Combine 0 ETI
Combine 0 ETI
1. __________ is a branch of science which deals with helping machines find solutions to
complex problems in a more human-like fashion.
A. AI
B. IOT
C. Embedded System
D. Cyber Security
ANSWER: A
2. These machines only focus on current scenarios and react on it as per possible best action.
A. Reactive Machines
B. Limited Memory
C. Theory of mind
D. self awareness
ANSWER: A
A. Cognition
B. Knowledge
C. Research
D. vision
ANSWER: A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A. Self-driving cars
B. Apple series
C. Speech recognition
ANSWER: D
A. Theory of Mind
B. Self Awareness
C. IOT
D. Limited Memory
ANSWER: D
A. Theory of Mind
B. Strong
C. IOT
D. Deep learning
ANSWER: B
B. Computational Level
C. First Dimension
D. Cognition
ANSWER: C
A. Knowledge
B. Reasoning
C. NLP
ANSWER: D
A. Intention
B. Behavior
C. Vision
D. Body language
ANSWER: A
ANSWER: B
A. Embedded System
B. AI
C. IOT
D. LISP
ANSWER: D
A. Knowledge
B. Experience
D. All of these
ANSWER: C
13.What is the name for information sent from robot sensors to robot controllers?
A. Temperature
B. Feedback
C. Pressure
D. Signal
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
ANSWER: B
A.John McCarthy
B. Alan Turing
C. Allen Newell
D. Fisher Ada
ANSWER: D
ANSWER: C
ANSWER: B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
17. Which is the third course outcome of this subject
ANSWER: D
D. None of these
ANSWER: A
B. AI
C. Robotics
D. ES
ANSWER: A
A. Type osf AI
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B. deals with learning a function from available training data
B. make sense of unlabled data without having any predefined dataset for its training
C. Type of IOT
D. None of these
ANSWER: B
A. k-menas
B. self-organization
C. Driverless car
ANSWER: D
A. voice recognition
C. text tecognition
D. k-means
ANSWER: D
D. None of these
ANSWER: C
A. AI
B. IOT
C. Forensics
D. Deep Learning
ANSWER: D
A. Data
B. Inforamtion
C. Knowledge
a. Learning
b. Observing
c. Perceiving
d. None of the mentioned
Answer: A
30. A completely automated chess engine (Learn from previous games) is based on?
31. Which of the following task/tasks Artificial Intelligence could not do yet?
a. John McCarthy
b. Marvin Minsky
c. Alan Turing
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d. Allen Newell and Herbert Simon
Answer: A
34. Which is not the commonly used programming language for AI?
a. PROLOG
b. Java
c. LISP
d. Perl
Answer: D
35. Which of the following offers external chips for memory and peripheral interface circuits?
a. Microcontroller
b. Microprocessor
c. Peripheral system
d. Embedded system
Answer:B
a. Machine Learning
b. Deep Learning
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
c. Both (1) and (2)
d. None of the above
Answer: C
38. "Artificial Intelligence means to mimic a human. Hence, if a robot can move from one place
to another like a human, then it comes under Artificial Intelligence."True or False
a. True
b. False
Answer: B
39. Which of the mentioned human behavior does the AI aim to mimic?
a. Thinking
b. Eating
c. Sleeping
d. All of the above
Answer: A
a. Thinking humanly
b. Adapting to the environment and situations
c. To rule over humans
d. Real Life Problem Solving
Answer: C
a. Microcontroller
b. Microprocessor
c. Debugger
d. Microcontroller and Microprocessor
Answer: D
a. To measure information
b. To generates actual output
c. To correct output
d. All of the above
Answer: B
a. Power supply
b. Timers
c. Parallel ports
d. Proteus
Answer: D
a. MAC OS
b. RTOS
c. Linux
d. None of the above
Answer: B
a. A set of Rule
b. A sequence of steps
c. Both (a) and (b)
d. Arbitrary representation to problem
Answer: C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
48. Which is the best way to go for Game playing problem?
a. Linear approach
b. Heuristic approach
c. Random approach
d. Optimal approach
Answer: B
a. Representational Verification
b. Representational Adequacy
c. Inferential Adequacy
d. Inferential Efficiency
Answer: A
51. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
a. machine intelligence
b. human intelligence
c. artificial intelligence
d. virtual intelligence
Answer: C
a. BASIC
b. FORTRAN
c. IPL
d. LISP
Answer: C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
53. The first widely-used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
It allows machines to handle vague information with a deftness that mimics human intuition.
What is the name of this AI?
a. Boolean logic
b. Human logic
c. Fuzzy logic
d. Functional logi
Answer: C
54. What is the term used for describing the judgmental or commonsense part of problem
solving?
a. Heuristic
b. Critical
c. Value based
d. Analytical
Answer: A
55. Which kind of planning consists of successive representations of different levels of a plan?
a. hierarchical planning
b. non-hierarchical planning
c. project planning
d. All of the above
Answer: A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-2(MCQ’s)
1. Embedded system is a _____ and _____ .
a. microprocessor
b. microcontroller
c. Both a And b
Answer: C
2. Which of the following allows the reuse of the software and the hardware components?
Answer: A
3. Which of the following is the design in which both the hardware and software are considered
during the design?
a) platform based design
b) memory based design
c) software/hardware codesign
d) peripheral design
Answer: C
Answer: B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
5. Which of the following is a meet-in-the-middle approach?
a) peripheral based design
b) platform based design
c) memory based design
d) processor design
Answer: B
6. Which of the following helps in reducing the energy consumption of the embedded system?
a) compilers
b) simulator
c) debugger
d) emulator
Answer: A
Answer: B
8. Which of the following provides a buffer between the user and the low-level interfaces to the
hardware?
a) operating system
b) kernel
c) software
d) hardware
Answer: A
9. Which of the following can make the application program hardware independent?
a) software
b) application manager
c) operating system
d) kernel
Answer: C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
10. Which of the following includes its own I/O routine?
a) hardware
b) kernel
c) operating system
d) application manager
Answer: C
11. How many types of messages are associated with the real-time operating system?
a) 2
b) 3
c) 4
d) 5
Answer: A
12. Which can control the memory sharing between the tasks?
a) kernel
b) application
c) software
d) OS
Answer: A
a. Hardware Plafform
b. Interrupt controllers
c. Processor
Answer: A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
14. Which one of the following offers CPUs as integrated memory or peripheral interfaces?
a) Microcontroller
b) Microprocessor
c) Embedded system
d) Memory system
15. Which of the following offers external chips for memory and peripheral interface circuits?
a) Microcontroller
b) Microprocessor
c) Peripheral system
d) Embedded system
17. How is the protection and security for an embedded system made?
a) OTP
b) IPR
c) Memory disk security
d) Security chips
18. It retains its content when power is removed. What type of memory is this?
a) Volatile memory
b) Nonvolatile memory
c) RAM
d) SRAM
a. Control Unit
b. Execution Unit
c. Data memory
23. PIC microcontroller are the ______ microcontrollers can be programmed to be performed a
large range of task.
a. Huge
b. Large
c. Small
b. Connectivity
c. Human interface
d. Both a And b
a. 1978
b. 1996
c. 1997
d. 1990
a. Atmel Corporation
b. Vegard Wollan
c. Alf-Egil Bogan
d. Harvard
b. Vegard Wollan
c. Alf-Egil Bogan
d. Both b And c
c. Both a And c
d. RISC architecture
b. digital power
c. Automotive
Answer: B
32. The main importance of ARM micro-processors is providing operation with ______
a) Low cost and low power consumption
b) Higher degree of multi-tasking
c) Lower error or glitches
d) Efficient memory management
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Answer: A
Answer: C
a) True
b) False
Answer: B
Answer: b
Answer: a
Answer: b
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
38 . Barometer is which type of sensor________
a) Pressure sensor
b) Touch sensor
c) Temperature sensor
d) Humidity sensor
Answer: a
Answer: d
Answer: c
40. The computer devices and smart phones that have _______ with pressure sensor.
a) Automotive Industry
b) Industrial
c) Aviation
d) Touch screen
Answer: d
41. In which place the pressure sensor is needed for monitoring gases and their partial
pressures.
a) Touch screen
b) Automotive Industry
c) Industrial
d) Aviation
Answer: c
Answer: b
Answer: d
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
43. Dew point and Fost point are mainly used in which conditions?
a) Water vapor
b) Pressure of gas
c) Dryness of gas
d) Moisture in gas
Answer: c
Answer: a
Answer: d
47. Humidity sensors are divided into how many types and depending on what?
a) 2 types depending on output
b) 2 types depending on measurement units
c) 3 types depending on measurement units
d) 3 types depending on output
Answer: b
48. Electronic type hygrometers are divided into how many types?
a) 5 types
b) 3 types
c) 4 types
d) 2 types
Answer: d
Answer: c
Answer: a
51. ________ sensors measure the electrical change in devices such as conductive polymers.
a) Capacitive Sensor
b) Resistive Sensor
c) Thermal Conductivity
d) Both resistive and conductive
Answer: d
52. ________ sensors are suitable for environments that have high temperatures.
a) Capacitive Sensor
b) Resistive Sensor
c) Thermal Conductivity
d) Both resistive and conductive
Answer: c
Answer: a
Answer: c
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
55. Which sensor can detect nearby objects?
a) Proximity sensor
b) Humidity sensor
c) Touch sensor
d) Pressure sensor
Answer: a
56. The monitoring of machines, gears and objects are achieved by which sensor?
a) Humidity sensor
b) Proximity sensor
c) Touch sensor
d) Pressure sensor
Answer: b
Answer: d
Answer: a
Answer: d
Answer: c
Answer: a
Answer: b
Answer: a
Answer: a
65. Which device generates output signal when metal objects are either inside or entering into
sensing area.
a) Capacitive Proximity
b) Magnetic Proximity
c) Inductive proximity
d) Parallel Proximity
Answer: a
66. ________ detects metals but along with it can also detect resins, liquids.
a) Inductive proximity
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
b) Capacitive Proximity
c) Magnetic Proximity
d) Parallel Proximity
Answer: b
67. _________ sensors have no electrical noise effect and it can work DC.
a) Inductive proximity
b) Capacitive Proximity
c) Magnetic Proximity
d) Parallel Proximity
Answer: c
Answer: a
Answer: c
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: a
a) High
b) Medium
c) Low
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d) Very Low
Answer: c
a) Low
b) Very high
c) Medium
d) High
Answer: a
a) Smart Irrigation
b) Home automation
c) Tracking package handling
d) Noise monitoring
Answer: b
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: a
a) Smart Irrigation
b) Home automation
c) Tracking package handling
d) Noise monitoring
Answer: a
a) Smart Irrigation
b) Home automation
c) Tracking package handling
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d) Noise monitoring
Answer: c
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: a
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: d
a) Smart Irrigation
b) Home automation
c) Tracking package handling
d) Noise monitoring
Answer: d
80. …………….IOT system is not suitable for solutions where the data involved is big.
a) IOT Lvel1
b) IOT Lvel2
c) IOT Lvel3
d) IOT Lvel5
Answer: a
a) Single node
b) Double node
c) Triple node
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d) Multiple node
Answer: d
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: d
Answer: a
a) Smart Irrigation
b) Weather Monitoring System
c) Tracking package handling
d) Noise monitoring
Answer: b
Answer: c
Answer: b
Answer: b
Answer: a
91.Does the level shifter converts the voltage levels between RS-232 and transistor-transistor
logic.
a) True
b) False
Answer: a
Answer: d
94.A program written with the IDE for Arduino is called _________
a) IDE source
b) Sketch
c) Cryptography
d) Source code
Answer: b
Answer: c
Answer: a
Answer: c
Answer: a
Answer: d
100. ___________ are pre built circuit boards that fit on top of Android.
a) Sensor
b) Data types
c) Breadboard
d) Sheilds
Answer: d
Answer: b
Answer: a
Answer: c
Answer: a
Answer: d
Answer: b
Answer: d
Answer: c
Answer: d
Answer: b
Answer: d
Answer: a
Answer: c
115. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Humidity
b) Temperature
c) Motion
d) Gas
Answer: b
115. -----------------sensor
a) Humidity
b) Temperature
c) Motion
d) Gas
Answer: b
116. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Accelerator
b) IR
c) Proximity
d) Motion
Answer: d
117. -----------------sensor
a) Accelerator
b) Gas
c) Proximity
d) Smoke
Answer: b
118. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Accelerator
b) Gas
c) Proximity
d) Smoke
Answer: d
119. -----------------sensor
a) Accelerator
b) Gas
c) Proximity
d) Image
Answer: d
120. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Accelerator
b) Gas
c) Proximity
d) Image
Answer: a
121. -----------------sensor
a) Accelerator
b) IR
c) Proximity
d) Motion
Answer: b
122. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Accelerator
b) Gas
c) Proximity
d) Image
Answer: c
a) Stepper
b) Servo
c) DC
d) Linear
Answer: b
Answer: a
a) Stepper
b) Servo
c) DC
d) Linear
Answer: c
a) Chain
b) Linear
c) Rack
d) Locking
Answer: b
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans:D
Ans: A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989
Ans: B
A.1960's
B.1970's
C.1980's
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D.1990's
Ans: C
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
Ans: B
A. Accessing the system's directories viewing mode and navigating through the various systems
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans: D
D. The investigator must maintain strict confidentiality, discussing the results of an investigation
Ans: B
A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
15. In _______phase investigator transfers the relevant data from a venue out of physical or
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
J. Presentation phase
Ans:B
Ans: C
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B. A copy is made onto forensically sterile media. New media should always be used if
available.
D. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation
C. Review phase.
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. Deployment phase.
Ans: B
phase?
C. Review phase.
D. Deployment phase.
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
C. Review phase.
D. Deployment phase
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans: C
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B
Ans: B
Ans. D
A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. Centrify
Ans: A
D. All of above
E. None of above
Ans: D
D. All of above
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
E. None of above
Ans: D
D. To honor confidentially.
Ans: B
33. Which of following is a not unethical norm for Digital Forensics Investigation?
Ans: D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and analysis
on user input.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: A
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
D. Deleting files.
Ans: C
Ans: A
Ans: A
46. Who was proposed UML modeling of digital forensics process model (UMDFPM)?
A. kohn
B. Eloff
C. Oliver
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. All of these
Ans. D
A. DFPM
B. UML
C. case diagram
D. EMIC
Ans. A
48. How many phase are included in Integrated Digital Investigation Process(IDIP)?
A. Five
B. Four
C. Six
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. Seven
Ans. C
49. Which model follow by the Extended Model of Cybercrime Investigation (EMCI) ?
A. Spiral Model
B. Interactive Model
C. SDLC Model
D. Waterfall Model
Ans. D
50. DFPM Along With ……….. group and ………… phases are proposed by carrier and Stafford ?
A. 5, 17
B. 17, 5
C. 4, 17
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. 17, 4
Ans. A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-4 Part-1(MCQ’s)
Ans-c
a.Email-messages
b.cookies
c.Encrypted files
Ans-d
3. What are the three general categories of computer systems that can contain digital
evidence
4.The digital Evidence are used to establish a credible link between the.........
Ans-a
a. True
b. False
Ans-b
6.The most complete copy or a copy which includes all neccessary parts of evidence,which is
closely related to the original evidence
a.Best Evidence
b.orginal Evidence
c.Documented Evidence
Ans-a
c.both a and b
Ans-b
a. Process
b. End result
c. Substance
d. Documents
Ans-d
a. Admissible
b. Belivable
c. Both a and b
d. UnReliable
Ans-c
a. Witness Memory
b. Objective
c. Honesty
11.According to.......... principle when two items make contact there will be an interchange
a.Cohen
b.Edmond Locard
c.Culley
d.Both b and c
Ans-b
a.Illustrative Evidence
b.Best Evidence
c.Origital Evidence
Ans-a
a.Electronic
b.Substantial
c.Documented
d.Illustrative
ans-d
b.Illustrative
c.Documented
d.Both b and c
Ans-c
a.Photographs
b.DNA samples
c.dried blood
d.Footprints
Ans-a
a.Explainable Evidence
b.ELectronic Evidence
c.Illustrative Evidence
d.Substainable Evidence
Ans-d
a.Forensic link
c.Chronological Documentation
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d.all of the above
Ans-d
a.Collection
b.Sequence of control
c.both a and b
d.forensic link
Ans-c
d.both a and c
Ans-a
d.both a and c
Ans-b
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
20.The Substanial Evidence also called as ........
a.Physical Evidence
b.Non-Physical Evidence
c.Exculpatory Evidence
Ans-a
a.Physical Evidence
b.Non-Physical Evidence
c.Exculpatory Evidence
Ans-c
Unit -4 ETI
Q. Chap QUESTION
1. 4.1&4.2 Investigation of computer security which step follow
A. Incident leads to legal proceeding B. Legal proceeding to leads incident
C. incident leads to legal procedure D. Legal proceeding to leads incident
Answer: A
3. 4 To meet the requirement of the judging body and to withstand or face any
challenges, it is essential to follow the _______
A. Evidence-handing procedure B. security
C. Incident-handing procedure D. Relevant evidence
Answer: A
11. 4 Accepting digital evidence court will determine if the evidence is _____
A. relevant B. Authentic
C. Both a and b D. None of the above
Answer: C
12. 4 Evidence can be acquired when electronic device are ____ for examination
A. seized B. Secured
C. Seized and secured D. None of the above
Answer: C
16. 4 Digital evidence topic are divided into how many types
A. 4 B. 2
C. 3 D. 6
Answer: C
19. 4 Digital evidence are used to establish a credible link between the ______
A. Attacker and victim B. Crime scene
C. Both a and b D. None of the above
Answer: C
7. Which type of evidence is typically used in criminal cases in which it support the dependent,
either partially removing their guilt in the case.
A. Explainable evidence
B. Demonstrate evidence
C. Electronic evidence
D. Documents evidence
Ans. D
Chapter
Q. QUESTION
topics
26. 4-4.5.1 The laws of jurisdictions define data as _______________________
A. Written works and record keeping B. Record keeping words
C. None of above D. both
Answer: Written works and record keeping
28. The chain of custody in digital forensics can also be referred to as the________
A. Forensic link B. Scientific link
C. Digital link D. Custody link
Answer: Forensic link
A. iv-i-iii-ii-vi-v B. v-vi-iii-i-ii-iv
C. iii-iv-i-vi-v-ii D. i-ii-iii-iv-v-vi
Answer: iii-iv-i-vi-v-ii
34. To maintained the data in the PDA, its needs to keep in?
A. Continuously charge mode B. Evidence locker
C. In safe place D. both
Answer: Continuously charge mode
43. The owners of these establishments identified the holder of the __________
A. Add-on card B. Identity card
C. Aadhar card D. none
Answer: Add-on card
44. Which case won the second runner -up position for the India Cyber Cop
Award?
A. Credit card fraud B. Hosting Obscene Profiles
C. Illegal money Transfer D. Fake travel agent
Answer: Credit card fraud
48. Who won the India Cyber Cop Award while investigating cases ?
A. Mr S.Balu B. Mr R.S Jadhav
C. Mr Edmond Locard’s D. Mr Sanjay Jadhav
Answer: Mr Sanjay Jadhav
49. Which of the following is not a type of volatile evidence?
A. Log files B. Routing tables
1.Before accessing the security of system,one may want to understand something about the........
A.Victim Mindset
B.Investigator Mindset
C.Offender Mindset
ANS-C
A.Good Guys
D.Both B and C
ANS-D
C.Both A and B
Ans-A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
4.Who states that the public misunderatands them?
A.Victim
B.Hacker
C.Investigators
Ans-B
A.Prejudge
B.postjudge
C.judge
D.missjudge
Ans-A
A.Investigators
B.Crowd
C.Judge
D.Public
Ans-D
7.Many Hackers Stereotype are based on misunderstanding rather than fact.Here Stereotype
means what???
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A.Mind
B.Image
C.Look
Ans-B
Ans-C
A.Hackers
B.Public
C.Judge
Ans-A
A.courage
B.abilities
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C.knowledge
D.problems
Ans-C
A.Normal
B.Positive
C.Negative
D.Both B and C
Ans-B
12.The negavtive aspects of hacking usually overshadow the positive aspects and
promotes...........
A.Positive Aspects
B.Positive Stereotypes
C.Negative Aspects
D.Negative stereotypes
Ans-D
13.Hackers hack for ........of knowledge and the ...... of the challanges.
Ans-D
Ans-D
15.......Hackers might think they can improve electronics and mechanical devices by rewiring
them.
A.Old-School
B.Old-Aged
C.Old-Minded
Ans-A
16.Old-School hackers might think they can improve electronics and mechanical devices by...
A.Fixing them
B.Recreating them
C.Rewiring them
D.Buying new
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans-C
17.Recent Evidence shows that many hackers may also hack for.........Purpose
A.Political
B.Social
C.Both A and B
Ans-C
18.Hackers dont think about the fact that human beings are behind.......
A.walls
B.Firewall
C.wired Network
Ans-B
A.Negative way
B.Positive way
C.neutral Way
D.Both B and C
Ans-A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
20.Hacker looks for victims
A.Files
B.Server
C.Databases
Ans-D
A.Steal
B.Modify
C.Delete
D.A,B,C
Ans-D
A.Easy
B.Hard
C.Normal
D.High
Ans-B
A.Good
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B.Bad
C.Best
D.Worst
Ans-C
A.Acheivement
B.Advancment
C.Adverseness
Ans-B
25. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________
Ans-B
26.Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
A.Cracking
D.Hactivism
Ans-C
27. __________ security consultants uses database security monitoring & scanning tools to
maintain security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
Ans-a
28.Governments hired some highly skilled hackers. These types of hackers are termed as
_______
a) Special Hackers
b) Government Hackers
Ans-d
29.These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
b) Elite Hackers
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
c) Licensed Penetration Testers
Ans-b
30.Someone (from outside) who tests security issues for bugs before launching a system or
application, and who is not a part of that organization or company are ______
Ans-c
Ans-D
A.protect
B.Avoid
C.preserve
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D.Leave
Ans-A
A.Cops
B.Organized Criminals
C.Normal People
D.Detective
Ans-B
A.Nothing
C.fly under radar and find the weaknesses to get their target
Ans-C
35.Which of the following is an eaxmple of how hackers and malicious users think and work:
A.Cycber-terrorits
D.Both A and C
Ans-C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans-D
C.Both A and B
Ans-C
B.Because they are easy to access and minimum chances to get caught
D.Both A and B
Ans-B
D.None of these
Ans-A
40. Using unauthorized software that would otherwise be blocked at the firewall by changing ...
A.Default IP Address
Ans-B
41.What hackers can do by gaining overly trusting colleague's user ID and password............
C.Both A and B
D.None of these
Ans-A
A.Not equal
B.Same
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C.Equal
D.Both B and c
Ans-A
A.motives
B.methods
C.skill
Ans-D
A.Two
B.Three
C.Four
D.Five
Ans-B
A.Script Kiddies
B.Criminal hackers
C.Security researchers
D.Both A and B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans-D
A.Computer Beginners
B.Engineers
C.Programmers
D.All of these
Ans-A
A.Hacker tools
B.Vulnerability scanners
C.Documentation available
D.All of these
Ans-D
48.Who dont have any real knowledge of what's really going on behind the scenes?
A.Criminal hackers
B.Script kiddies
C.Hacktivists
D.Cycber Terrorists
Ans-B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
49.Who are Skilled criminal experts?
