500 ETI MCQ Must Do

Download as pdf or txt
Download as pdf or txt
You are on page 1of 72

ETI PREVIOUS YEAR MCQ ADDED

1) Hackers use resources as _________


a) Public computers at Libraries or kiosks
b) Registered website
c) Authorized computer at reception
d) None of these
Ans : a)
2) Deep learning is subfield of ________
a) Human Learning
b) Machine Learning
c) Source Learning
d) None of these
Ans: (b)
3) To determine what evidence to collect first, you should access evidences in
______ order of volatility.
a) Increasing
b) Decreasing
c) Any
d) None of these
Ans: b)
4) Which of the following is not a best practice for minimizing security risk
a) Use of encrypted msg
b) Disable unused protocol
c) Use of right software
d) Injection of malware in system
Ans: (d)
5) Unix is
a) Uniplexed Information and computing service
b) Unique information and computing service
c) User information and computing service
d) Universal information and computing service
Ans: (a)
6) Most of the wireless vulnerability are in
a) 802.09 protocol
b) 802.01 protocol
c) 802.11 protocol
d) 802.10 protocol
Ans: (c)
7) A _________ is a device that alters the physical quantity as it can cause a
mechanical component to move after getting some input from sensor .
a) Sensors
b) Actuators
c) Both a and b
d) None of the above
Ans : (b)
8) Encrypted data can be impossible to view without the ______
a) Key
b) Password
c) Evidence
d) None of the mentioned
Ans : (a)
9) In EMCI Model, ___________ is the phase during which crime is reported to
some authority
a) Awareness
b) Planning
c) Storage
d) Collection
Ans : (a)
10) When Accessing security and responding to security incidents a network
analyser can help you
a) View anomalous networking traffic
b) Develop baseline of network activity
c) Track down a intruder
d) All of above
Ans : (d)
11) _______ data is a data that is lost if the power is switched off.
a) Non-volatile
b) Volatile
c) Primary
d) Secondary
Ans : (b)
12) An EMCI model follows ______ as every activity occurs in sequence.
a) Agile model
b) Spiral model
c) Waterfall model
d) None of these
Ans : (c)
13) Vulnerability is nothing but
a) Weakness of a system
b) Strong points of a system
c) Both a & b
d) None
Ans : (a)
14) Guidelines selecting hacking tools may consists of ___________
a) Study of user guide for commercial tools
b) Detailed reports on the discovered vulnerabilities
c) Updated and supported when needed
d) All of these
Ans : (d)
15) Digital Evidences must follow the requirements of the _______
a) Ideal Evidence rule
b) Best Evidence rule
c) Exchange rule
d) All of the mentioned
Ans : (b)
16) Use of Ping sweep is
a) Identify live systems
b) Locate live systems
c) Identify open ports
d) Locate firewall
Ans : (a)
17) Enemies of information security are
a) Security researchers
b) Hacktivists
c) Cyber Terrorists
d) All of these
Ans : (d)
18) Network analyzer performs
a) Capture all networking traffic
b) Display it all in chronological order
c) Decode what is found in human readable format
d) All of these
Ans : (d)
19) DMZ Stands for
a) DeMiliterized Zone
b) DeMail Zone
c) DoMain Zone
d) None
Ans : (a)

20) Device that transforms electrical signals into physical movements


a) Sensors
b) Actuators
c) Switches
d) Display
Ans : (b)
21) Which obstacle will be handled by Investigation while achieving the goal
of DFI
a) Handle & Locate valid data from large storage
b) If file is secured , investigator must find way to read the protected data in an
unauthorized manner
c) Every case is different , Identifying the techniques and tools will take long
time
Ans : (d) All

22) Ethical hacker does not require ______ for effective operation.
a) Assets to be protected
b) Potential Threat source
c) Support by organization
d) Development life cycle
Ans :d)
23) _______ jack allows connection of analog TVs and other similar output
devices.
a) RCA
b) Audio out
c) USB
d) HDMI
Ans : (a)
24) ________ is competitor OS for Microsoft
a) Linux
b) Windows
c) Symbian
d) All of above
Ans : (a)
25) Which of the following is not community hacked port number
a) 18
b) 19
c) 20
d) 21
Ans : (a)
26) Forest Fire Detection is an example of _____
a) IOT Level 5
b) IOT Level 6
c) IOT Level 2
d) IOT Level 1
Ans :(a)
27) Keeping the software up to date is sign of
a) Good security
b) Bad security
c) A and B
d) None
Ans : (a)
28) Key criteria for handling of digital evidence is :
a) Proper protocol should be followed for acquisition of evidence
b) All material should be date and time stamped
c) All Artifacts physical and digital should be collected and retained
Ans : (d)
29) Which of the following is a part of social engineering life cycle?
a) Gaining information
b) User Identification
c) System monitoring
d) Shoulder Surfing
Ans : (a)
30) A chain of custody form is used to document which of the following?
a) Investigator who has been in contact with evidence in a case
b) Anyone who has not been in contact with evidence in a case
c) Anyone who has been in contact with evidence in an case
Ans : (c)
31) _______ is one with very little knowledge about hacking but uses free
tools and internet to perform malicious act.
a) Ex Employee
b) Script kiddies
c) Malicious Users
d) Gray Hat
Ans : (b)
32) Web server provide ______ as security mechanism.
a) ACL
b) Root directory
c) Both A and B
d) None
Ans : (c)
33) _______ tool is most versatile security tool for such security checks as
port scanning and firewall testing
a) Ether peek
b) Ettercap
c) Net cat
d) Nmap
Ans : (c)
34) Which of the following term suits more to White Hat Hackers?
a) Formar Black Hat
b) Formar Gray Hat
c) Fame Gainer
d) Security Professional
Ans : (d)
35) IOT stands for
a) Internet of Technology
b) Intranet of Things
c) Internet of Things
d) Information of Things
Ans : (c)
36) TCP is most widely used _______ protocol, that is used by web
browsers(along with HTTP,HTTPS application layer protocols), email
programs(SMPT application layer protocol)and file transfer(FTP).
a) Application Layer
b) Transport Layer
c) Network Layer
d) Link Layer
Ans : (b)
37) The correct Procedure followed according to the chain of custody for
electronic evidence is :
a] save the original material
b] Take photos of physical evidence
c] Take screenshots of digital evidence
d] Inject a Bit-for-Bit clone of digital evidence
e] Document , data ,time and any other information of receipt
f] Perform hash test analysis to further authenticate
Options :
a) A-b-c-e-d-f
b) A-c-b-d-e-f
c) C-a-d-f-e-b
d) C-a-d-e-f-b
Ans : (a)
38) One of the example of hackers on the basis of their work and mind set is
_____
a) Evading an intrusion prevention system
b) Supporting security
c) Promoting pollution in environment
d) None of these
Ans : (a)
39) IEEE 802.11 is a collection of wireless local area network(WLAN)
communication standards, including extensive description of the _____
a) Link layer
b) Application layer
c) Transport layer
d) Network layer
Ans : (a)
40) SQLMap supports __________
a) Open source and cross platforms
b) Supports database engines
c) Sniffing networks
d) All of these
Ans : (d)
41) What is rootkit?
a) A simple tool to gain access to the root of the windows system
b) An invasive program that affects file , including the kernal and libraries.
c) Tool to perform a buffer overflow
Ans : (b)
42) Computer programs that mimic the way of human brain processes
information is called________
a) Computer networks
b) Circuits Network
c) Neural Network
d) Humal Network
Ans : (c)

43) Apache Mahout is used for training___________


a) Support Vector Machines(SVMs)
b) Self-organizing maps
c) Hierarchical clustering
d) Naïve Bayes Classifier
Ans : (d)
44) Which of the following application are hacking targets on your network
a) Messaging application
b) Email
c) A and B
d) None
Ans : (c)
45) Ethical behind training how to hack a system
a) Think like hacker
b) Hacking system without permission
c) To hack vulnerable networking
d) To Corrupt Software using malware
Ans : (a)
46) Hacking for a cause is called_______
a) Active Hacking
b) Hacktivism
c) Activism
d) Black hat hacking
Ans : (b)
47) ______ belong to Email Attack
a) Email Bomb
b) Banner
c) Both A and B
d) None
Ans : (c)
48) Which of the following is not community hacked port number
a) 18
b) 19
c) 20
d) 21
Ans : (a)

49) A proof that is introduced in the form of physical object is referred as


______
a) Electronic evidence
b) Documented evidence
c) Substantial evidence
d) Explainable evidence
Ans : (c)
50) Illustrative evidence is also called as _________
a) Demonstrative Evidence
b) Explainable Evidence
c) Substantial Evidence
d) Documented Evidence
Ans : (a)
51) Planning and reconnaissance phase of penetration testing in hacking ____
a) Defines salary if hacker for testing
b) Defines test goals and intelligence is gathered
c) Avoids inspection in testing phase
d) Implements random process in penetration testing
Ans : (b)
52) Guidelines selecting hacking tools may consists of ________
a) Study the user guide for commercial tools
b) Detailed reports on the discovered vulnerabilities
c) Updated and supports when needed
d) All of these
Ans : (d)
53) Which of the following is not a computer networking device.
a) Router
b) Firewall
c) Generic Host
d) None
Ans : (d)
54) Which is not the type of tool that Is used by Ethical Hackers?
a) Nmap
b) .net Framework
c) Superscan
d) ToneLoc
Ans : (b)

55) The message transfer capability can be set up on connections, either using
handshakes such as __ or without handshakes/acknowledgements such as
_____
a) TCP,UDP
b) UDP,TCP
c) HTTP,CoAP
d) CoAP,HTTP
Ans : (a)
56) Piggybacking onto a network through an insecure wireless configuration
is a _____
a) Default windows OS configuration
b) Weak SQL server administrator password
c) Operating system attack
d) Network infrastructure attack
Ans : (d)
57) When assessing the reliability of digital evidence, the investigator is
concerned with whether the computer that generated the evidence was
functioning normally and :
a) Whether chain of custody was maintained
b) Whether there are indications that the actual digital evidence was tampered
with
c) Whether the evidence was properly secured in transmit
d) Whether the evidence media compatible with forensic machines
Ans :b)
58) In forensic investigation, in which format the computer and data would
be, during the acquisition of the media
a) Protected
b) Non protected
c) Partially protected
d) Hidden
Ans : (a)
59) In an e-mail harassment case, the act of sending threatening messages via
a web-based e-mail service can leave a number of traces. Investigator can
obtain information from
a) Offende’s hard drive
b) Web server access logs
c) IP addresses
d) All of the mentioned
Ans : (d)

