Eti Ans
Eti Ans
Eti Ans
ANSWERS
• A) Artificial Intelligence
• B) Deep Learning
• C) Neural Network
• D) Supervised Learning (Correct)
• A) Data
• B) Information
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• C) Knowledge
• D) Intelligence (Correct)
• A) Super AI
• B) General AI
• C) Weak AI
• D) Limited Memory Machines (Correct)
• A) General AI
• B) Super AI
• C) Narrow AI (Correct)
• D) All of the above
• A) System
• B) Application
• C) Network
• D) All of the above (Correct)
• A) WSN (Correct)
• B) MANET
• C) Both a and b
• D) None of the above
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 10: contains local and cloud based observer nodes which
can subscribe to and receive information collected in the cloud from
IoT devices.
Question 11:
provides the users the ability to provision computing and storage
resources.
• Options:
• IaaS
• PaaS
• SaaS
• All of the above.
• Correct Answer: IaaS
Question 12:
802.16m provides data rates of 100 Mbit/s for__—s and 1 Gbit/s for
__.
• Options:
• mobile station, fixed station
• fixed station, mobile station
• Both a and b
• None of the above.
• Correct Answer: mobile station, fixed station
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 13:
Raspberry Pi __ used to connect TV to
• Options:
• USB
• HDMI
• RJ45
• VGA
• Correct Answer: HDMI
Question 14:
WebSocket APIs follow __ Communication model.
• Options:
• Request-Response Communication
• Publish-Subscribe Communication
• Push-Pull Communication
• Exclusive Pair Communication
• Correct Answer: Exclusive Pair Communication
Question 16:
6LOWPAN provides data transfer rates of
• Options:
• 250Kb/s
• 1.5 Mb/s
• 100 Mbit/s
• 1 Gbit/s
• Correct Answer: 250Kb/s
Question 17:
WLAN stands for
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• Wireless Local Area Network
• Wire Local Area Network
• Wide Local Area Network
• All of the above.
• Correct Answer: Wireless Local Area Network
Question 18:
IoT devices are usually integrated into the __ that allows them to
communicate and exchange data with other devices and systems
• Options:
• Internet
• Intra network
• Inter network
• Information network
• Correct Answer: Internet
Question 19:
The DAC Converts
• Options:
• Analog to Digital Converter
• Digital to Analog Converter
• Both A and B
• None of the above
• Correct Answer: Digital to Analog Converter
Question 20:
Sensor use to detect nearby objects
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• Proximity sensor
• Humidity sensor
• Touch sensor
• Pressure sensor
• Correct Answer: Proximity sensor.
Question 21:
802.3 is the standard for Ethernet that uses coaxial cable as a shared
medium
• Options:
• 10BASE5
• 10BASE-T
• 10BASE-F
• All of the above
• Correct Answer: 10BASE5
Question 22:
Forest Fire Detection is an example of
• Options:
• IoT Level 5
• IoT Level 6
• IoT Level 2
• IoT Level 1
• Correct Answer: IoT Level 1
Question 23:
__ standards form the basis of specifications for high level
communication protocols such as ZigBee.
• Options:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• IEEE 802.15.4
• IEEE 802.3
• IEEE 802.11
• IEEE 802.16
• Correct Answer: IEEE 802.15.4
Question 24:
Some Arduino Boards include __ used for loading programs from
the personal computer
• Options:
• HDMI
• USB
• RJ45
• None of these
• Correct Answer: USB
Question 25:
Security cameras and sensors (PIR sensors and Door sensors) are
used for
• Options:
• Smart Lighting
• Smart Appliances
• Intrusion Detection
• Smoke/Gas Detectors
• Correct Answer: Intrusion Detection
Question 26:
In IDIP model, the goal of __ phase is to ensure that the operations
and infrastructure are able to fully support an investigation.
• Options:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Deployment
• Readiness
• Collection
• Examination
• Correct Answer: Readiness
Question 27:
In EMCI Model, __ is the phase during which crime is reported to
some authority.
• Options:
• Awareness
• Planning
• Storage
• Collection
• Correct Answer: Awareness
Question 28:
In IDIP model, The purpose of __ phase is to provide a mechanism
for an incident to be detected and confirmed.
• Options:
• Readiness
• Digital Crime Investigation
• Review
• Deployment
• Correct Answer: Deployment
Question 29:
Who proposed IDIP Model ?
• Options:
• Palmar
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 30:
Following are some phases of EMCI Model.
• Options:
• Awareness, Planning
• Authorization, Notification
• Collection, Transport
• All of above
• Correct Answer: All of above
Question 31:
Digital forensics includes the following:
• Options:
• Recovery
• Investigation
• Validation
• All of the Above
• Correct Answer: All of the Above
Question 32:
State the purpose of Presentation phase in EEDIP model?