A.Script kiddies
B.Hacktivits
C.Cycber terrorists
D.None of these
Ans-D
A.Script kiddies
B.Hacktivits
C.Criminal hackers
D.Cycber terrorists
Ans-C
A.Script
B.Other programs
D.All of these
Ans-D
A.Script kiddies
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B.Criminal Hackers
C.Security researchers
D.Hackitivists
Ans-B
B.Malware
C.Vriuses
D.Worms
Ans-A
A.A.Script kiddies
B.Criminal Hackers
C.Security researchers
D.Hackitivists
Ans-B
A.Criminal
B.Investigator
C.Advanced Hacker
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D.Hacker
Ans-C
A.A.A.Script kiddies
B.Hackitivists
C.Security researchers
D.Criminal Hackers
Ans-D
A.Security researchers
B.Hackitivists
C.Cycber terrorist
Ans-A
A.Track Computer
B. Network
C.Applicaation vulnerabilites
D.All of these
Ans-D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A.White hat
B.Black hat
C.Grey Hat
D.Script kiddies
Ans-A
A.White hat
B.Black hat
C.Grey Hat
D.Script kiddies
Ans-B
A.White hat
B.Black hat
C.Grey Hat
D.Script kiddies
Ans-C
61.Who are invited by software vendors to find security flaws in their system.
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A.White hat
B.Black hat
C.Grey Hat
D.Blue hat
Ans-D
A.Security Researchers
B.IT Professionals
C.Hacktivists
D.Both A and B
Ans-D
A.Security researchers
B.Hackitivists
C.Cycber terrorist
Ans-B
A.Private
B.Public
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C.Common
D.None of these
Ans-B
D.All of these
Ans-D
A.Unorganised
B.organised
C.Both A and B
D.None of these
Ans-C
A.Security researchers
B.Hackitivists
C.Cycber terrorist
A.Security researchers
C.Cycber terrorist
D.Hackitivists
Ans-B
D.All of these
Ans-D
A.Revenge
C.curiosity
Ans-D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
72.Arrange the following steps to become hacker in proper way-
from experts
vulerability
A.i-ii-iii-iv-v-vi-vii-viii-ix-xi-x-xii-xiv-xiii
B.ii-i-iv-viii-iii-xii-vi-vii-v-xiii-ix-xiv-x-xi
C.ii-ix-vi-iii-viii-v-iv-vii-i-xi-xii-xiii-xiv-x
D.ii-ix-iv-iii-viii-v-vi-vii-i-xi-xii-xiii-xiv-x
Ans-D
73.The 3rd step to become hacker is Learn more than one ............
A.Operating System
B.Programming Language
C.Networking concepts
D.Both a and b
Ans-B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A.12
B.13
C.14
D.0-13
Ans-C
75.Computer programs and scripts that help you find and exploit weaknesses in computer
system,web applications,servers and networks is called
A.HAcking tools
B.Hacking weapon
C.Samspade
D.none of these
Ans-A
A.Probely
B.Savvius
C.Medusa
Ans-D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
77.Which tool is easy to use webapplication scanner?
A.Ettercap
B.InsightVM
C.Netspaker
D.Aircrack
Ans-C
A.SAAS
B.PASS
C.IASS
D.none ofthese
Ans-A
79.The fully automated ethical hacking solution that mimics a hacker to keep one step ahead
ofmalicious intruders.
A.Probely
B.Acunetix
C.saferVPN
D.Hashcat
Ans-B
B.JavaScript
Ans-D
D.Both B and C
Ans-D
A.Probely
B.Etterccap
C.Hashcat
D.Both A and B
Ans-A
A.Savvius
B.AirCrack
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C.InsightVM
D.WebInspect
Ans-C
A.InsightVM
B.SaferVPN
C.Netsparker
D.Both A and B
Ans-B
A.Qualys guard
B.GFI LanGuard
C.Ettercap
Ans-D
86.Ettercap supports ........... dissection includes features for network and host analysis
A.Active
B.Passive
D.none of these
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans-C
A.Untrustable
B.Trustable
C.Faithful
D.Most used
Ans-B
A.Angry Ip Scanner
B.GFI LanGuard
C.Ettercap
D.Qualys guard
Ans-A
A.Angry Ip Scanner
B.GFI LanGuard
C.Ettercap
D.Qualys guard
Ans-B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
90............ is automated dynamic application security testing that allows performing ethical
hacking techniques.
A.Acunetix
B.Ettercap
C.Rainbow Crack
D.WebInspect
Ans-D
A.Hashcast
B.SQL Map
C.Qualys Guard
D.medusa
Ans-C
A.SQL Map
B.Hashcast
C.Qualys Guard
D.medusa
Ans-B
C.Sniffing networks
Ans -D
94.............is one of the best oline brute force enthical hacking tool
A.IronWASP
B.Medusa
C.L0phtCrack 6
D.Hashcat
Ans-B
A.NetStumbler
B.Medusa
C.L0phtCrack 6
D.Hashcat
Ans-A
D.All of these
Ans-D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Answer 1. Option A
Explanation: A white-hat hacker is a “good” guy who uses his skills for defensive purposes.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer 2. Option C
Explanation: White-box testing is a security audit performed with internal knowledge of the systems.
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer 3. Option D
Explanation: Reconnaissance is gathering information necessary to perform the attack.
Question 4. What type of ethical hack tests access to the physical infrastructure?
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
A. Internal network
B. Remote network
C. External network
D. Physical access
Answer 4. Option D
Explanation: Physical access tests access to the physical infrastructure.
Question 5. The security, functionality, and ease of use triangle illustrates which concept?
Question 6. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer 6. Option A
Explanation: Disgruntled employees have information which can allow them to launch a powerful
attack.
Question 7. What are the three phases of a security evaluation plan? (Choose three answers.)
D. Final
E. Reconnaissance
F. Design Security
G. Vulnerability Assessment
Answer 7. Options A, B, C
Explanation: The three phases of a security evaluation plan are preparation, conduct s ecurity
evaluation, and conclusion.
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer 8. Option B
Explanation: Hacktivism is performed by individual who claim to be hacking for a political or social
cause.
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer 9. Option B
Explanation: Title 18 of the U.S. Code of law is most commonly used to prosecute hackers
Question 10. When a hacker attempts to attack a host via the Internet it is known as what type
of attack?
A. Remote attack
B. Physical access
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
C. Local access
D. Internal attack
Answer 10. Option A
Explanation: An attack from the Internet is known as a remote attack.
Question 12. Which of the following is a tool for performing footprinting undetected?
A. Whois search
B. Traceroute
C. Ping sweep
D. Host scanning
Answer 12. Option A
Explanation: Whois is the only tool listed that won’t trigger an IDS alert or otherwise be detected by
an organization.
Question 13. Which of the following tools are used for footprinting? (Choose 3 answers.)
A. Whois
B. Sam Spade
C. NMAP
D. SuperScan
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
E. Nslookup
Answer 13. Options A, B, E
Explanation: Whois, Sam Spade, and nslookup are all used to passively gather information about a
target. NMAP and SuperScanare host and network scanning tools.
A. Scanning
B. Enumeration
C. System hacking
D. Active information gathering
Answer 14. Option A
Explanation: According to CEH methodology, scanning occurs after footprinting.
Question 15. Which are good sources of information about a company or its employees?
(Choose all that apply.)
A. Newsgroups
B. Job postings
C. Company website
D. Press releases
Answer 15. Options A, B, C, D
Explanation: Newsgroups, job postings, company websites, and press releases are all good sources
for information gathering.
Question 18.Nslookup can be used to gather information regarding which of the following?
A. Shoulder surfing
B. User identification
C. System monitoring
D. Face-to-face communication
Answer 19. Option A
Explanation: Of the choices listed here, shoulder surfing is considered a type of social engineering.
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
A. A user who holds open the front door of an office for a potential hacker
B. Calling a help desk and convincing them to reset a password for a user account
C. Installing a hardware keylogger on a victim’s system to capture passwords
D. Accessing a database with a cracked password
Answer 20. Option B
Explanation: Calling a help desk and convincing them to reset a password for a user account is an
example of social engineering.
Question 22. Which of the following is the best example of reverse social engineering?
A. A hacker pretends to be a person of authority in order to get a user to give them information.
B. A help-desk employee pretends to be a person of authority.
C. A hacker tries to get a user to change their password.
D. A user changes their password.
Answer 22. Option A
Explanation: When a hacker pretends to be a person of authority in order to get a user to ask them
for information, it’s an example of reverse social engineering.
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
Question 23. Using pop-up windows to get a user to give out information is which type of
social engineering attack?
A. Human-based
B. Computer-based
C. Nontechnical
D. Coercive
Answer 23. Option B
Explanation: Pop-up windows are a method of getting information from a user utilizing a computer.
Question 24. What is it called when a hacker pretends to be a valid user on the system?
A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user
Answer 24. Option A.
Explanation: Impersonation involves a hacker pretending to be a valid user on the system.
A. It increases security.
B. It makes security harder to enforce.
C. It removes the employee’s responsibility to make judgments.
D. It decreases security.
Answer 25. Option C
Explanation: Security policies remove the employee’s responsibility to make judgments regarding a
potential social-engineering attack.
Question 26. Faking a website for the purpose of getting a user’s password and username is
which type of social engineering attack?
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
A. Human-based
B. Computer-based
C. Web-based
D. User-based
Answer 26. Option B
Explanation: Website faking is a form of computer-based social engineering attack.
Question 27. Dumpster diving can be considered which type of social engineering attack?
A. Human-based
B. Computer-based
C. Physical access
D. Paper-based
Answer 27. Option A
Explanation: Dumpster diving is a human-based social engineering attack.
A. 21
B. 25
C. 23
D. 80
Answer 28. Option A
Explanation: FTP uses TCP port 21. This is a well-known port number and can be found in the
Windows services file.
A. 443
B. 80
C. 53
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
D. 21
Answer 29. Option A
Explanation: HTTPS uses TCP port 443. This is a well-known port number and can be found in the
Windows services file.
Question 33. What is the main problem with using only ICMP queries for scanning?
A. SYN-SYN ACK-ACK
B. SYN-ACK-FIN
C. SYN-SYNACK-ACK
D. SYN-PSH-ACK
Answer 35. Option A.
Explanation: A SYN packet is followed by a SYN-ACK packet. Then, an ACK finishes a successful
TCP connection.
Question 36. A packet with all flags set is which type of scan?
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
A. Full Open
B. Syn scan
C. XMAS
D. TCP connect
Answer 36. Option C.
Explanation: An XMAS scan has all flags set.
Question 37. What is the proper command to perform and NMAP SYN scan every 5 minutes?
Question 38. In order to prevent a hacker from using SMB session hijacking, which TCP and
UDP ports would you block at the firewall?
Question 39. Why would an attacker want to perform a scan on port 137?
Question 40. SNMP is a protocol used to manage network infrastructure devices. What is the
SNMP read/write community name used for?
Question 41. Why would the network security team be concerned about ports 135–139 being
open on a system?
Question 42. Which step comes after enumerating users in the CEH hacking cycle?
A. Crack password
B. Escalate privileges
C. Scanning
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
D. Covering tracks
Answer 42. Option A.
Explanation: Password cracking is the next step in the CEH hacking cycle after enumerating users.
Question 44. What is a command-line tool used to look up a username from a SID?
A. UsertoSID
B. Userenum
C. SID2User
D. Getacct
Answer 44. Option C.
Explanation: SID2User is a command-line tool to find a username from a SID.
Question 45. Which tool can be used to perform a DNS zone transfer on Windows?
A. nslookup
B. DNSlookup
C. whois
D. ipconfig
Answer 45. Option A.
Explanation: nslookup is a Windows tool that can be used to initiate a DNS zone transfer that sends
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
all
the DNS records to a hacker’s system.
Explanation: The best countermeasure to SNMP enumeration is to remove the SNMP agent from the device.
Doing so prevents it from responding to SNMP requests.