60) ____ is executed through the searching of single host for open ports
Ans : Port Scanning
61) ___ is not a commercial firewall
a) Nmap
b) EtherPeek
c) Ethereal
d) WebInspect
Ans : (a)
62) At what point should computer security professionals stop handling
digital evidence and contact law enforcement?
a) Stop an contact law enforcement whenever they detect a crime
b) When their organization’s policy specifies
c) When the task is beyond their training and experience
d) When they would be committing an offense by performing an action
Ans : (c)
63) Which of the following statement is wrong?
a) Investigator should not declare any confidential matters.
b) Investigator should respect privacy of others
c) Investigator should be honest and trustworthy
Ans :may be d-None
64) In ____ system has a single node as well as data is stored and analyzed
in the cloud application is cloud based.
a) IOT Level 1
b) IOT Level 2
c) IOT Level 3
d) IOT Level 4
Ans : (b)
65) In _______ multiple large messages can quickly fill total storage capacity
of an email server
a) Storage overload
b) Bandwidth blocking
c) A & B
d) None
Ans : (a)
66) _______ and _______ supports methods such as GET, PUT, POST and
DELETE.
a) HTTP,CoAP
b) Websocket,MQTT
c) XMPP,AMQP
d) None of these
Ans : (a)
67) The ARM micro-controller architecture is _______
a) Load-Store RISC Architecture
b) Load Store CISC Architecture
c) ROM Based Architecture
d) Hardwired Architecture
Ans : (a)
68) ZigBee is one of the most popular wireless technologies used by _____
a) WSN
b) MANET
c) Both a and b
d) None of the above
Ans : (a)
69) _________ form the basis of various applications.
a) Algorithms
b) Programs
c) Code
d) Testing
Ans : (a)
70) Scanning is performed in which phase of a pen test?
a) Pre-Attack
b) Attack
c) Post-Attack
d) Reconnaissance
Ans : (a)
71) 802.15.4 also called as _________
a) Ethernet
b) Wifi
c) WiMax
d) LR-WPAN
Ans : (d)
72) Which of the following are network analysing tools are supported by unix
OS
a) Ethereal
b) Ettercap
c) Dsniff
d) All of above
Ans : (d)
73) Digital Evidences may be in the form of
a) Email Messages
b) Office file
c) Registry
d) All of the above
Ans : (d)

a) IOT Level 3
b) IOT Level 4
c) IOT Level 5
d) IOT Level 6
Ans : (b)
74) To access the security of the system one must understand _____ of the
hacker.
a) Nature
b) Hobbies
c) Mindset
d) None of these
Ans : (c)
75) Do not store old sensitive or otherwise non public files on your web
server is countermeasure for
a) Directory traversal attack
b) XSS
c) SQL injection
d) All of above
Ans : (a)
76) 6LOWPAN provides data transfer rates of _________
a) 250Kb/s
b) 1.5 Mb/s
c) 100Mbit/s
d) 1 Gbit/s
Ans : (a)
77) WebSocket APIs ______ network traffic and latency as there is no
overhead for connection setup and termination requests for each messages.
a) Reduce
b) Increase
c) Both a and b
d) None of the above
Ans : (a)
78) ALU of ARM Microcontroller is ______ bit
a) 8
b) 32
c) 64
d) 10
Ans : (b)
79) To determine what evidence to collect first, you should access evidences
in ______ order of volatility.
a) Increasing
b) Decreasing
c) Any None of the above
Ans : (b)
80) IBMs Watson supercomputer comes under __________
a) General AI
b) Super AI
c) Narrow AI
d) All of these
Ans : (c)
81) SQL stands for
a) Simple Query Language
b) Structured Query Language
c) Standard Query Language
d) None
Ans : (b)

82) The most difficult task for an evidence handler is to substantiate the
________ at the judicial proceedings.
a) Copied Evidences
b) Persistent Evidence
c) Collected Evidence
d) Lost Evidence
Ans : (c)
83) The amateur in the field of hacking who don’t have may skills about
coding and in-depth working of security and hacking tools are called _____
a) Sponsored hackers
b) Whistle hackers
c) Hacktivists
d) Script Kiddies
Ans : (d)
84) ______ Sensors are used in smartphones, vehicles, aircrafts and other
applications to detect orientation of an object shake, tap, tilt, motion,
positioning, shock or vibration.
a) IR
b) Accelerometer
c) Image
d) Proximity
Ans : (b)
85) Ethical Hacking can be_______
a) Technical
b) Non-Technical
c) Both A and B
d) None of the above
Ans : (c)
86) An IOT device can collect various types of data from the on-board or
attached sensors, such as
a) Temperature
b) Humidity
c) Motion
d) All of the above
Ans : (d)
87) Hackers use a proxy server ___________
a) To create a stronger connection with target
b) To create a ghost server on the network
c) To obtain a remote access connection
d) To hide malicious activity on the network
Ans : (d)
88) Artificial Intelligence is the ability of a computer program to ________
a) Learn and Earn
b) Learn and Experience
c) Learn and Think
d) Learn and Teach
Ans : (c)
89) Some AI Languages are ______
a) PROLOG
b) LISP
c) NLP
d) All of the above
Ans : (d)
90) Case Background : The accused in the case were working in BPO, that
was handling the business of a multinational bank. The accused, during the
course of their work hand obtained the personal identification numbers (PIN)
and other confidential information of the bank’s customers
a) A-b-c-d-e
b) E-d-c-b-a
c) B-c-a-e-d
d) D-b-c-e-A
Ans :
91) Which of the following tool cannot be use to crack password?
a) LC4bs
b) Pwdump
c) John the Ripper
d) SuperScan
Ans : (d)
92) A couple of considerations are involved when dealing with digital
evidence check , the incorrect consideration involved:
a) Work with the original evidence to develop procedures
b) Use clean Collecting media
c) Document any extra scope
d) Consider safety of personnel at the scene
Ans : (a)
93) Criminal minded individuals who work for terrorist organizations and
steal information of nations and other secret intelligence for economical and
revenge type of gain are _____
a) State sponsored hackers
b) White hat hackers
c) Cyber terrorists
d) Red hat hackers
Ans : (c)
94) What is the meaning of CART in forensics science?
a) Statistical Application development Report Team
b) Classification and Regression Tree
c) Computer Analysis and Response team
d) Computer Application Research team
Ans : (c)
95) Following is not web application security vulnerability
a) SQL injection
b) Cross Site Scripting
c) Firewall
d) Directory traversal
Ans : (c)
96) In Mobile communication , 4G includes _
a) LTE
b) UMTS
c) CDMA
d) CDMA 2000
Ans : (a)
97) WAF stands for
a) Web Application Firewall
b) Wireless Application Firewall
c) Wired Application Firewall
d) Wide Application Firewll
Ans : (a)