• Options:
• To obtain and study digital evidence
• To preserve the investigation and finding
• To summarize the evidences found in the process of
investigation
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• None of these
• Correct Answer: To summarize the evidences found in the process
of investigation
Question 33:
How many phases are extra in ADFM as compared with RMDFR?
Question 34:
The evidence or proof that is obtained from the electronic source is
called as:
• Options:
• Digital evidence
• Explainable evidence
• Demonstrative evidence
• Substantial evidence
• Correct Answer: Digital evidence
Question 35:
Which one is the characteristic of digital evidence rule:
• Options:
• Admissible
• Complete
• Authentic
• All of the above
• Correct Answer: All of the above
Question 36:
Hosting Obscene Profiles and Creating Fake Profile comes under
section of law:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• 66 of Information Technology Act
• 67 of Information Technology Act
• 68 of Information Technology Act
• None of the above
• Correct Answer: 67 of Information Technology Act
Question 37:
To meet the Validation challenge it is necessary to ensure that
original media matches by using MD5 hashes.
• Options:
• Forensic Duplication
• Forensic Currency
• Forensic error
• None of the above
• Correct Answer: Forensic Duplication
Question 38:
Which of the following is not a type of volatile evidence?
• Options:
• Routing Tables
• Main Memory
• Log files
• Cached Data
• Correct Answer: Log files
Question 39:
Hash test analysis on digital evidence ensures that the data
obtained from bit-by-bit copy procedure is __ and reflects the
nature of original evidence.
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• Not corrupt
• Not correct
• Admissible
• Reliable
• Correct Answer: Not corrupt
Question 40:
To verify the original drive with the forensic copy, you use:
• Options:
• Password
• Hash analysis
• Disk to disk verification
• None of the mentioned
• Correct Answer: Hash analysis
Question 41:
Collection of Evidence starts with:
• Options:
• From the most volatile to the least volatile data
• From the least volatile to the most volatile data
• To get only volatile data
• To get only Non-volatile data
• Correct Answer: From the most volatile to the least volatile data
Question 42:
Investigate the case: a. Cyber cafes through which illegal transfers
were made were identified. b. The system server logs of the BPO
were collected c. The IP addresses were traced to the:
• Options:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• a-b-c-d-e
• e-d-c-b-a
• b-c-a-e-d
• d-b-c-e-a
• Correct Answer: a-b-c-d-e (Note: Please confirm the correct
sequence as the options provided are incomplete and need further
clarification.)
Question 43:
Complainant and extract the IP address Desktop computer and a
handicam were seized from the premises. d. Get home address from
IP address.
• Options:
• a-b-c-d
• b-a-d-c
• b-a-c-d
• d-b-a-c
• Correct Answer: b-a-c-d (Note: Please confirm the correct
sequence as the options provided are incomplete and need further
clarification.)
Question 44:
At what point should computer security professionals stop handling
digital evidence and contact law enforcement?
• Options:
• When their organization's policy specifies
• When the task is beyond their training and experience
• When they would be committing an offense by performing
an action
• Correct Answer: When they would be committing an offense by
performing an action
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 45:
Case: The accused was posing to be a genuine railway ticket agent
and had been purchasing tickets online by using stolen credit cards
of non-residents. The accused created fraudulent electronic
records/profiles, which he used to carry out the:
• Options:
• Short list persons present at cyber cafes when the bookings
were made
• Examine the passengers who had travelled on those tickets
• Logs of machines of cyber cafe examined
• Correct Answer: Logs of machines of cyber cafe examined
Question 46:
__ may not crack passwords.
• Options:
• Port scanner
• Vulnerability scanning
• CTSCan
• Network scanning
• Correct Answer: Vulnerability scanning
Question 47:
__ obstacle(s) to protect from hackers' attacks.
• Options:
• Wide spread use of networking and internet connectivity
• Greater number and availability of hacking tools
• A and B
• None of these
• Correct Answer: A and B
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 48:
Ethical hacker must abide rule set by:
• Options:
• Certified Ethical Hacker (CEH)
• E-Commerce Consultants (EC-Council)
• Certified Information System (CIS)
• Computer Security Certification (CSC)
• Correct Answer: E-Commerce Consultants (EC-Council)
Question 49:
What are the desired skill set required for Ethical Hacker?
• Options:
• Analytical skills
• Problem-solving skills
• Communication skills
• All of the above
• Correct Answer: All of the above
Question 50:
Which type of hacker represents the highest risk to your network?
• Options:
• Black-hat hackers
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Former employees
• White-hat hackers
• Script kiddies
• Correct Answer: Black-hat hackers
Question 51:
Hacking for a cause is called
• Options:
• Active hacking
• Hacktivism
• Activism
• Black-hat hacking
• Correct Answer: Hacktivism
Question 52:
Select correct option which differentiates between White Hat
Hacker and Black Hat Hacker.