Question 48. What is the ethics behind training how to hack a system?
Explanation: It is important for ethical hackers and security professional to know how the cyber-criminals think
and proceed to target any system or network. This is why ethical hackers and penetration testers are trained
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
with proper ethics to simulate such a scenario as how the real cyber-attack takes place.
A. A good
B. Not so good
C. very good social engineering practice
D. A bad
Answer 49. Option D.
Explanation: Overlooking or peeping into someone’s system when he/she is entering his/her password is a
bad practice and is against the ethics of conduct for every individual. Shoulder surfing is a social engineering
attack approach used by some cyber-criminals to know your password and gain access to your system later.
Question 50.___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Answer 50. Option C.
Explanation: Malware is one of the biggest culprits that harm companies because they are programmed to do
the malicious task automatically and help hackers do illicit activities with sophistication.
Question 51.Leaking your company data to the outside network without prior permission of
senior authority is a crime.
A. True
B. False
Answer 51. Option A.
Explanation: Without prior permission of the senior authority or any senior member, if you’re leaking or taking
our your company’s data outside (and which is confidential), then it’s against the code of corporate ethics.
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
A. Ethical Hacking
B. Unethical hacking
C. Fixing bugs
D. internal data-Breach
Answer 50. Option A.
Explanation: Ethical hacking is a that used by business organizations and firms for exploiting vulnerabilities to
secure the firm. Ethical hackers help in increasing the capabilities of any organization or firm in protecting their
IT and information assets.
Question 53.The legal risks of ethical hacking include lawsuits due to __________ of personal
data.
A. Stealing
B. disclosure
C. Deleting
D. hacking
Answer 53. Option B.
Explanation: The legal risks of ethical hacking contains lawsuits due to disclosure of personal data during the
penetration testing phase. Such disclosure of confidential data may lead to a legal fight between the ethical
hacker and the organization.
Question 54.Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
Explanation: Before performing any penetration test, through the legal procedure the key points that the
penetration tester must keep in mind are –
iii) the system and networks used in various departments and their confidential data that are sent and
received over the network..
Question 55.An ethical hacker must ensure that proprietary information of the firm does not
get leaked.
A. True
B. False
Answer 55. Option A.
Explanation: Yes, it is very important for an ethical hacker to make sure that while doing penetration tests, the
confidential data and proprietary information are preserved properly and not get leaked to the external network.
Question 56.After performing ____________ the ethical hacker should never disclose client
information to other parties.
A. Hacking
B. Cracking
C. Penteration Testing
D. Expoliting
Answer 56. Option C.
Explanation: It is against the laws and ethics of ethical hacker that after doing penetration tests, the ethical
hacker should never disclose client information to other parties. The protection of client data is in the hands of
the ethical hacker who performed the tests
Question 57.__________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and wrong.
A. Social Ethics
B. Ethics in Cyber-Security
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-6(MCQ’s)
C. Corporate Ethics
D. ethics in Black Hat Hacker
Answer 57. Option D.
Explanation: Ethics in cyber-security is the branch of cyber security that deals with morality and provides
different theories and principles’ regarding the view-points about what is right and what need not to be done.
Question 58.A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
Explanation: A penetration tester must keep in mind the privacy & security requirements as well as policies of
a firm while evaluating the security postures of the target, which is called as “industry and business ethics
policies”.
Ref:
a) https://www.sanfoundry.com/cyber-security-questions-answers-ethics-ethical-hacking/
b) https://www.objectivequiz.com/objective-questions/computer-science/ethical-hacking
Diplomastudyhelper.blogspot.com
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
E. None of the above
Ans: B
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in
many popular products like microwave ovens, automobiles and plug in circuit boards for
desktop PCs. What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds
solutions to complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve
problems in other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called
as
A. Machine Learning
B. Deep Learning
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device
which drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOGD.
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous
system (CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis
through__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. None of these
Ans: A
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. General AI
C. Neural AI
D. None of above
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with
efficiency like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think
like a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as
___AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is
known as___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B
62. Which AI should understand the human emotions, people, and beliefs and be able to
interact socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Limited memory
C. Theory of mind
D. Self-Awareness
Ans: D
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
67. ______________is a branch of science that deals with programing the systems in such a
way that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Neural Networks
D. None of these
Ans: A
68. Classifying email as a spam, labeling webpages based on their content, voice recognition
are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired
by the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Joseph Weizenbaum
D. Arthur Samuel
Ans: D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. General purpose
B. Special purpose
Ans: B
A. An electronic system
C. An electro-mechanical system
D. (A) or (C)
Ans: D
D. All of these
E. None of these
Ans: E
B. Simple calculator
C. Cell phone
Ans: C
A. Apple computer
Ans: B
A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
Ans: C
A. Data collection
B. Data processing
C. Data communication
D. All of these
E. None of these
Ans: D
8. Which of the following is (are) example(s) of embedded system for data communication?
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
Ans: D
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
D. None of these
Ans: D
Ans: A
E. All of these
F. None of these
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: E
A. ASIC
B. ASSP
C. CPU
D. CPLD
Ans: C
A. high power
B. low power
Ans: B
Ans: C
A. Harvard architecture
Ans: B
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Von Neumann architecture
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
Ans: A
B. Pipe-ling
C. Complex architecture
Ans: D
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
A. RS-232C
B. Wi-Fi
C. Bluetooth
D. EEE1394
Ans: A
A. 8-bit CISC
B. 8-bit RISC
C. 32-bit CISC
D. 32-bit RISC
Ans: D
25. The main importance of ARM micro-processors is providing operation with ______
Ans: A
B. Distributed systems
C. Mobile systems
D. Super computers
Ans: C
A. Simple in design.
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Manufacturing time is less.
C. It is faster.
D. Both A&C.
Ans: C
Ans: B
A. Inter-Integrated Clock
B. Initial-Integrated Clock
C. Intel-Integrated Circuit
D. Inter-Integrated Circuit
Ans: D
30. ______________ is the smallest microcontrollers which can be programmed to perform a large range of
tasks.
A. PIC microcontrollers
B. ARM microcontrollers
C. AVR microcontrollers
D. ASIC microcontrollers
Ans: - A
A. PIC
B. AVR
C. ARM
D. ASIC
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: - B
C. Both A & B
Ans: - C
C. Both A& B
Ans: - A
A. Edward L. Schneider
B. Kevin Ashton
C. John H.
D. Charles Anthony
Ans: B
35. The huge numbers of devices connected to the Internet of Things have to communicate automatically,
not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
A. General device
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Information
C. IoT devices
D. Object
Ans: C
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send
and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
B. MQTT
C. COAP
D. SPI
Ans: -A
39 _____ devices may support a number of interoperable communication protocols and communicate with
other device and also with infrastructure.
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. None of above
Ans: C
A. Process
B. People
C. Security
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. Things
Ans:C
D. None of above
Ans:B
A. Smart Watch
B. ATM
C. Radio
D. Video Game
Ans: B
B. Satellite
C. Cable
D. Broadband
Ans:A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
Ans: - D
A. Cloud-based servers/storage.
B. I/O interfaces.
C. Internet connectivity.
Ans: - A
A. Wearable sensors.
B. Smart watches.
C. LED lights.
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. IEEE 802.15.4
Ans: - A
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:B
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:C
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:D
53. LR-WPANs standards from basis of specifications for high level communication protocol such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. 2G
B. 3G
C. 4G
D. None of above
Ans:A
A. 2G
B. 3G
C. 4G
D. None of above
Ans:B
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s physical
layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the destination
network.
A. Application layer
B. Transport layer
C. Network layer
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the underlying
network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send the data
over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
D. None of above
Ans:C
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
B. Coaxial cable
Ans: - B
A. 10 Gbit/s.
B. 1 Gbit/s
D. 250 Kb/s
Ans: - C
A. Zigbee
B. 6LoWPAN
C. CoAP
Ans: C
66. _______________ is useful for time-sensitive application that have very small data units to exchange
and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP resources.
A. HTTP
B. COAP
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Ans: C
A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
A. Machine to Machine
B. Internet of Things
D. Machine Things
Ans: C
A. MQTT
B. HTTP
C. CoAP
D. SPI
Ans: A
75 MQTT is:
Ans: B
A. XPL
B. XML
C. XHL
D. MPL
Ans: B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. Device
B. Email
C. Message
D. Data
Ans: A
A. Decentralized client-server
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
D. Enables network resources and reduces perception of latency and Allows multiple concurrent exchange.
Ans: D
Ans: A
A. Internet applications
B. Device applications
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Wireless applications
D. Wired applications
Ans: A
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
A. Layers
B. Packets
C. Bytes
D. Bits
Ans:B
A. Web chat
B. Error control
C. Connection services
D. Congestion control
Ans: A
A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
Ans: C
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
86. Security based connection is provided by which layer?
A. Application layer
B. Transport layer
C. Session layer
D. Network layer
Ans: D
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
Ans: A
A. Packets
B. Byte streams
C. Bits stream
Ans: B
A. Backbone
B. packets
C. Bytes
D. bits
Ans: A
A. Router
B. Bridges
C. Switches
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. All of the above
Ans: D
A. Host
B. Switches
C. Packets
D. Bridges
Ans: A
A. XMPP
B. HTTP
C. CoAP
D. MQTT
Ans: A
Ans:A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection between
client and server.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
A. Request-Response
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair
Ans: C
Ans: B
Ans: A
Ans: B
A. Fast
B. Anywhere access
C. Higher utilization
Ans: D
A. Platform as a Service
B. Platform as a Survey
C. People as a Service
D. Platform as a Survey
Ans: A
102. _________ as a Service is a cloud computing infrastructure that creates a development environment
upon which applications may be build.
A. Infrastructure
B. Service
C. Platform
Ans:C
103. _________ is a cloud computing service model in which hardware is virtualized in the cloud.
A. IaaS
B. CaaS
C. PaaS
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
a) workunit
b) workspace
c) workload
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on another
vendor’s application.
A. PaaS
B. IaaS
C. CaaS
Ans.B
A. IaaS
B. CaaS
C. PaaS
Ans.C
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
A. Zigbee
B. AllSean
C. Tyrell
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. Z-Wave
Ans:A
A. 802.3
B. 802.11
C. 802.16
D. 802.15.4
Ans:D
110. ____ is a transformative computing paradigm that involves delivering applications and services over
the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
A. True
B. False
Ans.B
A. True
B. False
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans.A
A. Male HDMI
B. Female HDMI
Ans.C
A. USB connection
D. Adapter
Ans.A
A.Cat5
B.at5e
C. cat6
D . RJ45
Ans.D
A. X86
B. MSP
C. AVR
D. ARM
Ans: D
A. True
B. False
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: A
119. Which characteristics involve the facility the thing to respond in an intelligent way to a particular
situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: B
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: C
122. The number of devices that need to be managed and that communicate with each other will be much
larger.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: D
123. ________ in IoT as one of the key characteristics, devices have different hardware platforms and
networks.
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B
A. Sensors
B. Actuators
C. Switches
D. Display
Ans: B
A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B
A. Mechanical
B. Wind
C. Electric
D. None
Ans: A
A. Machine tools
B. Industrial machinery
C.both A and B
D.None
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: A
A. Actuator
B. Machine
C. Electromagnet
D. none of above
Ans: C
A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B
A. Smartphones
B. Aircrafts
C. Both
D. None of above
Ans: C
A. Cameras
B. Night-vision equipment
C. Sonars
D. All of above
Ans: D
A. Toxic
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Natural
C. Oxygen
D. Hydrogen
Ans: A
A. Inexpensive
B. Independent
C. Simple
D. both A and C
Ans: D
A. Sense
C. Both A and B
D. None of above
Ans: C
A. Standard
B. Non-standard
C. Both
D. None
Ans: B
A. ATmega328p
B. ATmega2560
C. ATmega32114
D. AT91SAM3x8E
Ans: A
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
137. ___ is an open source electronic platform based on easy to used hardware and software.
A. Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A
A. Solenoid
B. Relay
C. Linear Actuator
D. Servo motors
Ans:A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and integratd
circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
A. RH
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. PH
C. IC
D. None of aboved
Ans:A
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks, automated
toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:C
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans:D
Ans: A
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
5. In the past, the method for expressing an opinion has been to frame a ____ question based on available
factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens and the
application automatically runs); spread via email
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989
Ans: B
A.1960's
B.1970's
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C.1980's
D.1990's
Ans: C
B. The application of computer science and investigative procedures for a legal purpose involving the
analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use
of validated tools, repeatability, reporting, and possible expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or evidence in a court of
law
Ans: B
A. Accessing the system's directories viewing mode and navigating through the various systems files and
folders
D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems
and devices
Ans: D
D. The investigator must maintain strict confidentiality, discussing the results of an investigation on only a
“need to know”
Ans: B
A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and developing investigative
hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out of physical or administrative
control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or administrative
control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Manipulation of computer data.
Ans: C
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
B. A copy is made onto forensically sterile media. New media should always be used if available.
D. The examination must be conducted in such a way as to prevent any modification of the evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation phase, is
the goal of which phase?
C. Review phase.
D. Deployment phase.
Ans: B
21. To provide mechanism to an incident to be detected and confirmed is purpose of which phase?
C. Review phase.
D. Deployment phase.
Ans: D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
22. Which phase entails a review of the whole investigation and identifies area of improvement?
C. Review phase.
D. Deployment phase
Ans: C
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B
Ans: B
Ans. D
A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
D. All of above
E. None of above
Ans: D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
31. Which of following are Unethical norms for Investigator?
D. All of above
E. None of above
Ans: D
D. To honor confidentially.
Ans: B
33. Which of following is a not unethical norm for Digital Forensics Investigation?
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to view
Information?
A. Metadata
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a
law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans. D
A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and analysis on user
input.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: A
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
D. Deleting files.
Ans: C
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: C
2. What are the three general categories of computer systems that can contain digital evidence?
Ans: D
B. Communication systems
Ans: A
B. Communication systems
Ans: C
Ans: C
B. Communication systems
Ans: B
C. Civil disputes
Ans: D
Ans: C
D. Offenders who are unaware of them leave behind more clues than they otherwise would
have.
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: D
10. Private networks can be a richer source of evidence than the Internet because:
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to limit
the damage and close each investigation as quickly as possible. Which of the following is NOT a
significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity to
learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are used to
allocate corporate and government spending on combating computer-related crime.
D. Computer security professionals develop loose evidence processing habits that can make it
more difficult for law enforcement personnel and attorneys to prosecute an offender. None of the
above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime scene
he/she takes something of the scene with him/her, and leaves something of himself/herself behind,
is:
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This is an
example of:
A. An individual characteristic
B. An incidental characteristic
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those involved
with should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
Ans:
15. An argument for including computer forensic training computer security specialists is:
Ans: C
16. The digital evidence are used to establish a credible link between
Ans: A
C. Exchange rule
Ans: B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
18. From the two given statements 1 and 2, select the correct option from a-d.
Ans: B
19. The evidences or proof can be obtained from the electronic source is called the
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
A. Routing tables
B. Main memory
C. Log files
D. Cached data
Ans: C
A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a
a type of
A. Illustrative evidence
B. Electronic evidence
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Documented evidence
D. Explainable evidence
Ans: A
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: B
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Substantial evidence
Ans: D
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
Ans: A
Ans: C
A. Flash memory
C. Process table
D. Arp cache
Ans: A
29.
is known as testimonial.
A. Oath affidavit
B. DNA samples
C. Fingerprint
D. Dried blood
Ans: A
30.The process of ensuring that providing or obtaining the data that you have collected is similar
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31. When cases got to trial your forensics examiner play one of
role.
A. 2
B. 4
C. 3
D. 5
Ans. A
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
32.Types of digital evidence
A. Eye witness
C. Paper work
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
A. True
B. False
Ans: B
2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A
A. True
B. False
Ans: A
A. True
B. False
Ans: B
5. Digital evidence can be duplicated exactly without any changes to the original data.
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A
A. True
B. False
Ans: B
A. True
B. False
Ans: B
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
A. True
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. False
Ans: A
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Encryption.
D. None of these.
Ans. B
A. Scanner
B. Decoder
C. Proxy
D. All of these.
Ans. D
A. Strengths.
B. Weakness.
C. A &B
D. None of these.
Ans. B
A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
A. Maintaining Access.
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Reconnaissance
C. Scanning.
D. Gaining Access.
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
Ans. A
Ans. B
Ans. A
A. G. Palma.
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Raymond.
C. Either.
D. Jhon Browman.
Ans. B
A. Decade.
B. Year.
C. Century
D. Era.
Ans. C
A. Fame.
B. Profit.
C. Revenge.
Ans. D
12.The intent of ethical hacker is to discover vulnerabilities from a point of view to better secure
system.
A. Victims.
B. Attackers.
C. Both A & B
D. None of these.
Ans. B
A. Entries.
B. Checklists.
C. Both A & B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans. B
A. Penetration testing.
B. Intrusion testing.
C. Red teaming.
Ans. D
15. is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
Ans. B
Ans. A
Ans. B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Steal the data
Ans. C
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
A. True
B. False
Ans. A
A. Police
B. Forensics
C. Thief
D. Hacker
Ans. C
A. Firewall
B. Encryption
C. VNPs
Ans. D
23. exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Network infrastructure attack
Ans. A
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of -
A. Nontechnical attacks
Ans. B
25. comprise of large portion of hacker attacks simply because every computer has one and so
well know exploits can be used against them
A. Nontechnical attacks
Ans. C
A. Data gathering.
B. Attacking
C. Planning
D. Research
Ans. C
A. Written permission.
C. Privacy permission
D. Risk permission.
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans. A
A. Nmap
B. LC4
C. ToneLOC
D. Nessus
Ans. B
A. Whisker
B. Super scan
C. Nikto
D. Kismet
Ans. A
A. WebInspect
B. QualyGuard
Ans. C
A. Thieves
B. Kidnapper
C. Both A & B
Ans. C
32.Which hacker try to distribute political or social message through their work?
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Hactivist
C. Script kiddes
Ans. B
A. Criminal
B. Antinationalist
Ans. C
A. 2600
B. Hackin9
C. PHRACK
Ans. D
ethical
practice.
A. a good
B. not so good
D. a bad
Ans. D
36.has now evolved to be one of the most popular automated tools for unethical hacking.
A. Automated apps
B. Database software
C. Malware
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. Worms
Ans. C
37. Leaking your company data to the outside network without prior permission of senior authority
is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the & requirements of a firm while
evaluating the security postures.
C. hacking techniques
Ans. A
39. The legal risks of ethical hacking include lawsuits due to of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed below
is not mandatory?
Ans. D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: C
2. Which of the following tool is used for Network Testing and port Scanning
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
D. Script Kiddies
Ans: A
4. An attacker can create an attack by sending hundreds or thousands of e-mails a with very large
attachments.
A. Connection Attack
Ans: B
5. Which of the following tool is used for Windows for network queries from DNS lookups to trace
routes?
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
A. Netcat
B. SamSpade
C. SuperScan
Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks
Ans: B
B. TCP scan
D. ACK scan
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: A
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
Ans: A
A. True
B. False
Ans: A
12. is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
Ans: D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. To shutdown services by turning them off.
Ans: C
15. What are the some of the most common vulnerabilities that exist in a network system?
Ans: B
Ans: D
17. Attempting to gain access to a network using an employee’s credentials is called the mode of
ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation ofsecurity?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
D. To locate firewalls
Ans: A
Ans: C
A. 22
B. 80
C. 20
D. 23
Ans: D
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is called
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
Ans: C
Ans: A
A. Reconnaissance
B. Maintaining Access
C. Scanning
D. Gaining Access
Ans: D
A. Passive stack
B. Active stack
D. Scanned
Ans: A
Ans: D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
B. Network, vulnerability, and port
Ans: B
A. Reconnaissance
B. Maintaining Access
C. Gaining Access
D. Scanning
Ans: C
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32.is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. SuperScan
B. Snort
C. Ettercap
D. QualysGuard .
Ans: A
A. DNSlookup
B. Whois
C. Nslookup
D. IP Network Browser
Ans: D
C. connection analysis
Ans: A
A. Firewall bypassing
B. Wi-Fi attacks
C. Packet filtering
Ans: B
A. Spamming
B. Identify Theft
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Impersonation
D. Scanning
Ans: C
Ans: B
39 is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
A. Man-in-the-Middle attack
B. Denial-of-Service attack
C. Sniffing
D. Spoofing
Ans: A
41.is a tool that allows you to look into network and analyze data going across the wire for network
optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
42. is not a function of network analyzer tool.
D. Banner grabbing
Ans: D
A. FTP SNMP
B.
C. RELNET
D. ARP
Ans: A
B. ARP poisoning
C. session hijacking
D. MAC spoofing
Ans: A
A. avoiding detection
Ans: C
A. Attack syllable
C. Attacks hybrid
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
D. All the above
Ans: D
A. black-hat hackers
B. grey-hat hackers
C. script kiddies
D. disgruntled employees
Ans: D
A. hacktivism
B. black-hat hacking
C. active hacking
D. activism
Ans: A
47. When a hacker attempts to attack a host via the internet it is known as what type of attack?
A. local access
B. remote attack
C. internal attack
D. physical access
Ans: B
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50.In computer networking, is any technical effort to manipulate the normal behavior of network
connections and connected systems.
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
52.We can eliminate many well-known network vulnerabilities by simply patch-ing your network
hosts with their latest and
D. None of above
Ans:-B
53.Network consist devices such as routers, firewalls, hosts that you must assess as a part of
process.
A. Prackers
Ans:-D
54.Network infrastructure vulnerabilities are the foundation for most technical security issues in
your information systems.
B. Web vulnerabilities
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. Wireless network vulnerabilities
Ans:-D
55.attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
A. Detection of system
B. Denial of Service
C. Detection of service
D. None of above
Ans:-B
D. None of above
Ans:-A
A. TCL
B. SSL
C. FTP
D. SMTP
Ans:-B
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
59. SSL stands for
Ans:-A
60.include phishing, SQL injection, hacking, social engineering, spamming, denial of service
attacks, Trojans, virus and worm attacks.
B. Web vulnerabilities
Ans:-D
A. Brightn Godfrey
B. Alan yeung
C. Robert Morris
D. None of above
Ans:-C
Ans:-D
Diplomastudyhelper.blogspot.com
Diplomastudyhelper.blogspot.com
C. To overload a system so it is no longer operational
Ans:- C
64.What are some of the most common vulnerabilities that exist in a network or system?
Ans:B
A. SYN-ACK-FIN
B. SYN-SYN ACK-ACK
C. SYN-ACK
D. SYN-SYN-ACK
Ans:B
Ans:-A
A. TCP
B. XMAS
C. IDLE
D. NULL
Ans:-D
Diplomastudyhelper.blogspot.com
cwipedia.in
Question Bank (I scheme)
1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
5. What of the following is considered to be a pivotal event in the history of AI. A.
1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
Ans: C
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of
problem solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the
natural language A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human. A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
Ans: A
A. Narrow AI
B. General AI
C. Super AI
D. None of above
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans. A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
Ans: A
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
Ans: A
67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____. A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network. A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server. A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud. A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation? A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
123. ________ in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B
137. ___ is an open source electronic platform based on easy to used hardware and software. A.
Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989 Ans:
B
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as: A.
Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
20. To collect and analyze the digital evidence that was obtained from the physical investigation
phase, is the goal of which phase? A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made A.
Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation? A.
Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others. Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography. C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information? A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics? A.
Acquisition.
B. Steganography. C.
Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
Happy Learning!
www.cwipedia.in
Cwipedia.in
QUESTION BANK
Unit Test-II
Program: - Computer Engineering Group Program Code:- CM/IF
/CW
Course Title: -Emerging Trends in Computer Technology Semester: - Sixth
ETI (22618) Scheme: I
--------------------------------------------------------------------------------------------------
1. A valid definition of digital evidence is: A. Data stored or transmitted using a computer
B. Information of probative value
C. Digital data of probative value
D. Any digital evidence on a computer
Ans: C
2. What are the three general categories of computer systems that can contain digital evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because: A. They retain
data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to limit
the damage and close each investigation as quickly as possible. Which of the following is NOT
a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime scene
he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This is
an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those involved with
_______ should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above Ans:
15. An argument for including computer forensic training computer security specialists is: A. It
provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above. Ans: C
16. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the ___________
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
21. The evidence must be usable in the court which is called as_______
A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a a type of
_____________
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as ____________
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
26. Which is not procedure to establish a chain of custody? A. Save the original materials. B. Take
photos of physical evidence.
C. Don’t take screenshots of digital evidence content.
D. Document date, time, and any other information of receipt.
Ans: C
30.The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as___________
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31. When cases got to trial your forensics examiner play one of ____ role.
A. 2
B. 4
C. 3 D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
----------------------------------------------------------------------------------------------------------------
----
2. Attorneys and police are encountering progressively more digital evidence in their work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data. A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks. A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred. A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
--------------------------------------------------------------------------------------------------------------------
A. B, C, D, A
B. B, A, C, D C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain
access to the authorized user. A. Social Engineering. B.
IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
12.The intent of ethical hacker is to discover vulnerabilities from a_____ point of view to better
secure system.
A. Victims.
B. Attackers.
C. Both A & B D. None of these.
Ans. B
15._______ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23.______ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of ____-
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25.______ comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32.Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
35. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad Ans. D
36. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C
37. Leaking your company data to the outside network without prior permission of senior authority
is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to __________ of personal data. A.
stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed below
is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
--------------------------------------------------------------------------------------------------------------------
2. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. _________is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
14. What is purpose of Denial of Service attacks? A. Exploit weakness in TCP/IP attack. B. To
execute a trojan horse on a system.
C. To overload a system so it is no longer operational.
D. To shutdown services by turning them off.
Ans: C
15. What are the some of the most common vulnerabilities that exist in a network system? A.
Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
16. Which of the following is not a characteristic of ethical hacker? A. Excellent knowledge of
Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Ans: D
17. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called ________.
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
28. What are the types of scanning? A. Port, network, and services
B. Network, vulnerability, and port
C. Passive, active, and interactive
D. Server, client, and network
Ans: B
30. ______________ framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap Ans: B
31.__________ is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32.________ is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 _____ is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. ______is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
44. What is the attack called “evil twin”? A. rouge access point
B. ARP poisoning
C. session hijacking
D. MAC spoofing
Ans: A
47. When a hacker attempts to attack a host via the internet it is known as what type of attack? A.
local access
B. remote attack
C. internal attack
D. physical access
Ans: B
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50.In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52.We can eliminate many well-known network vulnerabilities by simply patch-ing your network
hosts with their latest ______and______.
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53.Network consist devices such as routers, firewalls, hosts that you must assess as a part of
______ process.
A. Prackers
B. Black hat hacking C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security issues in
your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55.____ attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
60. ____ include phishing, SQL injection, hacking, social engineering, spamming, denial of
service attacks, Trojans, virus and worm attacks.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
62. Which of the following is not a typical characteristic of an ethical hacker? A. Excellent
knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Ans:-D
63. What is the purpose of a Denial of Service attack?
A. Exploit a weakness in the TCP/IP stack
B. To execute a Trojan on a system
C. To overload a system so it is no longer operational
D. To shutdown services by turning them off
Ans:- C
64.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system. Ans:B
2) _____is a branch of Science which deals with helping machines find solutions to complex problems in
a more human-like fashion.
a. Artificial Intelligence
b. Internet of Things
c. Embedded System
d. Cyber Security
3) In ____ the goal is for the software to use what it has learned in one area to solve problems in other
areas.
a. Machine learning
b. Deep learning
c. Neural networks
d. None of these
4) Computer programs that mimic the way the human brain processes information is called as
a. Machine learning
b. Deep learning
c. Neural networks
d. None of these
6) Chomsky’s linguistic computational theory generated a model for syntactic analysis through
a. Regular grammar
b. Regular expression
c. Regular word
d. None of these
7) These machines only focus on current scenario and react on it as per possible best action
a. Reactive Machines
b. Limited Memory
c. Theory of Mind
d. Self-Awareness
8) _____ the father of AI described AI as, “The science and engineering of making intelligent machines,
especially intelligent computer programs”.
a. Margaret Geller
b. James Watson
c. John McCarthy
d. Donald Knuth
10) ____ is a message that contains relevant meaning, implication or input for decision and/or action.
a. Information
b. Data
c. Knowledge
d. Intelligence
11) _______ requires ability to sense the environment, to make decisions, and to control action.
a. Information
b. Data
c. Knowledge
d. Intelligence
13) Which skills are imperative to convey how AI services and tools will help when employed within
industry settings?
a. Communication Skills (written & verbal)
b. Reading skills
c. Animation
d. None of the above
14) Pursuing a career in the field of AI we require specific education based on the foundation of ____,
technology, logic and engineering perspective.
a. Math
b. Science
c. Thinking
d. History
15) ______ do not guarantee optimal solutions; in fact, they do not guarantee any solution at all.
a. Cognitive Science
b. Heuristics
c. Turing Test
d. GPS
21) The compound components are built up through core components are___
a. Knowledge
b. Reasoning, search
c. NLP, Vision
d. All of the above
27) The modern philosopher such as ______ correlated logic with mathematics.
a. Turing
b. Bertrand Russell
c. John McCarthy
d. Charles Babbage and Boole
29) In ____ Marvin Minsky pushed the logical formalism to integrate reasoning with knowledge.
a. 1940s
b. 1959s
c. 1960s
d. 1966s
30) KBS stands for___
a. Knowledge Based System
b. Knowledge of Basic Science
c. Knowledge Behave System
d. None of the above
32) ______ AI is a type of AI which is able to perform a dedicated task with intelligence.
a. General AI
b. Strong AI
c. Narrow AI
d. Reactive AI
35) ________ AI is a type of intelligence which could perform any intellectual task with efficiency like a
human.
a. General AI
b. Strong AI
c. Narrow AI
d. Reactive AI
37) _____ can store past experiences or some data for a short period of time.
a. Reactive Machines
b. Limited Memory
c. Theory of Mind
d. Self-Awareness
38) ______ AI should understand the human emotions, people, beliefs, and ne able to interact socially like
humans.
a. Reactive Machines
b. Limited Memory
c. Theory of Mind
d. Self-Awareness
40) By which process it is possible to interact with the computer that understands natural language spoken
by humans.
a. Expert systems
b. Natural Language Processing
c. Vision systems
d. Speech Recognition
41) ______ these systems understand, interpret and comprehend visual input on the computer.
a. Expert systems
b. Natural Language Processing
c. Vision systems
d. Speech Recognition
42) _______ intelligent systems are capable of hearing and comprehending the language in terms of
sentences and their meanings while a human talks to it.
a. Expert systems
b. Natural Language Processing
c. Vision systems
d. Speech Recognition
43) The ________ software reads the text written on paper by a pen or on screen by a stylus.
a. Handwriting Recognition
b. Speech Recognition
c. Expert systems
d. Vision Systems
44) ______ is a branch of science that deals with programming the systems in such a way that they
automatically learn and improve with experience.
a. Deep Learning
b. Machine Learning
c. Artificial Intelligence
d. Embedded Systems
45) What are the different ways to implement machine learning techniques?
a. Deep learning
b. Supervised Learning
c. Unsupervised Learning
d. Both b and c
46) _____ deals with learning a function from available training data.
a. Deep Learning
b. Supervised Learning
c. Unsupervised Learning
d. None of the above
47) _____ makes sense of unlabeled data without having any predefined dataset for its training.
a. Deep Learning
b. Supervised Learning
c. Unsupervised Learning
d. None of the above
49) Deep Learning is a subfield of machine learning where concerned algorithms are inspired by the
structure and function of the brain called _______.
a. Neural Networks
b. Artificial Neural Networks
c. Natural language process.
d. None of the above
10) The embedded system programs are mainly written using programming software like
a. Turbo c
b. TASM
c. Proteus or Lab-view
d. Eclipse
16) PIC microcontrollers are the ____ microcontrollers which can be programmed to perform a large
range of tasks.
a. Smallest
b. Largest
c. Both a and b
d. None of these
25) ____ protocols determine how the data is physically sent over the network’s physical layer or medium.
a. Application Layer
b. Transport Layer
c. Network Layer
d. Link Layer
26) _____ is a collection of wired Ethernet standards for the link layer.
a. IEEE 802.3
b. IEEE 802.11
c. IEEE 802.16
d. IEEE 802.15.4
27) ______ is a collection of wireless Local Area Network (WLAN) communication standards, including
extensive description of the link layer.
a. IEEE 802.3
b. IEEE 802.11
c. IEEE 802.16
d. IEEE 802.15.4
30) The ____ Layer protocols provide end-to-end message transfer capability independent of the
underlying network.
a. Application Layer
b. Transport Layer
c. Network Layer
d. Link Layer
34) ____ protocol does not provide guaranteed delivery, ordering of messages and duplicate elimination.
a. TCP
b. UDP
c. HTTP
d. FTP
35) _____ is the application layer protocol that forms the foundation of the WWW.
a. TCP
b. UDP
c. HTTP
d. FTP
36) HTTP includes commands such as
a. GET, PUT
b. POST, DELETE
c. HEAD, TRACE
d. All of the above
38) WebSocket protocol allows ____ communication over a single socket connection for sending
messages between client and server.
a. Half –Duplex
b. Simplex
c. Full- Duplex
d. None of the above
44) _______ is a transformative computing paradigm that involves delivering applications and services
over the internet.
a. Big Data Analytics
b. Wireless Sensor Network
c. Cloud Computing
d. None of the above
46) _____ devices are the microcontrollers and microcontroller kit for building digital devices that can be
sense and control objects in the physical and digital world.
a. Raspberry Pi
b. Arduino
c. Node MCU
d. Uno
47) Inexpensive, Cross-platform, Simple, clear programming environment is the ____ of the Arduino.
a. Characteristics
b. Features
c. Properties
d. Components
49) Which of the following device measure the amount of Heat energy generated from an object or
surrounding area?
a. Humidity Sensors
b. Temperature Sensors
c. Gas Sensors
d. Smoke Sensors
50) Which sensor is used to sense the amount of water vapor in air
a. Humidity Sensors
b. Temperature Sensors
c. Gas Sensors
d. Smoke Sensors
Unit 3- Basics of Digital Forensic
1) ____ is a well-established science that pays vital role in criminal justice systems.
a. Machine Learning
b. Artificial Intelligence
c. Forensic Science
d. Deep Learning
3) Field of pc forensics began in ___ when personal computers became a viable possibility for the buyer.
a. 1965
b. 1970
c. 1980
d. 1985
4) In ___ an associate Federal Bureau of Investigation program was created, which was referred to as
magnet media program.
a. 1980
b. 1984
c. 1990
d. 1995
9) In ____ the great countries declared that law enforcement personnel should be trained and equipped to
deal with sophisticated crimes.
a. 1990
b. 1995
c. 1997
d. 1998
17) Which of the following stage consists in finding and collecting digital information that may be relevant
to the investigation?
a. Identification
b. Preservation
c. Collection
d. Examination
18) Which of the following stage consists in an in-depth systematic search of evidence?
a. Identification
b. Preservation
c. Collection
d. Examination
20) ___ Phase entails writing a report outlining the examination process and pertinent data recovered from
the overall investigation.
a. Collection
b. Examination
c. Analysis
d. Reporting
25) Which phase involves the preparation of tools, techniques, search warrants and monitoring authorization
and management support?
a. Identification
b. Preparation
c. Approach Strategy
d. Preservation
26) Which phase involves the isolation, securing and preserving the state of physical and digital evidence.
a. Identification
b. Approach Strategy
c. Preservation
d. Collection
28) At which phase summary & explanation of conclusion will take place?
a. Examination
b. Analysis
c. Presentation
d. Returning Evidence.