98) Vulnerabilities in database management system are


a) Loose access permissions
b) Excessive retension of sensitive data
c) Aggregation personly identifiable information
d) All of above
Ans : (d)
99) Ethical behind training how to hack system
a) Think like hacker
b) Hacking system without permission
c) To hack vulnerable networking
d) To corrupt software using malware
Ans : (a)
100) The Y dimension of AI philosophy in a 3 dimensional representation
consits of ____---
a) Cognition
b) Logic
c) Interface
d) Computation
Ans : c)
101) _______ is a tool for ethical hacking web application
a) Netsparker
b) Bursuite
c) Angry IP Scanner
d) GFI LanGuard
Ans : b)
102) Which of the following is not network analyzer detection tool
a) Sniffelet
b) PromiscDetect
c) NetFlow traffic Analyzer
d) All of the above
Ans : c)
103) _______ is a tool that scan vulnerability in web application
a) GFI LanGuard
b) Probely
c) Bursuite
d) Angry IP Scanner
Ans : b)
104) Which of the following hold the highest value of evidence in the court?
a) Documentary
b) Demonstrative
c) Testimonial
d) Real
Ans : d)
105) Obstacles(s) to protect from hackers attacks _______
a) Wide spread use of networking and internet connectivity
b) Greater number and availability of hacking tools
c) A and B
d) None of these
Ans : c)
106) Banners are intended for _____
a) Networking administration
b) White hat hacking
c) A&B
d) None of above
Ans : a)
107) ____ Is not one of the following different stages of hacking
a) Reconnaissance
b) Scanning
c) Compiling
d) Maintaining Access
Ans : c)
108) ____ tool is used for ping sweeps and port scanning
a) Sam spade
b) SuperScan
c) Both a & b
d) None
Ans : b)
109) Foot Printing is ___
a) Measuring the shoe size of an ethical hacker
b) Accumulation of data by gathering information on a target
c) Scanning a target network to detect operating system types
Ans : b)
110) To examine intelligently while gathering information about the target is
a) Investigation
b) Scanning
c) Tracing
d) Intelligent
Ans : a)
111) In 1995 , on which topic the International organization was found?
a) Computer security
b) Computer Evidence
c) Computer Network
d) Computer Graphics
Ans : b)
112) Hosting Obscene profiles and creating fake profiles comes under section
of law_____
a) 66 of Information Technology act
b) 67 of information technology act
c) 68 of information technology act
d) None of the above
Ans : b)
113) The Evidence or proof that is obtained from the electronic source is called
as _
a) Digital Evidence
b) Explainable Evidence
c) Demonstrative Evidence
d) Substantial Evidence
Ans : a)
114) When assessing security and responding to security incidents a network
analyzer can help you
a) View anomalous networking traffic
b) Develop baseline of network activity
c) Track down a intruder
d) All of above
Ans : d)
115) ______ norms should not satisfy by Investigator.
a) To be Honest and Trustworthy
b) Avoid harm to others
c) To declare any confidential matters or knowledge
d) To respect privacy of others
Ans : c)
116) Which one is the characteristic of digital evidence rule
a) Admissible
b) Complete
c) Authentic
d) All of the above
Ans : d)
117) Hash test analysis on digital evidence ensures that the data obtained from
bit-by-bit copy procedure is _____________ and reflects the nature of original
evidence
a) Not corrupt
b) Not correct
c) Admissible
d) Reliable
Ans : a)
118) In term of digital evidence, the internet is an example of :
a) Open computer systems
b) Communication systems
c) Embedded computer systems
d) None of the above
Ans : b)
119) The criminological principle states that contact between two items will
result in an exchange , is :
a) Locards exchange principle
b) Differential Association Theory
c) Beccaria’s Social Contract
d) None of the above
Ans : a)
120) How many models of Digital Forensics?
a) 6
b) 4
c) 5
d) 3
Ans : a)
121) Use of Port Scanning is
a) Scanning network to check who is there
b) Identify network to check who is there
c) Scanning network who is not there
d) None
Ans : a)
122) Which of the following is not a email bomb attack
a) Attachment overloading attack
b) Connection attack
c) DoS
d) Autoresponder attack
Ans :c)
123) A Branch of Science that deals with helping machines find solutions to
complex problems in human like fashion is called______
a) Embedded system
b) Cyber security
c) Artificial Intelligence
d) Internet of things
Ans : c)
124) On which things the forensic science is applied?
a) Big Data
b) Hacking
c) Criminal and civil action
d) Security
Ans : c)
125) Home automation is an example of ______
a) IOT Level 2
b) IOT Level 1
c) IOT Level 4
d) IOT Level 3
Ans : b)
126) MQTT Topics are ________
a) Simple floating point
b) Simple Integer
c) Simple symbol
d) Simple string
Ans : d)
127) Protocols are 802.3 Ethernet, 802.16 WiMax,2G/3G/LTE-
Cellular,802.11 Wifi,802.15.4-LRWPAN
a) Application Layer
b) Transport Layer
c) Network layer
d) Link Layer
Ans : d)
128) The AI technique that allows computers to understand relationship
between objects and events is called_____
a) Heuristic processing
b) Cognitive science
c) Relative Symbolism
d) Pattern Matching
Ans : d)
129) _______ uses Natural language processing for photo tagging.
a) Facebook
b) Whatsapp
c) Gmail
d) All of these
Ans : a)
130) Although crime scenes are typically photographed,it is good idea to
create diagrams of the crime scene because:
a) Diagramming is a common crime scene technician’s skill,however ,it
requires continual practice.
b) The process of creating a diagram can result in a digital investigator noticing
an important item of evidence that would otherwise have been missed.
Ans : b)
131) Social Engineering is the art of ________
a) Making online friends
b) Exploiting the human elements to gain access to unauthorized resources
c) Searching on internet for various things.
Ans : b)
132) Malicious software(malware) attack is among the type of ______
a) Application based attack
b) Operating system attack
c) Network infrastructure attack
d) Non-technical attack
Ans : a)
133) Knowledge of ethical hacker for evaluating results may consists of
________
a) Evaluating result
b) Corelating specific vulnerabilities
c) Simple evaluation process
d) All of these
Ans : d)
134) UDP Stands for ___
a) User Datagram protocol
b) Usage datagram protocol
c) Usecase datagram protocol
d) None
Ans : a)
135) DOS Denial of Service attack means_____
a) Breaking file-system security
b) Flooding a network with too many requests
c) Access to malicious software(s) from internet
d) Exploiting specific protocol
Ans : b)
136) AVR full form is______
a) Action virtual RAM
b) Advance Visible Risk
c) Advanced Virtual RISC
d) None of the above
Ans : c)
137) _______ Pushed the logical formalism to integrate reasoning with
knowledge
a) Bertrand Russel
b) Marvin Minsky
c) Charles Babbage
d) Aristotle
Ans : b)
138) Concept of DMZ is used in
a) Firewall
b) Antivirus
c) A & B
d) None
Ans : a)
139) Ping sweeping, port scanning, grabbing, banners etc. comes under
a) Application Hacking
b) Network Hacking
c) A & B
d) None
Ans : b)
140) In Nmap tool sP command is used for
a) Ping Scan
b) Port scan
c) Ping Sweep
d) All of the above
Ans : a)
141) SNMP Stands for ___
a) Single Network Management Protocol
b) Simple Network mobile protocol
c) Simple Network management protocol
d) None
Ans : c)
142) Flooding a network with too many requests this type of attack comes
under which category?
a) Non-technical attack
b) Operating system attacks
c) Network infrastructure attacks
d) Application and other specialized attacks
Ans : c)
143) A Hacker who identifies and exploits weaknesses in telephone instead of
computer is __
a) Script kiddies
b) Hacktivist
c) Phreaker
d) Cracker
Ans : c)
144) The most skilled hackers in the hackers community are_____
a) White hat hackers
b) Elite hackers
c) Licensed Penetration Testers
d) Red hat hackers
Ans : b)
145) Which statement of the following is incorrect in view of ethical hacker?
a) They are hired professions to penetrate in system
b) They find system vulnerabilities without proper authorization
c) They help making system secure and better.
Ans : b)
146) Case : The complaint received an obscene email from an unknown email
id . The complaint also noticed that obscene profiles along with photographs of
his daughter had been uploaded on matrimonial sites.
a) A-b-c-d
b) B-a-d-c
c) B-a-c-d
d) D-b-a-c
Ans :
147) Case Background: The complaint stated that some unknown person had
created an email-id using her name and had used this id to post messages on
five web pages describing her as a call-girl along with her contact numbers.As
a result she started
a) Creation of username to access and view web pages
b) The investigating team obtained the access logs of the public group and the
message to identify the IP Addresses used to post the messages.
c) The ISP was identified with the help of publicly available internet sites.
Ans : b)
148) In IDIP model, the goal of _____ phase is to ensure that operation and
infrastructure are able to fully supports an investigation.
a) Deployment
b) Readiness
c) Collection
d) Examination
Ans : b)
149) EEDIP model contains some of following phases.
a) Planning, search and collection
b) Identification, Collection and examination
c) Collect, report and evidence report
d) Readiness, Deployment ,Review
Ans : b)
150) An example of IOT Level 3 system is_____
a) Home Automation
b) Smart Irrigation
c) Tracking Package Handling
d) All of the above
Ans : c)
151) ______ is the process of collection, Organizing and analysing large sets
of data
a) Infrastructure-as-a-service
b) Platform-as-a-service
c) Software-as-a-service
d) Big data analytics
Ans : d)
152) ___________ uses a 32-bit address scheme that allows total of 232 or
4,294,967,296 addresses
a) IPv4
b) IPv6
c) 6LOWPAN
d) None of the above
Ans : a)
153) Zigbee offers data rates upto _____ and range from _______ depending
on the power output and environmental conditions.
a) 250KB/s,10 to 100m
b) 300KB/s,5 to 10m
c) 250KB/s,5 to 10 m
d) 300KB/s,10 to 100m
Ans : a)
154) In a Wireless sensor network a node which are unable to perform an
operation because of power failure and environment effects is known as ____
a) Normal node
b) Selfish Node
c) Failed node
d) Badly failed node
Ans : c)

155) Natural language Understanding is used in ______


a) Natural Language Interfaces
b) System for understanding text
c) Natural Language Front end
d) All of the above
Ans : d)
156) The term used for describing common sense part of problem solving is
called_______
a) Analytical
b) Value based
c) Heuristic
d) Critical
Ans : c)

157) Malicious Hackers may search_____


a) Organizer’s name
b) Computer network and systems names
c) IP Address
d) All of these
Ans : d)
158) State the purpose of Digital crime investigation phase in IDIP model?
a) To ensure infrastructure should be supported for investigation
b) To analyze physical evidence
c) To review whole investigation
d) To collect and analyze the digital evidence obtained from physical evidence
Ans : d)
159) EMIC model was proposed by______
a) Palmar
b) Olivier
c) Ciardhuian
d) None of these
Ans : c)
160) A Procedure to find the digital evidence is called_______
a) Investigation
b) Process
c) Authentication
d) All of these
Ans : a)
161) Which of the following is/are substantial Evidences?
a) DNA samples
b) Bill Invoice
c) Casts of footprints
d) Both DNA samples and casts of footprints
Ans : d)
162) Once you have collected the raw data from volatile sources you may be
able to ____
a) Delete the data
b) Shutdown the system
c) All of the above
d) Restart the system
Ans : b)

163) How many phases in Road map for digital forensic research
a) 5
b) 6
c) 4
d) 7
Ans : b)
164) Which is not a context involved in identifying a piece of digital evidence
a) Physical
b) Logical
c) Electrical
d) Legal
Ans : c)
165) Digital evidence report does contain
a) Identity of the reporting agency
b) Case Investigator
c) Descriptive list of items submitted for examination
d) All of the mentioned
Ans : d)
166) Having a member of the search team trained to handle digital evidence
a) Can reduce the number of people who handle the evidence
b) Can help in the presentation of the case
c) Can help in the Integrity of the evidence
d) All of the above
Ans : d)
167) What is the primary of goal of Ethical hacker?
a) Avoid detection
b) Hacking
c) Find Security weakness
d) Testing
Ans : c)
168) Ethical hacker does not make user _____ in finding system
vulnerabilities?
a) Penetrating testing
b) Red teaming
c) Shoulder surfing
d) Intrusion testing
Ans : c)