• Options:
• Tools
• Methodology
• Good and bad Intention
• Trick
• Correct Answer: Good and bad Intention
Question 53:
Which of the following is NOT a role of Hacker?
• Options:
• Gain Access illegally
• Gain Fame
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 54:
Ethical hacker
• Options:
• Works with high professional morals and principles
• Possesses low moral, low principles
• High principles, low morals
• Low professionals, low morals
• Correct Answer: Works with high professional morals and
principles
Question 55:
One of the common motives behind hacking is
• Options:
• Revenge
• Helping nature
• Ignore insult
• None of these
• Correct Answer: Revenge
Question 56:
Ethical hacking related careers may be
• Options:
• Back-end developer
• Computer networking specialist
• A and B
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• None of these
• Correct Answer: A and B
Question 57:
Installing/enabling a network analyzer on a computer network and
capturing every packet that travels across it is considered:
• Options:
• Network related attacks
• Application attack
• Operating system attack
• Non-technical Attack
• Correct Answer: Network related attacks
Question 58:
__ are those individuals who are appointed to maintain and handle
IT security in any firm or organization.
• Options:
• IT Security Engineer
• Black hat hackers
• Red hat hackers
• Blue hat hackers
• Correct Answer: IT Security Engineer
Question 59:
__ attack can lead to a complete server lockup or crash.
• Options:
• Attachment overloading
• Autoresponder
• Connections
• All of above
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 60:
Banner grabbing is done by using:
• Options:
• Plain old telnet
• Netacad
• A and B
• None of these
(Note: Options seem incomplete, assuming "Netcat" is
intended.)
• Correct Answer: A and B
Question 51:
Hacking for a cause is called
• Options:
• Active hacking
• Hacktivism
• Activism
• Black-hat hacking
• Correct Answer: Hacktivism
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 52:
Select correct option which differentiates between White Hat
Hacker and Black Hat Hacker.
• Options:
• Tools
• Methodology
• Good and bad Intention
• Trick
• Correct Answer: Good and bad Intention
Question 53:
Which of the following is NOT a role of Hacker?
• Options:
• Gain Access illegally
• Gain Fame
• Improve System Security
• Use system vulnerabilities
• Correct Answer: Improve System Security
Question 54:
Ethical hacker
• Options:
• Works with high professional morals and principles
• Possesses low moral, low principles
• High principles, low morals
• Low professionals, low morals
• Correct Answer: Works with high professional morals and
principles
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 55:
One of the common motives behind hacking is
• Options:
• Revenge
• Helping nature
• Ignore insult
• None of these
• Correct Answer: Revenge
Question 56:
Ethical hacking related careers may be
• Options:
• Back-end developer
• Computer networking specialist
• A and B
• None of these
• Correct Answer: A and B
Question 57:
Installing/enabling a network analyzer on a computer network and
capturing every packet that travels across it is considered:
• Options:
• Network related attacks
• Application attack
• Operating system attack
• Non-technical Attack
• Correct Answer: Network related attacks
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 58:
__ are those individuals who are appointed to maintain and handle
IT security in any firm or organization.
• Options:
• IT Security Engineer
• Black hat hackers
• Red hat hackers
• Blue hat hackers
• Correct Answer: IT Security Engineer
Question 59:
__ attack can lead to a complete server lockup or crash.
• Options:
• Attachment overloading
• Autoresponder
• Connections
• All of above
• Correct Answer: All of above
Question 60:
Banner grabbing is done by using:
• Options:
• Plain old telnet
• Netacad
• B and C
• None of these
(Note: Options seem incomplete, assuming "Netcat" is
intended.)
• Correct Answer: Plain old telnet
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 61:
Which of the following is not a caveat for using a network analyzer
• Options:
• Hub on network
• To capture all traffic
• Monitor port on switch
• None
• Correct Answer: None
Question 62:
Which of the following tools is used for network testing and port
scanning
• Options:
• Netcat
• Superscan
• Netscan
• All of Above
• Correct Answer: All of Above
Question 63:
__ is a program that acts as an interface between software &
Hardware
• Options:
• Service
• Operating system
• Network
• None of above
• Correct Answer: Operating system
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 65:
For minimizing database security risk, backup should be
• Options:
• Encrypted
• Decrypted
• Redundant
• None of above
• Correct Answer: Encrypted
Question 66:
Which of the following is not a hacker attack against messaging
systems
• Options:
• Transmitting malware
• Crashing servers
• Obtaining remote control of workstation
• None
• Correct Answer: None
Question 67:
__ can create a DoS condition by filling either user's individual disk
space quota on an email server
• Options:
• Connection
• Autoresponder
• Attachment overloading
• None of above
• Correct Answer: Attachment overloading
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 68:
Which of the following is not an email bomb attack
• Options:
• Attachment overloading Attack
• Connection attack
• Dos
• Autoresponder Attack
• Correct Answer: Connection attack
Question 69:
Crashing server, obtaining remote control of workstation, etc. are
hacker attacks against
• Options:
• Messaging system
• Web Application
• A&B
• None
• Correct Answer: Messaging system
Question 70:
Workstations have a ton of security vulnerabilities like weak
passwords, unpatched security holes, and storage of WEP keys. Such
workstations are
• Options:
• Default Workstations
• Vulnerable workstations
• Physical Workstations
• None
• Correct Answer: Vulnerable workstations
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 71:
The Y dimension of AI philosophy in a 3-Dimensional representation
consists of
• Options:
• Cognition
• Logic
• Interface
• Computation
• Correct Answer: Interface
Question 72:
__ is a tool for ethical hacking of web applications
• Options:
• Netsparker
• Burp Suite
• Angry IP Scanner
• GFI LanGuard
• Correct Answer: Burp Suite
Question 73:
Which of the following is not a network analyzer detection tool
• Options:
• Sniffelet
• PromiscDetect
• Netflow traffic analyzer
• All of above
• Correct Answer: Sniffelet
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 74:
Which of the following holds the highest value of evidence in the
court?