29) At which phase physical & digital property returned to proper owner?
a. Examination
b. Analysis
c. Presentation
d. Returning Evidence.
31) DFPM along with 5 groups and 17 phases are proposed by ____
a. G. Gunsh
b. S. Ciardhuain
c. Carrier and Safford
d. J. Korn
32) The goal of ____ phase is to ensure that the operations and infrastructure are able to fully support an
investigation.
a. Readiness
b. Deployment
c. Physical Crime Investigation
d. Digital Crime Investigation
34) The purpose of ___ phase is to provide a mechanism for an incident to be detected and confirmed.
a. Readiness
b. Deployment
c. Physical Crime Investigation
d. Digital Crime Investigation
37) How many sub phases are involved in physical crime investigation phase?
a. 4
b. 5
c. 6
d. 7
38) Which phase involves taking photographs, sketches, and videos of the crime scene and the physical
evidence?
a. Preservation phase
b. Survey phase
c. Documentation phase
d. Search & collection phase
39) The goal of ___ phase is to collect and analyze the digital evidence that was obtained from the physical
investigation phase and through any other future means.
a. Deployment
b. Digital Crime Investigation phase
c. Readiness
d. Review phase
40) ____ Phase entails a review of the whole investigation and identifies areas of improvement.
a. Deployment
b. Digital Crime Investigation phase
c. Readiness
d. Review phase
49) Ethical decision making in digital forensic work comprises which of the following?
a. Honesty towards the investigation
b. Prudence means carefully handling the digital evidences
c. Compliance with the law and professional norms
d. All of the above
50) Which of the following is an Unethical norm for Digital Forensic Investigation?
a. Express an opinion on the guilt or innocence belonging to any party
b. To avoid harm to others
c. To be fair and take actions not to discriminate
d. To respect the privacy of others.
a. EEDIP
b. RMDFR
c. IDIP
d. Both (a) & (b)
a. RMDFR
b. IDIP
c. ADFM
d. UMDFPM
54) Identify the following model:
a. RMDFR
b. IDIP
c. ADFM
d. EEDIP
a. EMCI
b. UMDFPM
c. IDIP
d. EEDIP
a. EMCI
b. UMDFPM
c. IDIP
d. EEDIP
Unit 4- Digital Evidence
1) The field of ____ includes events that provide a successful courtroom experience, which are both
worthwhile and satisfactory.
a. Computer Networking
b. Computer Security
c. Ethical hacking
d. Computer Programming
2) To meet the requirements of the judging body and to withstand or face any challenges, it is essential
to follow the ____ procedure.
a. Evidence carrying
b. Evidence hiding
c. Evidence handling
d. None of the above
3) Any information that can be confident or trusted and can prove something related to a case in trial
that is, indicating that a certain substance or condition is present is called as___.
a. Relevant Evidence
b. Evidence
c. Digital evidence
d. Both (b) & (c)
4) Information which has a positive impact on the action occurred, such as the information supporting
an incident is called as____.
a. Relevant Evidence
b. Evidence
c. Digital Evidence
d. None of the above
6) Text messages, emails, pictures, videos and internet searches are most common types of ___.
a. Digital Evidence
b. Relevant Evidence
c. Testimonial Evidence
d. None of the above
7) The digital evidence are used to establish a credible link between____
a. Attacker and victim and the crime scene
b. Attacker and the crime scene
c. Victim and the crime scene
d. Attacker and information
8) The most complete copy or a copy which includes all necessary parts of evidence which is closely
related to the original evidence is called as___
a. Ideal Evidence Rule
b. Best Evidence Rule
c. Exchange Rule
d. All of the mentioned
9) The ____ says that an original writing must be offered as evidence unless it is unavailable, in which
case other evidence, like copies, notes or other testimony can be used.
a. Ideal Evidence Rule
b. Best Evidence Rule
c. Exchange Rule
d. All of the mentioned
16) When an incident takes place, a criminal will leave hint evidence at the scene and remove a hint
evidence from the scene. This alteration is known as the ____.
a. Locard’s Exchange Principle
b. Digital Stream of Bits
c. Chain of Custody
d. None of the above
20) The evidences or proof that can be obtained from the electronic source is called the___.
a. Digital Evidence
b. Documented Evidence
c. Demonstrative Evidence
d. Substantial Evidence
21) In ____ the proof is presented in writing (Viz. contracts, wills, invoices etc.).
a. Illustrative evidence
b. Electronic evidence
c. Documented evidence
d. Explainable evidence
24) ___ Evidence is spoken by the spectator under the oath, or writing evidence given under the oath by
an official declaration that is affidavit.
a. Illustrative evidence
b. Testimonial
c. Documented evidence
d. Explainable evidence
25) The _____ in digital forensics can also be referred to as the forensic link, the paper trail or the
chronological documentation of electronic evidence.
a. Locard’s Exchange Principle
b. Digital Stream of Bits
c. Chain of Custody
d. None of the above
26) Which case won the second runner up position for the India Cyber Cop Award for its investigating
officer Mr. S. Balu, Assistant Commissioner of Police, Crime, Chennai Police.
a. Credit Card Fraud
b. Hosting Obscene Profiles
c. Illegal money transfer
d. Fake travel agent
4) Ethical hacking will allow to ____ all the massive security breaches.
a. Remove
b. Measure
c. Reject
d. None of these
6) _____ is the science of testing computers and network for security vulnerabilities and plugging the
holes found before the unauthorized people get a chance to exploit them.
a. Computer Security
b. Ethical Hacking
c. Both a & b
d. None of the above
7) ____ is the art of exploiting the human elements to gain access to unauthorized resources.
a. Ethical Hacking
b. Computer Security
c. Social Engineering
d. None of the above
9) ____ is a person who finds and exploits the weakness in computer systems and/or networks to gain
access.
a. Hacker
b. Cracker
c. Malicious user
d. None of the above
10) An ______ hacker is a security professional who applies their hacking skills for defensive purposes on
behalf of the owners of information systems.
a. Grey hat
b. Black hat
c. Ethical
d. Script kiddies
11) _____ or internal attackers try to compromise computers and sensitive information from the inside as
authorized and trusted users.
a. Hacker
b. Script kiddies
c. Malicious users
d. None of the above
12) _____ means a rogue employee, contractor, intern or other user who abuses his or her trusted
privileges.
a. Ethical hacker
b. Black hat hacker
c. Grey hat hacker
d. Malicious users
13) A hacker who gains access to systems with a view to fix the identified weakness is called as___.
a. Ethical hacker
b. White hat hacker
c. Black hat hacker
d. Both a & b
14) A hacker who gains unauthorized access to computer systems for personal gain is called as ____.
a. Script kiddies
b. Black hat hacker
c. Cracker
d. Both b & c
16) Which hacker’s intent is to steal corporate data, violate privacy rights, transfer funds from bank account
etc.?
a. White hat
b. Cracker
c. Grey hat
d. Script kiddies
17) A hacker who is in between ethical and black hat hackers is called as ____.
a. White hat hacker
b. Script kiddies
c. Grey hat hacker
d. Phreaker
18) A non-skilled person who gains access to computer systems using already made tools is called as ____.
a. White hat hacker
b. Script kiddies
c. Grey hat hacker
d. Black hat hacker
19) A hacker who uses hacking to send social, religious and political etc. messages is called as___.
a. Grey hat hacker
b. Script kiddies
c. Hacktivist
d. Phreaker
20) A hacker who identifies and exploits weaknesses in telephones instead of computers is called as___.
a. Grey hat hacker
b. Script kiddies
c. Hacktivist
d. Phreaker
21) What is the slogan for ethical hacking?
a. To catch a thief, think like a thief
b. To catch a thief, think like a police
c. Both a & b
d. None of the above
23) “Flooding a network with too many requests, creating Denial of Service (DoS) for legitimate requests”,
this type of attack is known as ____.
a. Nontechnical attacks
b. Network infrastructure attacks
c. Operating system attacks
d. Application and other specialized attacks
26) Viruses, worms, Trojan horses and spyware are called as ____.
a. Malicious software
b. Malware
c. Both a & b
d. None of the above
30) How many steps are there for person to become hacker?
a. 5
b. 13
c. 15
d. 20
32) Which of the following tool is focusing on detecting, prioritizing and remediating vulnerabilities?
a. Netsparker
b. Insight VM
c. Safer VPN
d. Ettercap
33) Which tool is used to check target in different geographies, simulate non-personalized browsing
behavior, undiscovered file transfer etc.?
a. Insight VM
b. Safer VPN
c. Burp suite
d. Ettercap
34) ___ is a useful platform for performing security testing of web applications.
a. Insight VM
b. Safer VPN
c. Burp Suite
d. Ettercap
35) ____ Supports active and passive dissection includes features for network and host analysis.
a. Ettercap
b. Aircrack
c. GFI LanGuard
d. Savvius
38) ____ is an ethical tool that scans networks for vulnerabilities. It can acts as your virtual security
consultant on demand. It allows creating an asset inventory of every device.
a. Angry IP Scanner
b. Savvius
c. GFI LanGuard
d. Qualys guard
39) ____ Performance issues and reduces security risk with the deep visibility provided by Omnipeek.
a. Angry IP Scanner
b. Savvius
c. Qualys guard
d. WebInspect
40) ___ helps businesses streamline their security and compliance solutions. It also builds security into
their digital transformation initiatives.
a. Savvius
b. Qualys guard
c. WebInspect
d. Hashcat
41) Which tool provides comprehensive dynamic analysis of complex web applications and services?
a. Hashcat
b. WebInspect
c. L0phtCrack 6
d. Rainbow Crack
42) Which tool is used for helping users to recover lost passwords, audit password security, or just find out
what data is stored in a hash?
a. Hashcat
b. L0phtCrack 6
c. Rainbow Crack
d. IKECrack
43) ____ is useful password audit and recovery tool. It identifies and assesses password vulnerability over
local machines and networks.
a. Medusa
b. NetStumbler
c. SQLMap
d. L0phtCrack 6
44) ____ is a password cracking tool widely used for ethical hacking. It cracks hashes with rainbow tables.