169) What type of Ethical hack tests access to the physical infrastructure?
a) Internal Network
b) Remote Network
c) External Network
d) Physical access
Ans : d)
170) Knowledge of ethical hacker for evaluation results may consists of _____
a) Evaluating result
b) Corelating specific vulnerabilities
c) Simple evaluation process
d) All of these
Ans : d)
171) Which is the most secure operating system out of the following?
a) Windows
b) DOS
c) Novell Netware
d) Android
Ans : c)
172) Which of the following is likely to have highest knowledge about system
vulnerabilities?
a) Gray hat
b) White hat
c) Malicious users
d) Script kiddies
Ans : b)
173) _______ that sends social/, political messages may be as rumors.
a) Cracking
b) Analysis
c) Hactivism
d) Exploitation
Ans : c)
174) The theory of mechanization was developed by_____
a) Bertland Russel
b) Turing
c) Aristotle
d) Charles Babbage
Ans : b)
175) If a security audit is conducted by network administrator on internal
network then it is known as _____
a) Security testing
b) Gray Box testing
c) Black Box testing
d) White Box testing
Ans : d)
176) Ethical hacking means ____
a) Identifying weaknesses in computer system and network
b) Coming up with counter measures that protect the weaknesses
c) Tests organization information system against a verity of attacks
Ans : d)
177) Hacker attacks against insecure web applications via HTTP make up the
majority of all
a) Internet related attack
b) Message related attack
c) A & B
d) None
Ans : a)
178) Cracking passwords and encryption mechanism
a) Non -technical attack
b) Application attack
c) Network-infrastructure attack
d) Operating system attack
Ans : d)
179) An Excessive amount of ARP request can not be sign of ___
a) ARP poisoning attack
b) ARP spoofing
c) ARP tracking
d) None of these
Ans : b)
180) _____ is a common example of supervised learning
a) Voice recognition
b) Programming
c) Coding
d) None of these
Ans : a)
181) In Mobile communication, 3G includes____ and ____
a) UMTS and CDMA 2000
b) GSM and CDMA
c) GSM and UMTS
d) GMS and CDMA 2000
Ans : a)
182) _____ makes sense of unlabelled data without having any predefined
dataset for its training.
a) Unsupervised learning
b) Supervised learning
c) Human learning
d) Machine learning
Ans : a)
183) RMDFR stands for _____
a) Regional Marketing Director flood Retail
b) Road Map for digital forensic Research
c) Real managing Director for research
Ans : b)
184) ______ analyses the training data and produces function, which can be
used for mapping new examples.
a) Unsupervised learning
b) Deep learning Algorithm
c) Supervised learning algorithm
d) Neural network algorithm
Ans : c)
185) ARM________ handles all the computations that make a computer work
(taking input , doing calculations and producing output)
a) CPU
b) GPU
c) Both a and b
d) None of these
Ans : a)
186) ______ provides the users the ability to develop and deploy application
in the cloud using the development tools , application programming
interfaces(APIs), software libraries and services provided by the cloud service
provider.
a) LasS
b) PasS
c) SaaS
d) All of these
Ans : b)
187) ______ security mainly focuses on overall IOT system to identify
different security challenges, to design different security frameworks and to
provide proper security guidelines in order to maintain the security of a
network.
a) System
b) Application
c) Network
d) All of these
Ans : a)
188) Which of the following is capable of making systems that can learn new
tasks without human guidance but require prior training?
a) Deep Learning
b) Neural Networks
c) Machine learning
d) None of these
Ans : c)
189) Which is not IOT based home application
a) Smoke detectors
b) Intrusion Detection system
c) Gas detectors
d) Whether monitoring
Ans : d)
190) An IOT system comprises of _____ that provide sensing,actuation,
monitoring and control functions.
a) Communication
b) Device
c) Security
d) Application
Ans : b)
191) Noise Monitoring is an example of ____
a) IOT Level 3
b) IOT Level 4
c) IOT Level 5
d) IOT Level 6
Ans : b)
192) IOT devices are usually integrated into the _____ that allows them to
communicate and exchange data with other devices and systems
a) Internet
b) Intra network
c) Inter network
d) Information network
Ans : d)
193) The ________ layers are responsible for sending IP Datagram from the
source network to the destination network.
a) Network layer
b) Application layer
c) Transport layer
d) Link layer
Ans : a)
194) ________ is useful for time-sensitive applications that have very small
data units to exchange and do not want the overhead of connection setup.
a) TCP
b) UDP
c) CoAP
d) HTTP
Ans : b)
195) The AI system that can interact with the computer and understand natural
language spoken by human is called______
a) Gaming
b) Natural Language Processing
c) Expert Systems
d) Speech Recognition systems
Ans : b)
196) _______ is a data-centric middleware standard for device-to-device or
machine to machine-to-machine communication.
a) WebSocket
b) Data Distribution Service
c) Constrained Application protocol
d) None of these
Ans : b)

197) _____ Is based on TCP and allows streams of messages to be send back
and forth between the client and server while keeping the TCP connection open.
a) WebSocket
b) MQTT
c) DDS
d) AMQP
Ans : a)
198) Power consumption of ASIC is ________
a) High
b) Low
c) Zero
d) None of these
Ans : b)
199) Which of the following is not involved in audit report of system security?
a) Review Business Process
b) Checklist
c) Security Policies
d) Measures to prevent attacks
Ans : d)
200) Information gathered by Netscan tool pro do not include
a) Start IP Address
b) No of target IP addresses
c) Encryption key
d) All of these
Ans : (c)
201) _____ Specialize in clustering information and recognizing complex
patterns, giving computers the ability to use more sophisticated process to
analyse data
a) Artificial Intelligence
b) Machine Larning
c) Neural Network
d) Deep Learning
Ans : (c)
202) IOT Protocols in _____ are HTTP, CoAP, Websockets, MQTT, XMPP,
DDS, AMQP
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
Ans : (a)
203) In which of the following , learning means recognizing and understanding
the input data and making wise decision based on the supplied data.
a) Actual learning
b) Machine learning
c) Virtual learning
d) Deep Learning
Ans : (b)
204) ______ sensors detect the presence or absence of a nearby object without
any physical contact
a) Proximity
b) Image
c) Accelerometer
d) IR
Ans : (a)
205) _____ is data-centric middleware standard for device-to-device or
machine-to-machine communication
a) DDS
b) XMPP
c) AMQP
d) None of the above
Ans : (a)
206) Like HTTP, ______ is a web transfer protocol and uses a request-
response model, however it runs on top of UDP instead of TCP.
a) MQTT
b) CoAP
c) XMPP
d) AMQP
Ans : (b)
207) To validate your evidence, you must have___
a) Education
b) Trust
c) Knowledge
d) Power and skill
Ans : (d)
208) REST architectural constraints are as follows:
a) Client-server and stateless
b) cacheable and uniform interface
c) Layered system and code on demand
d) All of these
Ans : (d)
209) _______ is a branch of science that deals with programming the systems
in such way that they automatically learn and improve with experience
a) Artificial Intelligence
b) Machine learning
c) Neural network
d) Deep learning
Ans : (b)
210) When assessing the reliability of digital evidence.The investigator is
concerned with whether the computer that generated the evidence was
functioning normally, and :
a) Whether chain of custody was maintained
b) Whether there are indications that the actual digital evidence was tampered
with
c) Whether the evidence was properly secured in transmit
Ans : b)
211) Forensic categories of devices where evidence can be found________
a) Internet-based
b) Stand-alone computers or devices
c) Mobile devices
d) All of the mentioned
Ans : (d)
212) Do not store old sensitive or otherwise non public files on your web
server is countermeasure for
a) Directory traversal attack
b) XSS
c) SQL injection
d) All of above
Ans : (a)
213) Which was the first FBI Ragional computer laboratory was recognized in
2000?
a) Multimedia Laboratory
b) Programming Laboratory
c) Forensic laboratory
d) Software laboratory
Ans : (c)
214) _________ sensors are used in smartphones, vehicles, aircrafts and other
applications to detected orientation of an object, shake, tap, tilt, motion,
positioning, shock or vibration.
a) IR
b) Accelerometer
c) Image
d) Proximity
Ans : (b)
215) Which of the following is not a characteristics of 5G?
a) Low data transfer speed
b) Low latency
c) Higher download speeds
d) Increased network coverage
Ans : (a)
216) ____ cause havoc on system availability and storage space.
a) Inbox mails
b) Bulk mail
c) Draft mails
d) Spam(Junk e-mail)
Ans : (d)
217) ______ sensors are used in IOT systems to monitor systems and devices
that are driven by pressure signals.
a) Smoke
b) Pressure
c) Gas
d) Humidity
Ans : (b)
218) P2P stands for _____?
a) Private to public
b) Password to Password
c) Peer to peer
d) Process to product
Ans : (c)
219) If your wireless LAN network is compromised, you can experience ___
a) Loss of client server functions
b) Loss of sensitive information, including passwords , customer data and
intellectual property.
c) Establishment of client with new server connection
d) Only loss of network accessibility
Ans : (b)
220) In Digital Evidence, According to which principle , Contact between two
items will result in an exchange?
a) Cyber forensic exchange principle
b) Locard’s exchange principle
c) Best Evidence Principle
d) Culley’s principle
Ans : (b)
221) Media Gateways are located in ___ of NGN
a) Access layer
b) Transport layer
c) Control layer
d) Service layer
Ans : (a)
222) Running too many tests too quickly on a system causes____
a) Many system lockups
b) Crashing of system
c) Erasing of data
d) Restarting a system
Ans : (a)
223) In IDIP Model(which phase requires an investigator to walk through the
physical crime scene and identify pieces of physical evidence?
a) Documentation phase
b) Survey phase
c) Presentation phase
d) Reconstruction phase
Ans : (b)
224) A qualitative color scale is used when _____
a) Colors are used to represent data values
b) Colors are used to highlight
c) Colors are used to distinguish discrete items
d) Colors are used to represent descriptive data
Ans : (c)
225) Blockchain 2,0 is born in the year__
a) 2009
b) 2014
c) 2017
d) 2018
Ans : (b)
226) __ are the welcome sreens that divulge software version numbers and
other systems information on network hosts.
a) Hoardings
b) Posters
c) Clusters
d) Banners
Ans : (d)
227) MQTT stands for _____
a) Message Queue Telemetry Things
b) Message Queue Transport Things
c) Message Queue Telemetry Transport
d) Message Queue Transport Telemetry
Ans : (c)
228) Ethical hacking is _____
a) Identifying weakness in computer systems and / or computer networks and
coming up with counter measure that protect the weaknesses.
b) Identifying weakness in programmer and coming up with counter measure
that protect the weaknesses.
Ans : (a)
229) The victim computers think they need to send traffic to the attackers
computer , rather than the true destination computer, when communicating on
the network this is often referred to as a_____
a) Banner Grabbing
b) Man-in-the-Middle(MiTM) attack
c) Passive capturing
d) Port sweeping action
Ans : (b)
230) The block which has no previous block for reference is called as____?
a) Block 0
b) Block 1
c) Block 2
d) Block 3
Ans : (a)
231) WildPacketEtherPeek is used to for ________
a) Dozens of network security assessment functions
b) Including ping sweeps, port scanning and SMTP relay testing
c) Ping seeps and port scanning
d) Network analysis
e) Network scanning
Ans : (d)
232) In the retail industry, ________ sensors are used to monitor customers
visiting the store through IOT networks.
a) Motion
b) Gas
c) IR
d) Image
Ans : (d)
233) Nmap is a____
a) Widely used paid, and licensed security tool
b) Widely used commercial, freeware and open-source security tool
c) General paid security tool
d) Widely used commercial , freeware and open-source hacking tool
Ans : (b)
234) Which type of attack is “breaking file system security”?
a) Operating system attack
b) Network infrastructure attack
c) Technical attack
d) Application attack
Ans : (a)
235) In section 65, Tampering with computer source documents leads to the
penalty as:
a) Imprisonment upto three years, or / and with fine upto a, ‘200,000
b) Imprisonment upto three years, or / and with fine upto a, ‘100,000
c) Imprisonment upto three years, or / and with fine upto a, ‘500,000
d) Imprisonment upto life.
Ans : (a)
236) Which of the following is not a characteristics of IOT?
a) Self configuring
b) Unique identity
c) Self-adapting
d) Artificial-intelligence
Ans : (d)
237) Contracts, wills, invoices are examples of _____ ?
a) Illustrative evidence
b) Documented evidence
c) Explainable evidence
d) Substantial Evidence
Ans : (b)
238) The first block of blockchain is called as____?
a) Genesis block
b) Transaction block
c) Hash block
d) Famous block
Ans : (a)
239) Port-scan tests take time. The length of time depends on ____
a) Only the number of users in the network
b) Only the bandwidth of the network
c) Only the number of port scanned
d) The number of hosts in network, the number of ports scanned, the tools used,
and the speed of network links.
Ans : (d)