• Options:
• Wide spread use of networking and internet connectivity
• Greater number and availability of hacking tools
• None of these
• Correct Answer: None of these
Question 75:
Banners are intended for
• Options:
• Networking administration
• White hat Hacking
• A&B
• None of above
• Correct Answer: Networking administration
Question 76:
__ is not one of the different stages of hacking.
• Options:
• Reconnaissance
• Scanning
• Suspect
• None of the above
• Correct Answer: Suspect
Question 77:
__ tool is used for ping sweeps and Port scanning
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• [Missing options]
• Correct Answer: [Correct option missing]
Question 78:
Foot-printing Is
• Options:
• Measuring the shoe size of an ethical hacker
• Accumulation of data by gathering information on a target
• Scanning a target network to detect operating system types
• Correct Answer: Accumulation of data by gathering information on
a target
Question 79:
To Examine Intelligently while gathering information about the
target is
• Options:
• Investigation
• Scanning
• Tracing
• Intelligent
• Correct Answer: Intelligent
Question 80:
In 1995, on which topic the International Organization on Computer
Security was formed?
• Options:
• Computer security
• Computer Evidence
• Computer network
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Computer Graphics
• Correct Answer: Computer security
Question 81:
Hosting Obscene Profiles and Creating Fake Profile comes under
section of law
• Options:
• 66 of Information Technology Act
• 67 of Information Technology Act
• 68 of Information Technology Act
• None of the above
• Correct Answer: None of the above
Question 82:
The evidence or proof that is obtained from the electronic source is
called as
• Options:
• Digital evidence
• Explainable evidence
• Demonstrative evidence
• Substantial evidence
• Correct Answer: Digital evidence
Question 84:
When assessing and responding to security incidents, a network
analyzer can help you
• Options:
• View anomalous networking traffic
• Develop baseline of network activity
• Track down an intruder
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 85:
Which norm should not be satisfied by Investigator?
• Options:
• To be Honest and Trustworthy
• Avoid harm to others
• To declare any confidential matters or knowledge
• To respect the privacy of others
• Correct Answer: To declare any confidential matters or knowledge
Question 86:
Which one is the characteristic of digital evidence rule?
• Options:
• Admissible
• Complete
• Authentic
• All of the above
• Correct Answer: All of the above
Question 87:
Hash test analysis on digital evidence ensures that the data
obtained from bit-by-bit copy procedure is __ and reflects the
nature of original evidence.
• Options:
• Not corrupt
• Not correct
• Admissible
• Reliable
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 88:
Forest Fire Detection is an example of
• Options:
• IoT Level 5
• IoT Level 6
• IoT Level 2
• IoT Level 1
• Correct Answer: IoT Level 5
Question 89:
In terms of digital evidence, the Internet is an example of:
• Options:
• Open computer systems
• Communication systems
• Embedded computer systems
• None of the above
• Correct Answer: Communication systems
Question 90:
The criminological principle states that contact between two items
will result in an exchange, is:
• Options:
• Locard's Exchange Principle
• Differential Association Theory
• Beccaria's Social Contract
• None of the above
• Correct Answer: Locard's Exchange Principle
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 91:
Key criteria for handling digital evidence include:
• Options:
• Proper protocol should be followed for acquisition of
evidence
• All material artifacts should be date and time-stamped
• Physical and digital artifacts should be collected and retained
• All of the above
• Correct Answer: All of the above
Question 92:
How many models of Digital Forensics?
• Options:
• 8
• 2
• 5
• 3
• Correct Answer: [Correct option missing]
Question 93:
Which of the following is not an attack against messaging systems?
• Options:
• Attachment overloading
• Connection attack
• DoS
• Autoresponder
• Correct Answer: Attachment overloading
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 94:
The difference between machine and human intelligence is that the
human __ compare to machine.
