intelligence
b) Deep Learning
c) Neural Network
d) Supervised learning
Ans : d)
339) ___ allows bi-directional , full duplex communication between client and
servers.
a) Communication with REST APIs
b) WebSocket APIs
c) Both a and b
d) None of these
Ans : b)
340) DDS uses ___ model where publishers (e,g device that generate data)
create topics to which subscribes (e.g.devices that want to consume data) can
subscribe.
a) request-response
b) publish-subscribe
c) push-pull
d) Exclusive pair
Ans : b)
341) Guaranteed delivery and data integrity are handled by the ___ protocols.
a) TCP
b) UDP
c) CoAP
d) HTTP
Ans : a)
342) The WSN nodes are prone to___
a) Malicious attacks
b) Eavesdropping
c) interferences
d) All of these
Ans : d)
343) ___ is through supervised learning or learning from labelled data and
algorithms.
a) Deep learning
b) Machine Learning
c) Human learning
d) none of these
Ans : a)
344) how many important concepts are part of Artificial Intelligence
a) 1
b) 2
c) 3
d) 4
Ans : c)
345) which of the following has ability to Recognize, Understand and Act.
a) Data
b) Information
c) Knowledge
d) Intelligence
Ans : c)
346) Type 2 Artificial Intelligence machines are ___
a) Super AI
b) General AI
c) Weak AI
d) Limited Memory Machine
Ans : d)
347) IBMs Watson supercomputer comes under ___
a) General AI
b) Super AI
c) Narrow AI
d) All of above
Ans : c)
348) ___ Security works for IOT application to handle security issues according to
scenario requirement.
a) System
b) Application
c) Network
d) All of the above
Ans : b)
349) ___ contains local and cloud based observer nodes which can subscribe to and
receive information collected in the cloud from IOT device.
a) IOT Level 4
b) IOT Level 3
c) IOT Level 2
d) IOT level 1
Ans : a)
350) ____ provides the user the ability to provision computing and storage resources.
a) IaaS
b) PaaS
c) SaaS
d) All of the above
Ans : a)
351) 802.16m provides data rates of 100 Mbit/s for ___ and 1 Gbit/s for ___
a) Mobile station, fixed station
b) Fixed station, mobile station
c) Both a and b
d) None of the above
Ans : a)
352) ___ used to connect TV to Raspberry Pi.
a) USB
b) HDMI
c) RJ45
d) VGA
Ans : b)
353) Websocket APIS is follow ___ model
a) Request-Response Communication st-Response Communication
b) Publish Subscribe Communication
c) Push-Pull Communication
d) Exclusive Pair Communication
Ans : d)
354) WLAN stands for ____
a) Wireless Local Area Network
b) Wire Local Area Network
c) Wide Local Area Network
d) All of above
Ans : a)
a) White hat hackers, a hacker who gains access to systems with a view to fix the
identified weaknesses
b) Gray hat hacker, a hacker who is in between ethical and black hat hackers.
He/she breaks into computer systems without authority
c)hactivists , a hacker who use hacking to send social, religious, political,etc
messages.
d)
Ans b)
453) The skilled criminal experts who write some of the hacking tools, including the
scripts and other programs that the script kiddies and security professionals use are
known as____
a) Hactivists
b) Criminal Hackers
c) Script Kiddies
d) Security Professionals
Ans : b)
454) Which of the following chart types is best suited for showing proportions or
percentages?
a) Line chart
b) Scatter chart
c) Pie chart
d) Histogran
Ans : c)