240) ______ is a branch of forensic science encompassing the recovery and


investigation of material found in digital evidence.
a) Analog forensic
b) Digital forensic
c) Cyber forensic
d) Computer forensic
Ans : (b)
241) The intent of ethical hacking _____
a) To discover the hacker who hacks the secure systems
b) To promote the malicious attackers hack the to better secure systems
c) To discover vulnerabilities from a malicious attackers viewpoint to better
secure system
Ans : (c)
242) _____ try to compromise computers and sensitive information for ill-
gotton-gains usually from the outside as an unauthorized user.
a) Programmers
b) Computer Engineers
c) Hackers
d) Breakers
Ans : (c)
243) ______ tool is used for windows and network queries from the DNS
lookup to trace routes?
a) SuperScan
b) SamSpade
c) NetCat
d) NetScan
Ans : (b)
244) _____ is a light-weight messaging protocol based on the publish-
subscribe model.
a) Message Queue Telemetry Transport
b) Extensible Messaging and presence Protocol
c) Data Distribution Service
d) Advanced message queuing protocol
Ans : (a)
245) _____ is the first step in creating a data storytelling presentation?
a) Gathering and analyzing data
b) Creating visulaization
c) Writing a script
d) Rahearsing the presentation
Ans : (a)
246) In which type of evidence, the objects like x-rays, maps are represented
as form of proof?
a) Electronic Evidence
b) Documented Evidence
c) Illustrative Evidence
d) Testimonial
Ans : (c)
247) Documented evidence is same as ___ where the proof is presented in
writing?
a) Demonstrative
b) Destructive
c) Testimonial
d) Illustrative
Ans : (a)
248) The _____ is located in the service providers network and is under the
control of the MGC or application server ,to provide announcements and tones
and collect user information
a) Media server
b) Application server
c) IP core Network
d) Access network
Ans : (a)
249) Graphical representation of data and information Is ____
a) Data storytelling
b) Data visualization
c) Cartesian coordinate system
d) Polar coordinate system
Ans : (b)
250) ____ occurs when the user input is sent to an interpreter as part of
command or query and trick the interpreter into executing unintended
commands and gives access to unauthorized data.
a) SQL injection
b) CSS
c) Banner
d) Google Dorking
Ans : (a)
251) ____ uses a network of sensors to monitor the vibration levels in the
structures such as bridges and buildings.
a) Smart roads
b) Smart parking
c) Structural Health Monitoring
d) Fleet Tracking
Ans : (c)
252) The ___________ receive content from the application support functions
and service support functions ,process and deliver it to the end-user functions
using the capabilities of the transport functions, under control of the service
control functions.
a) Service control functions(SCF)
b) Content Delivery functions(CDF)
c) Application support functions(ASF)
d) End-user functions
Ans : (b)
253) Which port is used for Telnet?
a) Port 23
b) Port 7
c) Port 21
d) Port 19
Ans : (a)
254) _______ provides functions which as error control, segmentation, flow
control and congestion control.
a) Link Layer
b) Network Layer
c) Transport Layer
d) Application Layer
Ans : (c)
255) ______ protocol allows full duplex communication over a single socket
connection for sending messages between client and server.
a) Web Socket
b) MQTT
c) XMPP
d) AMQP
Ans : (a)
256) Blockchain is a ____?
a) Centralized ledger
b) Distributed ledger on a peer to peer network
c) Currency
d) Cryptocurrency
Ans : (b)

257) ___ is a software tool that basically scans the network to see how the
network is laid out and helps to identify unauthorized hosts or applications.
a) Piggybacking
b) Network analysis
c) Port Scanner
d) Google Dorking
Ans : (c)
258) Hypertext transfer protocol (HTTP) and Simple Mail Transfer
protocol(SMTP) application are frequently attacked because:
a) They are very simple
b) Their security mechanisms are not configured to allow full access to these
program from the internet
c) More firewalls and other security mechanisms and configured to allow full
access of these programs
Ans : (c)
259) As an Ethical hacker, you should scan all _____ UDP and _____ TCP
ports on each network host that’s found by your scanner
a) 65535 65535
b) 65538 65538
c) 65530 65530
d) 65537 65537
Ans : (a)
260) ___________ Protocols determine how the data is physically send over
the networks physical layer or medium.
a) Link layer
b) Physical Layer
c) Network Layer
d) Transport Layer
Ans : (a)
261) IDIP stands for ____
a) Integrated digital investigation process
b) Initial Digital Investigation Process
c) Integrated Direct Investigation process
d) Integrated Direct Internal Process
Ans : (a)
262) Mobile apps face increasing attacks given their prevalence in business
settings is categorised under ____ attack
a) Operating system
b) Network infrastructure
c) Application and specialised
d) Technical
Ans : (c)
263) Which of the following is type of volatile evidence?
a) Main Memory and temporary files
b) Routing tables and process table
c) Both option A and B
d) None of these
Ans : (c)
264) Classify the following type of attack
A DOS attack shuts down internet connection or entire network
a) Operating system attack
b) Network infrastructure attack
c) Application specific attack
d) Technical attack
Ans : (b)
265) _____ involves comparing a companys security policies to whats actually
taking place.
a) Security Auditing
b) Business processes
c) Software
d) Client processes
Ans : (a)
266) Which of the following are the considerations involved with digital
evidence?
a) Use clean collecting media
b) Document any extra scope
c) Consider safety of personnel at the scene
d) All of the above
Ans : (d)
267) Authentication and Authorization is used ______
a) For deleting data that is no longer needed
b) To protect gateways to the network, including ports,routers,and connected
devices
c) To determine how an organization deals with a disaster ,such as a cyber attack,
natural disaster, or large-scale equipment failure.
d)
Ans : may be d
268) ____ is a branch of science which deals with helping machine find
solutions to complex problems in a more human-life fashion.
a) IOT
b) Embeded system
c) Artificial Intelligence
d) Cyber Security
Ans : (c)