• Options:
• Breath / sleep
• Think / act rationally
• Walk / talk
• Eat / drink
• Correct Answer: Think / act rationally
Question 95:
__ is the process of collecting, organizing, and analyzing large sets
of data to discover patterns and other useful information.
• Options:
• AI
• Cloud computing
• Big Data Analytics
• All of the above
• Correct Answer: Big Data Analytics
Question 96:
In the EMCI Model, __ is impacted by information from within and
outside the organization that will affect the investigation.
• Options:
• Planning
• Awareness
• Authorization
• Transport
• Correct Answer: Awareness
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 97:
Digital forensics includes the following:
• Options:
• Recovery
• Investigation
• Validation
• All of the above
• Correct Answer: All of the above
Question 98:
How many approaches of Artificial Intelligence are in existence?
• Options:
• 2
• 4
• 5
• 3
• Correct Answer: 4
Question 99:
The concept that describes the idea of everyday physical objects
being connected to the internet and being able to identify
themselves to other devices
• Options:
• Internet of Things
• Embedded System
• Intranet of Things
• Microprocessor
• Correct Answer: Internet of Things
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 100:
__ is most commonly used for clustering similar input into logical
groups.
• Options:
• Unsupervised Learning
• Supervised learning
• Deep Learning
• Human and Machine Learning
• Correct Answer: Unsupervised Learning
Question 101:
In the 3-dimensional philosophy of AI, the X dimension is
• Options:
• Reasoning
• Knowledge
• Computation
• Vision
• Correct Answer: Reasoning
Question 102:
_____ systems are suitable for solutions where data are involved is
big, however, the primary analysis requirement is not
computationally intensive and can be done locally itself.
• Options:
• IoT Level 1
• IoT Level 2
• IoT Level 3
• IoT Level 4
• Correct Answer: IoT Level 3
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 103:
Computer programs that mimic the way human brain processes
information is called
• Options:
• Computer Networks
• Circuits Network
• Neural Network
• Human Network
• Correct Answer: Neural Network
Question 104:
The ability to sense the environment, to make decisions, and to
control action is called
• Options:
• Data
• Information
• Knowledge
• Intelligence
• Correct Answer: Intelligence
Question 105:
Which of the following is not a network hacking tool?
• Options:
• Telnet
• Net Cat
• CleanIISLog
• A&B
• Correct Answer: CleanIISLog
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 106:
IoT stands for
• Options:
• Internet of Technology
• Intranet of Things
• Internet of Things
• Information of Things
• Correct Answer: Internet of Things
Question 107:
A motor that moves in discrete steps is called a
• Options:
• Servo Motor
• Linear Actuator
• Induction Motor
• Stepper Motor
• Correct Answer: Stepper Motor
Question 108:
_____ supports methods such as GET, PUT, POST, and DELETE.
• Options:
• HTTP CoAP
• Websocket, MQTT
• XMPP AMQP
• None of the above.
• Correct Answer: HTTP CoAP
Question 109:
IoT level is used for Home Automation
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• Level-1
• Level-2
• Level-3
• Level-4
• Correct Answer: Level-1
Question 110:
IoT level which is used for Smart Irrigation System
• Options:
• Level-1
• Level-2
• Level-3
• Level-4
• Correct Answer: Level-2
Question 111:
6LoWPAN works with the _____ layer protocol and defines
compression mechanisms for IPv6 datagrams over IEEE 802.15.4-
based networks.
• Options:
• 802.11
• 802.3
• 802.16
• 802.15.4
• Correct Answer: 802.15.4
Question 112:
_____ provides the users the ability to develop and deploy
applications in the cloud using the development tools, application
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• IaaS
• PaaS
• SaaS
• All of the above.
• Correct Answer: PaaS
Question 113:
The theory of mechanization was developed by
• Options:
• Bertrand Russel
• Turing
• Aristotle
• Charles Babbage
• Correct Answer: Turing
Question 114:
Which does not come under the characteristics of IoT?
• Options:
• Dynamic & Self-Adapting
• Self-Configuring
• Endpoint Management
• Integrated into Information Network
• Correct Answer: Endpoint Management
Question 115:
_____ can recognize the shapes of the letters and convert it into
editable text.
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• Handwriting Recognition System
• Voice Recognition System
• Text Recognition System
• Speech Recognition Systems
• Correct Answer: Handwriting Recognition System
Question 116:
Most commonly used units for humidity measurement are relative
humidity (RH), dew/frost point (D/F PT), and parts per million
(PPM).
• Options:
• Temperature
• Humidity
• Motion
• All of the above.
• Correct Answer: Humidity
Question 117:
_____ is a transaction-oriented and stateless protocol.
• Options:
• HTTP
• CoAP
• UDP
• TCP
• Correct Answer: HTTP
Question 118:
A program that simulated a psychotherapist interacting with a
patient and successfully passed the Turing Test.