269) Identify the missing step in the following from executing the plan in the
ethical hacking process.
1] start by getting adequate background information about you organization, you
network system names and IO addresses.
2] Assess your results to get more-in-depth know-how on what you uncovered
3]___-----------
4]Narrow your focus more, concentrate on a specific test, and execute scans and other
detailed tests
a)
b)
c) Proceed to the implementation of appropriate countermeasures mechanisms
recommended from the findings.
d)
Ans : (c)
271) ________ Systems use security cameras and sensors (PIR sensors and door
sensors) to detect intrusion and raise alters.
a) Smart Lighting
b) Smoke/Gas Detectos
c) Intrusion Detection
d) Smart Parking
Ans : (c)
272) Data visualization tools provides an accessible way to see and understand
_______ in data
a) trends
b) outliners
c) patterns
d) all of these
Ans : (d)
273) The raw data collected from volatile sources belongs to____
a) Non-volatile Evidence
b) Collection Evidence
c) Volatile Evidence
d) None of these
Ans : (c)
274)________ are highly technical and publicly known security experts who not only
monitor and track computer ,network , and application vulnerabilities but also write
the tool and other code to exploit them
a) Security researchers
b) Hactivists
c) Script kiddies
d) Cyberterrorrists
Ans : (a)
275) Which one amongst the following is a network infrastructure vulnerabilitiey.
a) Any unauthorized employee gaining access to the password of a system
b) A malicious employee using a network analyzer can steal confidential
information in emails and files sent over the network
c) A malicious employee gaining authentication to enter into system files and
making
Ans : (b)
276) What is a dApp?
a) Type of blockchain
b) A type of Cryptocurrency
c) A decentralized application
d) Smart Contract
Ans : (c)
277) The _____ is a computing concept that describes the idea of everyday physical
objects being connected to the internet and being able to identify themselves to the
devices
a) Internet of things
b) Embeded System
c) Intranet of Things
d) Microprocessor
Ans : (a)
278) ____ is most commonly used for clustering similar input into logical
groups.
a) Unsupervised learning
b) Supervised learning
c) Deep learning
d) Human and Machine Learning
Ans : (a)
279) In the 3 dimentional philosophy of AI, the X dimension is ____
a) Reasoning
b) Knowledge
c) Computation
d) Vision
Ans : (c)
280) _________ Systems are suitable for solutions where data are involved in big,
however , the primary analysis requirement is not computationally intensive and can
be done locally itself.
a) IOT Level 1
b) IOT Level 2
c) IOT Level 3
d) IOT Level 4
Ans : (b)
281) _____ is not a network hacking tool
a) Telent
b) NetCat
c) CleanlisLog
d) A & B
Ans : (c)
282) ____ is DC motor that move in descrete steps.
a) Servo motor
b) Linear Actuator
c) Induction Motor
d) Stepper Motor
Ans : (d)
283) IOT level which is used for smart irrigation system
a) Level – 1
b) Level – 2
c) Level – 3
d) Level – 4
Ans : (b)
284) 6LOWPAN works with the ____ link layer protocol and defines
compression mechanisms for IPV6 datagrams over IEEE 802.15.4 based networks.
a) 802.11
b) 802.3
c) 802.16
d) 802.15.4
Ans : (d)
285) _____ can recognize the shape of the letters and convert it into editable
text
a) Handwriting recognition system
b) Voice recognition system
c) Text recognition system
d) Speech recognition systems
Ans : (a)
286) Most commonly used units for measurement are relative humidity (RH),
dew/frost point (D/F PT) and parts million (PPM)
a) Temperature
b) Humidity
c) motion
d) All of these
Ans : (b)
287) ____ is a transaction oriented and stateless protocol
a) HTTP
b) CoAP
c) UDP
d) TCP
Ans : (c)
288) ____ is a program that simulated a psychotherapist interacting with a
patient and successfully passed a turing test.
a) MAYA
b) ALEXA
c) MALISKA
d) ELIZA
Ans : (d)
289) Need of Artificial Intelligence has grown because of ____
a) Big data which is normally unstructured and vast for humans to comprehend
b) Supervised learning has shown promising results
c) Neural network which is algorithm used as replacement to human
Ans : (a)
290) BMP180 is a popular digital ____ sensor for use in mobile phones , PDAs,
GPS navigation devices and outdoor equipment
a) Pressure
b) Gas
c) Smoke
d) Image
Ans : (a)
291) ARM microcontrollers support for ____
a) Low level programming language
b) High level programming language
c) Both a and b
d) None of these
Ans : (c)
292) The WSN nodes are prone to ___
a) Malicious attacks
b) Eavesdropping
c) Interfaces
d) All of these
Ans : (d)
293) Web-socket based API allows_____ communication between client and
server
a) Bi-directional , full duplex
b) Uni-directional, half duplex
c) bi-directional, half duplex
d) Uni-directional, full duplex
Ans : (a)
294) ____ ensures reliable transmission of packets in order and also provides
error detection capability so that duplicate packets can be discarded and lost packets
are retransmitted.
a) UDP
b) TCP
c) HTTP
d) CoAP
Ans : (b)

295) IOT Level which is used for Tracking Package Handling.


a) Level 1
b) Level 2
c) Level 3
d) Level 4
Ans : (c)
296) in UMDFPM, -_____ phase is not there in this model
a) Examine
b) Hypothesis
c) Analysis
d) Report
Ans : (b)
297) In EMIC model, _____ is the phase where nature of investigation has been
identified.
a) Awareness
b) Authorization
c) Planning
d) Collection
Ans : (b)
298) In IDIP model , the goal of ____ phase is to collect and analyze the digital
evidence
a) Hypothesis
b) Deployment
c) Digital crime investigation
d) Review
Ans : (c)

299) An information which has positive impact on the action occurred, such as
the information supporting the incident is an___
a) Irrelevant evidence
b) Relevant evidence
c) Cannot say
d) All of these
Ans : (b)
300) Embedded system consists of ____
a) Input device , Microcontroller, and output device
b) Hardware and software device
c) Transmitter and Receiver device
d) Wifi and Bluetooth
Ans : (a)
301) FBI stands for ___
a) Federal Bureau of intelligence
b) Federal Bureau of Investigation
c) Feedback bureu of investigation
d) Fabric building of integration
Ans : b)
302) Digital evidence are used establish credible link between ____
a) Attacker and victim and crime scene
b) Attacker and the crime scene
c) victim and crime scene
d) Attacker and information
Ans : a)
303) The application data typically data , typically in files ,is embedded by the
____ protocol and encapsulated in the ___ protocol which provides connection or
transaction oriented communication over the network.
a) Application layer, Transport layer
b) Transport layer, Application layer
c) network layer,link layer
d) Link layer, Network layer
Ans : a)
304) State the purpose of Presentation phase in EEDIP model?
a) To obtain and study digital evidence
b) To preserve the investigation and finding
c) To summerize the evidence found in the process of investigation
d) None of these
Ans : c)
305) ____ forensic model follows waterfall model as every activity occurs in
sequence.
a) EMCI
b) IDIP
c) UMDFPM
d) none of these
Ans : a)
306) A logon record tells us that , at a specific time
a) An unknown person logged into the system using the account
b) The owner of a specific account logged into the system
c) The account was used to log into the system
Ans : c)
307) When accessing the reliability of digital evidence the investigator is
concerned with whether the computer that generated the evidence was functioning
normally and :
a) Whether chain of custody was maintained
b) Whether there are indications that the actual digital evidence was tampered
with
c) Whether the evidence was properly secured in transmit
d) Whether the evidence media was …
Ans : b)
308) Dried blood and fingerprints are ____ type of evidence
a) Substantial Evidence
b) Illustrative Evidence
c) Electronic Evidence
d) Documented Evidence
Ans : a)
309) Select the basic questions raised by ethical hackers during penetration testing
among the following a) what can an attacker do with available information b) What
information/locations/systems caDoes anyone at the target – an attacker gain access c)
what system notice
a) a,b
b) a,c
c) b,d
d) a,b,c,d
Ans : d)
310) Ethical hacking will allow to ____ all the massive security breaches.
a) remove
b) measure
c) reject
d) None of these
Ans : b)
311) Security assessments based around ethical hacking focus on ____
a) System vulnerabilities
b) Hacking processes
c) Password cracking
d) All of these
Ans : a)
312) ____ is not one of the different stages of hacking
a) Reconnaissance
b) Scanning
c) Compiling
d) Maintaining Access
Ans : c)
313) An examiner needs to access ___ immediately and extract that evidence before it
is lost
a) Disk
b) The cache and register
c) Archival Media
d) Log files
Ans : b)
314) Examples of hackers on basis of work and mind is / are ___
a) Exploiting a physical security
b) Bypassing web access controls
c) using overly trusting colleague’s user ID and password
d) All of these
Ans : d)
315) ______ ports are available in UDP
a) 66535
b) 66545
c) 66555
d) 66565
Ans : a)
316) ____determines email server version information based on how the server
responds to mail formed SMTP request.
a) Nmap scan
b) Tmap scan
c) Smtp scan
d) None
Ans : c)
317) which of the following is a wireless network attack
a) Encrypted traffic
b) Vulnerabilities wireless workstation
c) Rouge network
d) All of these
Ans : d)
318) ______ option tells Nmap to perform an faster scan
a) T3
b) T5
c) T4
d) T6
Ans : c)
319) Workstations have ton of security vulnerabilities like weak passwords to
unpatched security holes to storage of WEP keys such workstations are
a) Default Workstations
b) Vulnerable Workstations
c) Physical Workstations
d) None
Ans : b)

320) _____ attack can create never ending loop that bounces thousands of
messages back and forth between users
a) Autoresponder
b) Connection
c) Attachment overloading
d) None
Ans : a)
321) An EMIC model ______ is impacted by information from within and
outside the organization that will affect the investigation
a) Planning
b) Awareness
c) Authorization
d) Transport
Ans : a)
322) Which of the following port no is vulnerable to hacker HTTPs using TCP
protocol
a) 441
b) 442
c) 443
d) 444
Ans : c)
323) POP3 stands for
a) Post office program version 3
b) Post office protocol version 3
c) Post office process version 3
d) None
Ans : b)
324) Skills of ethical hackers may consists of ____
a) Trained hacker
b) Identify security problems with computer network
c) Capable of breaching security
d) all of these
Ans : d)
325) Which statement of the following is INCORRECT in view of ethical
hacker?
a) They are hired professional to penetrate in system
b) They find system vulnerabilities without proper authorization
c) They help making system secure and better
Ans : b)
326) _______ standards form the basis of specifications for high level
communication protocols such as ZigBee
a) IEEE 802.15.4
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.16
Ans : a)
327) Although crime scenes are typically photographed , it is good idea to create
diagrams of the crime scene because:
a) Diagtamming is a common crime scene technicians’s skill, however it
requires continual practice.
b) The process of creating a diagram can result in a digital investigator noticing
an important item of evidence that would otherwise have been missed.
Ans : b)
328) Some Arduino Board include ____ used for loading programs from the personal
computer
a) USB
b) HDMI
c) Rj45
d) none of these
Ans : a)
329) _____ is an actuator that creates motion in a straight line , in contrast to the
circular motion of a conventional electric motor
a) Relay
b) Solenoid
c) Linear Actuator
d) None of these
Ans : c)
330) In which system the forensic scienece plays as important role?
a) Criminal justice
b) Artifical intelligence
c) Machine learning
d) Deep Learning
Ans : a)
331) Whether Monitoring , Air Pollution Monitoring, Noise pollution Monitoring ,
Forest fire detection and River flood detection are belong to ____ domain specific IOT
a) Cities
b) Environment
c) Retail
d) Logistics
Ans : b)
332)The authentication, Authorization, Message and content integrity and data
security are functions of ____ functional block.
a) Service
b) Management
c) Security
d) Application
Ans : c)
333) _____ is a bi-directional, fully duplex communication model that uses a persistent
connection between the client and server.
a) Request-response
b) publish subscribe
c) Push-pull
d) Exclusive pair
Ans: d)
334) The ARM architecture users a _____ architecture which support separate data
and instruction buses for memories
a) Harvard
b) Von Neumann
c) Control ROM
d) Hardwired
Ans : a)
335) 6LOWPAN operates in the ____ frequency range.
a) 5GHz
b) 2.4GHz
c) 60GHz
d) 10GHz
Ans : b)
336) _____ does not provide guaranteed delivery, ordering of messages and duplicate
elimination.
a) CoAP
b) HTTP
c) TCP
d) UDP
Ans : d)
337) Coordinator acts as a gateway that connect the ____to the internet.
a) WSN
b) Sensors
c) Actuator
d) TCP
Ans : a)
338) ____ deals with learning a function from available training data.
a) Artificial Intelligence
b) Deep Learning
c) Neural Network
d) Supervised learning
Ans : d)
339) ___ allows bi-directional , full duplex communication between client and
servers.
a) Communication with REST APIs
b) WebSocket APIs
c) Both a and b
d) None of these
Ans : b)
340) DDS uses ___ model where publishers (e,g device that generate data)
create topics to which subscribes (e.g.devices that want to consume data) can
subscribe.
a) request-response
b) publish-subscribe
c) push-pull
d) Exclusive pair
Ans : b)
341) Guaranteed delivery and data integrity are handled by the ___ protocols.
a) TCP
b) UDP
c) CoAP
d) HTTP
Ans : a)
342) The WSN nodes are prone to___
a) Malicious attacks
b) Eavesdropping
c) interferences
d) All of these
Ans : d)
343) ___ is through supervised learning or learning from labelled data and
algorithms.
a) Deep learning
b) Machine Learning
c) Human learning
d) none of these
Ans : a)
344) how many important concepts are part of Artificial Intelligence
a) 1
b) 2
c) 3
d) 4
Ans : c)
345) which of the following has ability to Recognize, Understand and Act.
a) Data
b) Information
c) Knowledge
d) Intelligence
Ans : c)
346) Type 2 Artificial Intelligence machines are ___
a) Super AI
b) General AI
c) Weak AI
d) Limited Memory Machine
Ans : d)
347) IBMs Watson supercomputer comes under ___
a) General AI
b) Super AI
c) Narrow AI
d) All of above
Ans : c)
348) ___ Security works for IOT application to handle security issues according to
scenario requirement.
a) System
b) Application
c) Network
d) All of the above
Ans : b)
349) ___ contains local and cloud based observer nodes which can subscribe to and
receive information collected in the cloud from IOT device.
a) IOT Level 4
b) IOT Level 3
c) IOT Level 2
d) IOT level 1
Ans : a)
350) ____ provides the user the ability to provision computing and storage resources.
a) IaaS
b) PaaS
c) SaaS
d) All of the above
Ans : a)
351) 802.16m provides data rates of 100 Mbit/s for ___ and 1 Gbit/s for ___
a) Mobile station, fixed station
b) Fixed station, mobile station
c) Both a and b
d) None of the above
Ans : a)
352) ___ used to connect TV to Raspberry Pi.
a) USB
b) HDMI
c) RJ45
d) VGA
Ans : b)
353) Websocket APIS is follow ___ model
a) Request-Response Communication st-Response Communication
b) Publish Subscribe Communication
c) Push-Pull Communication
d) Exclusive Pair Communication
Ans : d)
354) WLAN stands for ____
a) Wireless Local Area Network
b) Wire Local Area Network
c) Wide Local Area Network
d) All of above
Ans : a)

355) The DAC converts ____


a) Analog to Digital Converter
b) Digital to Analog Converter
c) Both A and B
d) None of the above
Ans : b)
356) ____ sensor used to detect nearby objects.
a) Proximity Sensor
b) Humidity Sensor
c) Touch Sensor
d) Pressure Sensor
Ans : a)
357) 802.3 is the standard for ___ Ethernet that uses coaxial cable as a shared medium.
a) 10BASE5
b) 10BASE-F
c) 10BASE-T
d) All of the above
Ans : a)
358) ___ standards form the basis of specifications for high level communication
protocols such as Zigbee
a) IEEE 802.15.4
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.16
Ans : a)
359) In IDPI model, the purpose of ___ phase is to provide a mechanism for an
incident to be detected and confirmed.
a) Readiness
b) Digital Crime Investigation
c) Review
d) Deployment
Ans : d)

360) who proposed IDIP model ?


a) Palmar
b) Carrier and Safford
c) Stephenson
d) None of these
Ans : b)
361) Following are some phases of EMCI model.
a) Awareness, Planning
b) Authorization, Notification
c) Collection, Transport
d) All of the above
Ans : d)
362) Digital forensic includes the following ?
a) Recovery
b) Investigation
c) Validation
d) All of above
Ans : d)
363) How many phases are extra in ADFM as comparing with RMDFR ?
a) 5
b) 4
c) 3
d) 8
Ans : c)
364) To meet the validation challenge it is necessary to ensure that original media
matches _____ by using MD5 hashes.
a) Forensic Duplication
b) Forensic Currency
c) Forensic error
d) None of the above
Ans : a)
365) which of the following is not a type of volatile evidence ?
a) Routing Tables
b) Main Memory
c) Log Files
d) Cached Data
Ans : c)
366) To verify the original drive with the forensic copy, you use ____
a) Password
b) Hash Analysis
c) Disk to disk verification
d) None of the mentioned
Ans : b)
367) Collection of evidence starts with ____
a) From the most volatile to least volatile data.
b) From the least volatile to most volatile data.
c) To get only volatile data.
d) To get only Non-volatile data.
Ans : a)
368) Investigate the case a) Cyber cafes through which illegal transfers were made
were identified.
b) The System server logs of the BPO were collected.
c) The IP addresses were traced to the …
a) a-b-c-d-e
b) e-d-c-b-a
c) b-c-a-e-d
d) d-b-c-e-a
Ans : a)
369) case :The accused was posing to be a genuine railway ticket agent and had been
purchasing tickets online by using stolen credit cards of non residents. The accused
created fraudulent electronic records/ profiles. Which he used to carry out the ___
a) Short list persons at cyber cafes when the bookings were made.
b) Examine the passengers who had travelled on those tickets.
c) Logs of machines of cyber café examined.
d) The Ticket booking service provider gave the IP addresses of cyber cafe
Ans : d)
370) ___ may not crack password.
a) Port scanner
b) Vulnerability scanning
c) CT-scan
d) Network scanning
Ans : a)
371) obstacles to protect from hackers attacks ___
a) Wide spread use of networking and internet connectivity.
b) Greater number and availability of hacking tools
c) A and B
d) None of these
Ans : c)
372) Ethical hacker must abide rule set by ___
a) Certified Ethical Hacker (CEH)
b) E-Commerce Consultants (EC-Council)
c) Certified Information System (CIS)
d) Computer Security Certification (CSC)
Ans : b)
373) what are the desired skill set require for Ethical Hacker ?
a) Analytical skills
b) Problem-solving skills
c) Communication Skills
d) All of the above
Ans :d)
374) What type of hacker represents the highest risk to your network ?
a) Black hat hacker
b) Former Employees
c) White hat hackers
d) Script kiddies.
Ans : b)
378) Hacking for cause is called ___
a) Active hacking
b) Hacktivism
c) Activism
d) Black hat hacking
Ans : b)
379) Select correct option which differentiate between White hat Hacker and Black
Hat Hacker.
a) Tools
b) Methodology
c) Good and bad intention
d) Trick
Ans : c)
380) Which of the following is not role of Hacker.
a) Gain Access Illegally
b) Gain Fame
c) Improve System Security
d) Use system vulnerabilities.
Ans : b)
381) Ethical hacker ____
a) Works with high professional morals and principles.
b) Posses low moral low principles.
c) Higl principles, low morals
d) Low professionals, low morals
Ans : a)
382) one of the common motive being hacking is ___.
a) Revenge
b) Helping nature
c) Ignore insult
d) None of these
Ans : a)
383) Ethical hacking related carriers may be _____
a) Back-end developer
b) Computer networking specialist
c) A and B
d) None of these
Ans : c)
384) Installing/ enabling a network analyzer on a computer network and capturing
every packet that travels across it.
a) Network related attacks
b) Application attack
c) Operating system attack
d) Non-technical attack
Ans : a)
385) ___ are those individuals who are appointed to maintain and handles IT security
in any firm or organization.
a) IT Security Engineer
b) Black hat hackers
c) Red hat hackers
d) Blue hat hackers
Ans : a)
386) ____ attack can lead to complete server lockup or crash.
a) Attachment overloading
b) Autoresponder
c) Connections
d) All of the above
Ans : c)
387) Banner grabbing is done by using ___.
a) Plain old telnet
b) Netcat
c) A and B
d) None
Ans : c)
388) Which of the following is not a caveat for using network analyzer.
a) Hun on network
b) To capture all traffic
c) Monitor port on switch
d) None
Ans : d)
389) Which of the following tool is used for network testing and port scanning.
a) Netcat
b) Superscan
c) Netscan
d) All of the above
Ans :d)
390) ___ is a program that acts as an interface between software & hardware.
a) Service
b) Operating System
c) Network
d) None of above
Ans : b)
391) for minimizing Database security risk backup should be
a) Encrypted
b) Decrypted
c) Redundant
d) None of the above
Ans :a)
392) which of the following is not Hacker attacks against messaging system includes
___
a) Transmitting malware
b) Crashing servers
c) Obtaining remote control of workstation
d) None
Ans : d)
393) ___ can create DoS condition by filling either users individual disk space quota
on email server.
a) Connection
b) Autoresponder
c) Attachment overloading
d) None of the above
Ans : b)
394) Crashing server, obtaining remote control of workstation etc. are the hacker
attack against
a) Messaging system
b) Web Application
c) A and B
d) None
Ans : a)
395) In ____ the goal is for the software to use what it has learned in one area to solve
problems in other areas.
a) Deep Learning
b) Machine Learning
c) Neural Network
d) Artificial Intelligence
Ans : a)
396) ___ is defined as symbols that represent properties of objects events and their
environment.
a) Data
b) Information
c) Knowledge
d) Intelligence
Ans : a)
397)In ___ system has a single node as well as data is stored and analyzed in the cloud
application is cloud based.
a) IOT Level 1
b) IOT Level 2
c) IOT Level 3
d) IOT Level 4
Ans : c)
398) The most common example of embedded operating system include ___
a) Linux
b) Palm OS
c) iOS- Subset of Mac OS X
d) All of above
Ans : d)
399) IDE stands for ___
a) In Deep Environment
b) Integrated Development Environment
c) Internal Deep Escape
d) IDE
Ans : b)
400) An IOT device may consist of several interfaces for connections to other devices,
both wired and wireless which includes ___
a) I/O interfaces for sensors
b) Interfaces for Internet connectivity
c) Memory and storage interfaces and audio/video interfaces.
d) All of above
Ans : d)
401) Brokers in MQTT ___
a) Connects publisher and subscribers
b) Classify the sensor data into topics
c) Both a and b
d) None
Ans : (a)
402) EMCI stands for ___
a) Enlarged Model of Computer Investigation
b) Extended Model of CyberCrime Investigation
c) Extended Media of Computer Indication
Ans : (b)
403) Application of temperature sensors are___
a) Air-conditioners,refrigerators
b) Manufacturing processes
c) Agriculture and health industry
d) All of above
Ans : (d)
404) REST is acronym for ___
a) Regional State Transfer
b) Representational Sensed Data Transfer
c) Representational State Transfer
d) None of these
Ans : (c)
405) ___ is a connectionless protocol.
a) UDP
b) TCP
c) HTTP
d) CoAP
Ans : (a)