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• MAYA
• ALEXA
• MALISKA
• ELIZA
• Correct Answer: ELIZA
Question 119:
Need of Artificial Intelligence has grown because of
• Options:
• Big data which is normally unstructured and vast for humans
to comprehend.
• Supervised learning has shown promising results.
• Neural Network which is algorithm used as replacement to
human.
• Correct Answer: Big data which is normally unstructured and vast
for humans to comprehend.
Question 120:
_____ is an area of computer science that emphasizes the creation of
intelligent machines that work and react like humans.
• Options:
• Machine Learning
• Deep Learning
• Artificial Intelligence
• Neural Network
• Correct Answer: Artificial Intelligence
Question 121:
BMP180 is a popular digital sensor for use in mobile phones, PDAs,
GPS navigation devices, and outdoor equipment.
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Options:
• Pressure
• Gas
• Smoke
• Image
• Correct Answer: Pressure
Question 122:
_____ supports methods such as GET, PUT, POST, and DELETE.
• Options:
• HTTP, CoAP
• Websocket, MQTT
• XMPP, AMQP
• None of the above.
• Correct Answer: HTTP, CoAP
Question 123:
ARM Microcontrollers support for
• Options:
• Low level programming language
• High Level Programming Language
• Both A and B
• None of the above
• Correct Answer: Both A and B
Question 124:
The WSN nodes are prone to
• Options:
• Malicious attacks
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Eavesdropping
• Interference
• All of the above.
• Correct Answer: All of the above.
Question 125:
WebSocket-Based APIs allow _____ communication between clients
and servers.
• Options:
• Bi-Directional, Full Duplex
• Uni-Directional, Half Duplex
• Bi-Directional, Half Duplex
• Uni-Directional, Full Duplex
• Correct Answer: Bi-Directional, Full Duplex
Question 126:
_____ ensures reliable transmission of packets in-order and also
provides error detection capability so that duplicate packets can be
discarded and lost packets are retransmitted.
• Options:
• UDP
• TCP
• HTTP
• CoAP
• Correct Answer: TCP
Question 127:
IoT level which is used for Tracking Package Handling
• Options:
• Level-1
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Level-2
• Level-3
• Level-4
• Correct Answer: Level-3
Question 128:
In UMDFPM, _____ phase is not there in this Model.
• Options:
• Examine
• Hypothesis
• Analysis
• Report
• Correct Answer: Examine
Question 129:
In EMCI Model, _____ is the phase where the nature of investigation
has been identified.
• Options:
• Awareness
• Authorization
• Planning
• Collection
• Correct Answer: Awareness
Question 130:
In IDIP model, The goal of _____ phase is to collect and analyze the
digital evidence.
• Options:
• Hypothesis
• Deployment
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 131:
An information which has a positive impact on the action occurred,
such as the information supporting an incident is an
• Options:
• Irrelevant Evidence
• Relevant Evidence
• Cannot say
• All of the above
• Correct Answer: Relevant Evidence
Question 132:
Embedded System consists of
• Options:
• Input Device, Microcontroller (The Brain) and Output Device.
• Hardware and software device
• Transmitter and Receiver device
• WiFi and Bluetooth
• Correct Answer: Input Device, Microcontroller (The Brain) and
Output Device.
Question 133:
FBI stands for
• Options:
• Federal Bureau of Intelligence
• Federal Bureau of Investigation
• Feedback bureau of Investigation
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 134:
Digital evidences are used to establish a credible link between
• Options:
• Attacker and victim and the crime scene
• Attacker and the crime scene
• Victim and the crime scene
• Attacker and Information
• Correct Answer: Attacker and victim and the crime scene
Question 135:
An information which has a positive impact on the action occurred
is called
• Options:
• Irrelevant Evidence
• Relevant Evidence
• Positive Evidence
• Legal Evidence
• Correct Answer: Relevant Evidence
Question 136:
The application data, typically in files, is encoded by the _____
protocol and encapsulated in the _____ protocol which provides
connection or transaction oriented communication over the
network.
• Options:
• Application layer, Transport layer
• Transport layer, Application layer
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• digital evidence
• Explainable evidence
• demonstrative evidence
• substantial evidence
Question 137:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 138:
Which forensic model follows the waterfall model as every activity occurs
in sequence?
• EMCI
• IDIP
• UMDFPM
• None of these
Answer: IDIP
Question 139:
Question 140:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Whether there are indications that the actual digital evidence was
tampered with
• Whether the evidence was properly secured in transit
• Whether the evidence media was
Answer: Whether there are indications that the actual digital evidence
was tampered with
Question 141:
Question 142:
• Substantial Evidence
• Illustrative evidence
• Electronic Evidence
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Documented Evidence
Question 143:
Options:
• a), b)
• a), c)
• b), d)
• a), b), c), d)
Question 144:
• remove
• measure
• reject
• None of these
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Answer: measure
Question 145:
• System Vulnerabilities
• hacking processes
• password cracking
• All of the above
Question 146:
• Gray Hat
• White Hat
• Malicious Users
• Script kiddies
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 147:
• Reconnaissance
• Scanning
• Compiling
• Maintaining access
Answer: Compiling
Question 148:
• Windows
• DOS
• Novell Netware
• Android
Question 149:
• Disk
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 150:
Question 151:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 152:
• 66535
• 66545
• 66555
• 66565
Answer: 66535
Question 153:
• Nmap scan
• Tmap scan
• Smtp scan
• None
Question 154:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• Encrypted traffic
• Vulnerable wireless workstation
• Rogue network
• All of the above
Question 155:
• Ta
• TS
• T4
• T6
Answer: T4
Question 156:
• Default Workstations
• Vulnerable workstations
• Physical Workstations
• None
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 157:
• Autoresponder
• Connection
• Attachment overloading
• None
Answer: Autoresponder
Question 158:
• Planning
• Awareness
• Authorization
• Transport
Answer: Awareness
Question 159:
Which of the following port no. is vulnerable to hacked HTTPs using TCP
protocol?
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• 441
• 442
• 443
• 444
Answer: 443
Question 160:
Question 161:
• Trained hacker
• Identify security problems with computer networks
• Capable of breaching security
• All of these
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 162:
Question 163:
Question 164:
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Answer: c-a-d-e-f-b
Question 165:
• IEEE 802.15.4
• IEEE 802.3
• IEEE 802.11
• IEEE 802.16
Question 166:
Some Arduino Boards include ____ used for loading programs from the
personal computer.
• USB
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
• HDMI
• RJ45
• None of these
Answer: USB
Question 167:
• Relay
• Solenoid
• Linear Actuator
• None of the above
Question 168:
• Criminal justice
• Artificial Intelligence
• Machine learning
• Deep learning
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 169:
• Cities
• Environment
• Retail
• Logistics
Answer: Environment
Question 170:
• Service
• Management
• Security
• Application
Answer: Security
Question 170: Which branch of Computer Science pursues creating the
computers/machines as intelligent as human beings? • Options: a)
Artificial Intelligence b) Machine Learning c) Neural Network d) Deep
Learning • Correct Answer: a) Artificial Intelligence
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 172: Which algorithm analyzes the training data and produces
an inferred function, which can be used for mapping new examples? •
Options: a) Unsupervised Learning Algorithm b) Deep Learning
Algorithm c) Supervised Learning Algorithm d) Neural Learning
Algorithm • Correct Answer: c) Supervised Learning Algorithm
Question 175: The coordinator acts as a gateway that connects the WSN
to what?
Question 176: Which field deals with learning a function from available
training data? • Options: a) Artificial Intelligence b) Deep Learning c)
Neural Network d) Supervised Learning
Question 178: Which IoT level is used for Forest Fire Detection? •
Options: a) Level-3 b) Level-4 c) Level-5 d) Level-6 • Correct Answer: c)
Level-5
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 179: DDS uses which model where publishers create topics to
which subscribers can subscribe? • Options: a) Request-Response b)
Publish-Subscribe c) Push-Pull d) Exclusive Pair • Correct Answer: b)
Publish-Subscribe
Question 180: Select the basic questions raised by ethical hackers during
penetration testing among the following: • Options: a) What can an
attacker do with available information? b) What
information/locations/systems can an attacker gain access to? c) What
system notices a) and b)? d) All of the above • Correct Answer: d) All of
the above
Question 181: Guaranteed delivery and data integrity are handled by
which protocols? • Options: a) TCP b) UDP c) CoAP d) HTTP • Correct
Answer: a) TCP
Question 182: The WSN nodes are prone to: • Options: a) Malicious
attacks b) Eavesdropping c) Interference d) All of the above • Correct
Answer: d) All of the above
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 190: POP3 stands for: • Options: a) Post Office Program Version
3 b) Post Office Protocol Version 3 c) Post Office Process Version 3 d)
None • Correct Answer: b) Post Office Protocol Version 3
Question 191: ____ for hacking is very essential. • Options: a) Rejection b)
Approval c) Scope d) Bandc • Correct Answer: c) Scope
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 53: Which is the most secure operating system out of the
following? • Options: a) Windows b) DOS c) Novell Netware d) Android •
Correct Answer: c) Novell Netware