406) Resources used by hackers may be ____


a) Open wireless network
b) Internet Proxy severs
c) Borrowed or stolen remote desktops
d) All
Ans : (d)
407) ___ who helps in finding bugs and vulnerabilities in a system and donts intent to
crack a system.
a) Black hat hacker
b) Red hat hacker
c) Grey hat hacker
d) White hat hacker
Ans : (d)
408) WEP stands for____
a) Wired Equivalent privacy
b) Wi-fi Equivalent privacy
c) Wired equal privacy
d) None
Ans : (a)
409) Which command-Line option is used for ping scan in Nmap tool
a) sP
b) Ps
c) Sn
d) Ns
Ans : (a)
410) While performing digital investigation, in which media an examination should
never be performed?
a) Wireless
b) Optic
c) Magnetic
d) Original
Ans: (d)
411) Hackers useful in finding bugs and vulnerabilities in a system and don’t intend
to crime
a) Black hat hackers
b) White hat hackers
c) Blue hat hackers
d) Gray hat hackers
Ans: (b)
412)_______ layer determines how the packets are coded and signaled by the
hardware device over the medium to which the host is attached.
a) Link layer
b) Network layer
c) Transport layer
d) Application layer
Ans: (a)
413) How many phases are extra in ADFM as comparing with RMDFR
a) 5
b) 4
c) 3
d) 8
Ans : (c)
414) The Robots that have efficient processors, multiple sensors and huge memory are
called _____
a) Intelligent Robots
b) Industrial Robots
c) Military Robots
d) Domestic Robots
Ans: (a)
415) What is digital forensic science?
a) Recovery and investigation of material found in digital devices
b) Things are connected to internet
c) Put intelligence to machine
d) Search the data from internet
Ans: (a)
416) HTTP port number is ______
a) 80
b) 22
c) 64
d) 32
Ans: (a)
417) ____ is an object responsible for data distribution
a) Publisher
b) Subscriber
c) Both a and b
d) None of these
Ans: (a)
418) The data transmission can be done through wireless media such as____
a) Bluetooth, zigbee
b) Wifi, GPRS
c) EDGE
d) All of these
Ans: (d)
419) ____ sensors include thermocouple , thermistors , resistor temperature detectors
(RTDs) and integrated circuits (ICs)
a) Temperature
b) Humidity
c) Motion
d) Gas
Ans: (a)
420) A ______ comprises of distributed devices with sensors which are used to
monitor the environmental and physical conditions
a) Wireless Sensor Network
b) Physical Network
c) Intranet
d) None of these
Ans: (a)
421) The _____ block handles the communication for the IOT System.
a) Device
b) Communication
c) Service
d) Management
Ans: (b)
422) Ethical hacking need to be planned____
a) After 1 year of installation of system
b) During failure
c) After failure
d) In advance
Ans: (d)
423) Kernal statistics are moving back and forth between cache and main memory,
which make them _____
a) Non-volatile
b) Static information
c) Highly volatile
d) Legal information
Ans: (c)
424) Who is the father of Computer Forensics , came into limelight during this period?
a) John Macarthy
b) Micheal Anderson
c) Allen Turing
d) Mary Shelley
Ans: (b)
425) The compound components built from core components of AI is are ___
a) Knowledge
b) Reasoning
c) Search
d) All of above
Ans: (d)
426) What to do in following case “ if DB holds sensitive information”
a) Avoid usage of shared web server
b) Avoid usage of unshared web server
c) Avoid usage of private web server
d) None
Ans: a)
427) Which of following factors can create weaknesses in messaging system
a) Rarely integrated security in software development
b) Messaging protocol without security
c) A & B
d) None
Ans c)
428) ______ standards provide low-cost and low-speed communication for power
constrained devices.
a) 802.3
b) 802.11
c) 802.15.4
d) 802.16
Ans c)
429) IOT devices may support a number of _____ protocols and can communicate
with other devices and also with the infrastructure.
a) Internet
b) Interoperable communication
c) Intra system
d) Intranet
Ans b)
430) The Y dimension of AI philosophy in 3D representation consists of _____
a) Logic
b) Reasoning
c) Language
d) All of the above
Ans b)
431) ______ is a communication model in which the client sends requests to the server
and the server responds to the requests.
a) Request-response
b) Publish-subscribe
c) Push-pull
d) Exclusive pair
Ans a)
432) Most of processors designed by ARM are
a) 16 bit
b) 32 bit
c) 64 bit
d) 8 bit
Ans : b)
433) ______ is a message that contains relevant meaning , implication or input for
decision and/or action
a) Data
b) Information
c) Knowledge
d) Intelligence
Ans : b)
434) ______ will not be the type of scanning used in Ethical Hacking.
a) Port Scanning
b) Network Scanning
c) CT-scan
d) Vulnerability scanning
Ans : c)
435) In digital forensic field , _____ are the set of moral principles that regulate the
use of computers.
a) Compliance with the law
b) Handling the digital evidences carefully
c) Honesty towards investigation
d) All of above
Ans : d)
436)An Ethical hacker is a security professional who applies their hacking skills for
_____ purposes on behalf of the owners of information systems
a) Destructive
b) Defensive
c) Attacking
d) Analyzing
Ans : b)
437) _____ can create man-in-middle attacks by maliciously using a tool such as the
WIFI pineapple
a) Testers
b) Hackers
c) Programmer
d) Developers
Ans : b)
438) Identify the digital forensic model given in figure>
a) ADFM Model
b) EMCI Model
c) IDIP Model
d) None of these
Ans :
439) _____ is the kind of evidence spoken by the spectator under the oath.
a) Substantial Evidence
b) Testimonial Evidence
c) Explainable Evidence
d) Illustrative Evidence
Ans : b)
440) _____ only focus on current scenarios and react on it as per possible best action
a) Reactive Machines
b) Limited Memory
c) Theory of Mind
d) Self-Awareness
Ans : a)
441) ARP means _____
a) Address resolution protocol
b) Address requesting protocol
c) Another resolution protocol
d) Address requesting promotion
Ans : a)
442) Which of the following types of variables is categorical?
a) Age
b) Weight
c) Gender
d) Income
Ans : c)
443) Write the correct sequence steps of procedure to establish the chain of custody?
Save the original materials
Perform hash test analysis to further authenticate the working clone
Take screenshot of digital evidence content
Inject bit by bit clone of digital evidence content into our forensic computers
a) Sequence of steps 1,2,3,4
b) Sequence of steps 1,3,4,2
c) Sequence of steps 2,3,4,1
d) Sequence of Steps 3,4,2,1I
Ans : b)
444) What is the operation in the figure shown?

a) Finding MAC Address


b) Scanning local airwaves
c) Setting IP Address
d) Setting server address
Ans a)
445) The general ethical norms for investigator is _____
a) To contribute to society and human being
b) Uphold any relevant evidence
c) Declare any confidential matter
d) Distort or falsify education
Ans a)
446) Smart contracts, dApps, UI and chain code can be found on _____ layer of
blockchain architecture?
a) Execution
b) Semantic
c) Consensus
d) Application
Ans d)
447) Layer of blockchain deals in validation of the transactions done in the blockchain
network and also validating the blocks being created in the network?
a) Application
b) Semantic
c) Propagation
d) Execution
Ans b)
448) Attackers can use _____ running on your network to make their systems appear
as your systems
a) Sniffdet
b) PromiscDetect
c)ARP(Address Resolution Protocol)
e) FTP(File Transfer protocol)
Ans c)
449) _____ is used for network analysis.
a) WildPacketsEtherPeek
b) NetCat
c) Netscan
d) Nmap
Ans d)
450) The DNS(Domain Name System) port belongs to ____
a) FTP
b) TCP
c) WTP
d) UDP
Ans d)
451) Where is the Blockchains central server?
a) Where the blockchain is created
b) At First node
c) There is no central server, it is distributed
d) Located with owner of server
Ans c)
452) This symbol signifies :

a) White hat hackers, a hacker who gains access to systems with a view to fix the
identified weaknesses
b) Gray hat hacker, a hacker who is in between ethical and black hat hackers.
He/she breaks into computer systems without authority
c)hactivists , a hacker who use hacking to send social, religious, political,etc
messages.
d)
Ans b)
453) The skilled criminal experts who write some of the hacking tools, including the
scripts and other programs that the script kiddies and security professionals use are
known as____
a) Hactivists
b) Criminal Hackers
c) Script Kiddies
d) Security Professionals
Ans : b)
454) Which of the following chart types is best suited for showing proportions or
percentages?
a) Line chart
b) Scatter chart
c) Pie chart
d) Histogran
Ans : c)

You might also like