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 39: The evidence or proof that is obtained from the electronic
source is called as-——- • Options: a) Digital evidence b) Explainable
evidence c) Demonstrative evidence d) Substantial evidence • Correct
Answer: a) Digital evidence
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 35: Dried blood and fingerprints are ______ evidence. • Options:
a) Substantial Evidence b) Illustrative evidence c) Electronic Evidence d)
Documented Evidence • Correct Answer: a) Substantial Evidence
Question 32: In IDIP model, The goal of ______ phase is to collect and
analyze the digital evidence. • Options: a) Hypothesis b) Deployment c)
Digital Crime Investigation d) Review • Correct Answer: c) Digital Crime
Investigation
Question 29: In EMCI Model, ______ is the phase where the nature of
investigation has been identified. • Options: a) Awareness b)
Authorization c) Planning d) Collection • Correct Answer: a) Awareness
Question 25: ________ standards form the basis of specifications for high-
level communication protocols such as ZigBee. • Options: a) IEEE
802.15.4 b) IEEE 802.3 c) IEEE 802.11 d) IEEE 802.16 • Correct Answer: a)
IEEE 802.15.4
Question 24: IoT level which is used for Tracking Package Handling •
Options: a) Level-1 b) Level-2 c) Level-3 d) Level-4 • Correct Answer: a)
Level-1
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 23: Some Arduino Boards include ______ used for loading
programs from the personal computer. • Options: a) USB b) HDMI c)
RJ45 d) None of these • Correct Answer: a) USB
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 15: The WSN nodes are prone to ______. • Options: a) Malicious
attacks b) Eavesdropping c) Interference d) All of the above • Correct
Answer: d) All of the above
Question 14: BMP 180 is a popular digital sensor for use in mobile
phones, PDAs, GPS navigation devices, and outdoor equipment,
specifically for measuring ______. • Options: a) Pressure b) Gas c) Smoke
d) Image • Correct Answer: a) Pressure
Question 26: In the EMCI Model, the phase during which crime is
reported to some authority is ______. • Options: a) Extended Model of
Cybercrime Investigation (EMCI) b) Awareness c) Planning d) Collection •
Correct Answer: b) Awareness
Question 11: ______ is a device that alters the physical quantity as it can
cause a mechanical component to move after getting some input from
the sensor. • Options: a) Sensors b) Rensnnors c) Both a and b d) None
of the above • Correct Answer: c) Both a and b
Question 34: ______ data is data that is lost if the power is switched off. •
Options: a) Non-volatile b) Goat c) Primary d) Secondary • Correct
Answer: a) Non-volatile
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 55: Guidelines for selecting hacking tools may consist of ______.
• Options: a) Study the user guide for commercial tools b) Detailed
reports on the discovered vulnerabilities c) Regular updates and support
when needed d) All of these • Correct Answer: d) All of these
Question 35: Digital evidence must follow the requirements of the ______.
• Options: a) Ideal Evidence rule b) Best Evidence Rule c) Exchange Rule
d) All of the mentioned • Correct Answer: d) All of the mentioned
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 51: Ethical hacker does not require ______ for effective
operation. • Options: a) Asset to be protected b) Potential Threat Source
c) Support by Organization d) None of the above • Correct Answer: d)
None of the above
Question 16: ______ jack allows connection of analog TVs and other
similar output devices. • Options: a) Audio out b) USB c) HDMI • Correct
Answer: a) Audio out
Question 39: Key criteria for the handling of digital evidence include: •
Options: a) Proper protocol should be followed for acquisition of
evidence b) Material should be date and time stamped c) All artifacts,
physical and digital, should be collected and retained • Correct Answer:
c) All artifacts, physical and digital, should be collected and retained
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 46: ______ is one with very little knowledge about hacking but
uses free tools and the internet to perform malicious acts. • Options: a)
Ex-Employee b) Script Kiddies c) Malicious Users d) Gray Hat • Correct
Answer: b) Script Kiddies
Question 67: Which tool is the most versatile security tool for security
checks such as port scanning and firewall testing? • Options: a)
Etherpeek b) Ettercap c) Netcat d) Nmap • Correct Answer: d) Nmap
Question 51: Ethical hacker does not require ______ for effective
operation. • Options: a) Asset to be protected b) Potential Threat Source
c) Support by Organization d) None of the above • Correct Answer: d)
None of the above
Question 57: One example of hackers based on their work and mindset
is: • Options: a) Neat an intrusion prevention system b) Supporting
security c) Promoting pollution in the environment d) None of these •
Correct Answer: d) None of these
https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq
Question 52: Which of the following terms suits more to White Hat
Hackers? • Options: a) Former Black Hat b) Former Gray Hat c) Fame
Gainer d) Security Professional • Correct Answer: d) Security Professional
Question 59: DMZ stands for: • Options: a) Cone Zone b) DeMail Zone c)
DoMain Zone d) None • Correct Answer: d) None
Question 55: Guidelines for selecting hacking tools may consist of: •
Options: a) Study the user guide for commercial tools b) Detailed reports
on the discovered vulnerabilities c) Update and support when needed d)
All of these • Correct Answer: d) All of these
https://play.google.com/store/apps/details?id=com.krrish.managementmcq