It uses time-memory tradeoff algorithm for this purpose.
a. Hashcat
b. Medusa
c. Rainbow Crack
d. ironWASP
46) Which tool is designed to be customizable so that users can create their custom security scanners using
it?
a. IKECrack
b. IronWASP
c. Netstumbler
d. SQL Map
47) _____ is one of the best online brute-force, speedy, parallel password crackers ethical hacking tool.
a. Medusa
b. SQL Map
c. NetStumbler
d. IronWASP
48) ____ is used to detect wireless networks on the windows platform.
a. Medusa
b. SQL Map
c. NetStumbler
d. Nessus
49) Recover MS Access passwords, uncover password field, sniffing networks are done by ___.
a. NetStumbler
b. SQL Map
c. Nessus
d. None of the above
50) ____ can be used to perform remote vulnerability scanner, password dictionary attacks etc.
a. Medusa
b. NetStumbler
c. SQL Map
d. Nessus
Unit 6- Types of Hacking
1) ___ used for windows for network queries from DNS lookups to trace routes.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap
3) ___ tools Pro for dozens of network security-assessment functions, including ping sweeps, port
scanning, and SMTP relay testing.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap
4) ____ used as a happy-clicky-GUI front end for host-port probing and operating system fingerprinting.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap or NMapWin
5) ____ is the most versatile security tool for such security checks as port scanning and firewall testing.
a. NetScan
b. Nmap or NMapWin
c. Netcat
d. WildPacketsEtherPeek
7) Which software tool is used to scan the network to see who’s there and provide basic views of how the
network is laid out?
a. Port Scanner
b. Ping Sweeping
c. SNMP Scanning
d. Banner Grabbing
8) As an ethical hacker, you should scan all ____ ports on each network host that’s found by your scanner.
a. 6346 TCP and 6347 UDP
b. 27665 TCP and 31335 UDP
c. 65,535 TCP and 65,535 UDP
d. 1434 TCP and 1434 UDP
19) Which tool is used to find out the general network information, such as the number of unique IP
addresses, NetBIOS names and MAC addresses?
a. Nmap
b. Sam Spade
c. NetScanTools Pro
d. None of the above
20) ____ is executed through the searching of multiple hosts in order to target just one specific open port.
a. Port scanning
b. Port sweeping
c. Port searching
d. None of the above
21) _____ is considered a serious threat to one’s PC, as it can occur without producing any outward signs to
the owner that anything dangerous is taking place.
a. Port scanning
b. Port sweeping
c. Port searching
d. None of the above
22) A ___ monitors incoming and outgoing connections through one’s personal computer.
a. Router
b. Repeater
c. Firewall
d. Modem
23) ___ tells Nmap to perform a ping scan.
a. sP
b. n
c. –T4
d. 192.168.1.1-254
27) If ___ is compromised, a hacker can gather such network information as ARP tables and TCP
connections to attack your systems.
a. ICMP
b. SNMP
c. FTP
d. Banner grabbing
28) ____ is the act of capturing the information provided by banners, configurable text-based welcome
screens from network hosts that generally display system information.
a. ICMP
b. SNMP
c. FTP
d. Banner grabbing
31) ____ can grab banner information from routers and other network hosts, such as a wireless access point
or managed Ethernet switch.
a. Telnet
b. Netcat
c. Network analyzer
d. None of the above
32) A ___ is a tool that allows you to look into a network and analyze data going across the wire for network
optimization, security, and/or troubleshooting purposes.
a. Telnet
b. Netcat
c. Network analyzer
d. None of the above
34) EtherPeek by WildPackets network analyzer tools supports ____ operating system.
a. Windows
b. Windows and UNIX
c. Windows and Linux
d. UNIX
35) Ethereal & Ettercap Network analyzer tool supports _____ operating system.
a. Windows
b. Windows and UNIX
c. Windows and Linux
d. UNIX
37) ____ tools can modify the ARP tables, which are responsible for saving IP addresses to MAC address
mappings on network hosts.
a. Dsniff tool
b. Cain & Abel tool
c. Both a & b
d. None of the above
38) The victims machines think they require to forward traffic to the hacker’s computer rather than to the
correct destination machine when communicating on the network and this type of is called as _____
a. Denial of service attack
b. Man-in-the-middle attack
c. ARP spoofing attack
d. None of the above
39) An excessive amount of ARP requests can be a sign of an ____ attack on your network.
a. ARP poisoning attack
b. ARP spoofing attach
c. Man-in-the-middle attack
d. Both a & b
41) ____ can be captured directly out of the airwaves, making this communication medium susceptible to
malicious eavesdropping.
a. Wired traffic
b. Wireless traffic
c. Rogue networks
d. Physical security problems
43) The Orinoco Client Manager software stores ____ keys in the windows Registry even for multiple
networks.
a. Decrypted WEP
b. Encrypted WEP
c. Both a & b
d. None of the above
45) An _____ is a program that acts as an interface between the software and computer hardware.
a. Networking
b. Remote code execution
c. Storage overload
d. Operating System
47) An attacker can create an ______attack by sending hundreds or thousands of e-mails with very large
attachments.
a. Connection attack
b. Autoresponder attack
c. Attachment overloading attack
d. All of the above
48) Multiple large messages can quickly fill the total storage capacity of an e-mail server is called as __
a. Email bomb
b. Storage overload
c. Bandwidth blocking
d. Connection attack
49) What are the countermeasures are there to prevent attachment-overloading attack?
a. Limit the size of either e-mails or e-mail attachments
b. Limit each user’s space on the server
c. Both a & b
d. None of the above
51) ____ is that annoying automatic e-mail response you often get back from random users when you’re
subscribing to a mailing list.
a. Connection attack
b. Autoresponder attack
c. Attachment overloading attack
d. All of the above
52) ___ attack is basically browsing a site and looking for clues about the server’s directory structure.
a. SQL Injection
b. Cross site Scripting
c. Directory Traversals
d. Security Misconfiguration
EMERGING TRENDS IN COMPUTER AND
INFORMATION TECHNOLOGY (22618)
2. What are the three general categories of computer systems that can contain digital
evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related
crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This
is an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those
involved with should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above
Ans:
15. An argument for including computer forensic training computer security specialists is:
A. It provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above.
Ans: C
16. The digital evidence are used to establish a credible link between
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
30. The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31. When cases got to trial your forensics examiner play one of role.
A. 2
B. 4
C. 3
D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
True or False Questions
1. Digital evidence is only useful in a court of law.
A. True
B. False
Ans: B
2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
15. is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23. exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24. Connecting into network through a rogue modem attached to computer behind a firewall is an
example of -
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25. comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32. Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
37. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the &
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
2. Which of the following tool is used for Network Testing and port Scanning
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
6. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
15. What are the some of the most common vulnerabilities that exist in a network system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
17. Attempting to gain access to a network using an employee’s credentials is called the
mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called .
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
30. framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
31. is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32. is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
45. Which type of hacker represents the highest risk to your network?
A. black-hat hackers
B. grey-hat hackers
C. script kiddies
D. disgruntled employees
Ans: D
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50. In computer networking, is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52. We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest and .
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53. Network consist devices such as routers, firewalls, hosts that you must assess as a part of
process.
A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55. attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
64. What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Ans:B
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
Multiple Choice Questions & Answers (MCQs)
In LISP, the function returns the list that results after the first element is removed (the rest f the
list), is __________
a) car
b) last
c) cons
d) cdr
Which of the following contains the output segments of Artificial Intelligence programming?
a) Printed language and synthesized speech
b) Manipulation of physical object
c) Locomotion
d) All of the mentioned
A series of Artificial Intelligence systems, developed by Pat Langley to explore the role of
heuristics in scientific discovery is ________
a) RAMD
b) BACON
c) MIT
d) DU
A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence, Presently, this technique is called __________
a) Turing Test
b) Algorithm
c) Boolean Algebra
d) Logarithm
Which approach to speech recognition avoids the problem caused by the variation in speech
patterns among different speakers?
a) Continuous speech recognition
b) Isolated word recognition
c) Connected word recognition
d) Speaker-dependent recognition
DARPA, the agency that has funded a great deal of American Artificial Intelligence research, is
part of the Department of __________
a) Defense
b) Energy
c) Education
d) Justice
. Which of these schools was not among the early leaders in Artificial Intelligence research?
a) Dartmouth University
b) Harvard University
c) Massachusetts Institute of Technology
d) Stanford University
A certain Professor at the Stanford University coined the word ‘artificial intelligence’ in 1956 at
a conference held at Dartmouth college. Can you name the Professor?
a) David Levy
b) John McCarthy
c) Joseph Weizenbaum
d) Hans Berliner
In 1985, the famous chess player David Levy beat a world champion chess program in four
straight games by using orthodox moves that confused the program. What was the name of the
chess program?
a) Kaissa
b) CRAY BLITZ
c) Golf
d) DIGDUG
. The explanation facility of an expert system may be used to __________
a) construct a diagnostic model
b) expedite the debugging process
c) explain the system’s reasoning process
d) expedite the debugging process & explain the system’s reasoning process
The conference that launched the AI revolution in 1956 was held at?
a) Dartmouth
b) Harvard
c) New York
d) Stanford
The Al researcher who co-authored both the Handbook of Artificial Intelligence and The Fifth
Generation is __________
a) Bruce Lee
b) Randy Davis
c) Ed Feigenbaum
d) Mark Fox
A network with named nodes and labeled arcs that can be used to represent certain natural
language grammars to facilitate parsing.
a) Tree Network
b) Star Network
c) Transition Network
d) Complete Network
Which of the factors affect the performance of learner system does not include?
a) Representation scheme used
b) Training scenario
c) Type of feedback
d) Good data structures
Which instruments are used for perceiving and acting upon the environment?
a) Sensors and Actuators
b) Sensors
c) Perceiver
d) None of the mentioned
Which element in the agent are used for selecting external actions?
a) Perceive
b) Performance
c) Learning
d) Actuator
What is an ‘agent’?
a) Perceives its environment through sensors and acting upon that environment through actuators
b) Takes input from the surroundings and uses its intelligence and performs the desired
operations
c) A embedded program controlling line following robot
d) All of the mentioned
Rational agent is the one who always does the right thing.
a) True
b) False
An omniscient agent knows the actual outcome of its actions and can act accordingly; but
omniscience is impossible in reality. Rational Agent always does the right thing; but Rationality
is possible in reality.
a) True
b) False
Satellite Image Analysis System is (Choose the one that is not applicable).
a) Episodic
b) Semi-Static
c) Single agent
d) Partially Observable
PubNub publishes and subscribes _________ in order to send and receive messages.
a) Network
b) Account
c) Portal
d) Keys
By clicking which key the PubNub will display public, subscribe, and secret keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
The messageChannel class declares the _________ class attribute that defines the key string.
a) command_key
b) command-key
c) commandkey
d) Key_command
_________ method saves the received arguments in three attributes.
a) __Init
b) Init__
c) __Init__
d) _init_
_________ and _________ saves the publish and subscribe keys that we have generated with the
PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe
_________ specifies the function that will be called when there is a new message received from
the channel.
a) Reconnect
b) Error
c) Connect
d) Callback
_________ Specifies the function that will be called when a successful connection with the
PubNub cloud.
a) Callback
b) Error
c) Connect
d) Reconnect
_________ specifies the function that will be called when a successful re-connection is
completed.
a) Callback
b) Error
c) Connect
d) Reconnect
___________ specifies the function that will be called when the client disconnects.
a) Callback
b) Error
c) Connect
d) Disconnect
The message is sent to the input queue of a message flow that contains a _________
a) Subscriber
b) Server
c) Publication node
d) Client
ROSTOPIC uses _________ at the command line for representing the content of the message.
a) YAML_syntax
b) rostopic bw
c) rostopic delay
d) rostopic echo
Which command displays the band width?
a) rostopic hz
b) rostopic delay
c) rostopic echo
d) rostopic bw
rostopic delay will provide delay for ___________
a) Topics which has header
b) Topics which has tail
c) Topics which has tail and head
d) To all topics
________ error will show if we try to send text string instead of bytes.
a) TypeError
b) Error
c) Linker error
d) Compiler error
Every call to publish() will return a class that conforms to the __________ interface.
a) Batch
b) Client
c) Server
d) Future
Mobile Cloud applications move the __________ Power and __________ away from mobile
phone and into cloud.
a) Computing and internet
b) Data storage and computing
c) Computing and data storage
d) Internet and computing
SaaS stands for __________
a) Service as a Smartphone
b) Service as a software
c) Smartphone as a service
d) Software as a Service
__________ reduces the development and running cost of mobile applications on smartphone
devices.
a) Infrastructure
b) Productive business
c) Software
d) Services
The architecture of MCC is such that various mobile devices are connected to their respective
mobile networks via __________
a) Software
b) Satellite
c) Access point
d) Base Station
The part of the code which involves complex computations and requires more time to execute is
referred to as __________
a) Static session
b) Threshold session
c) Dynamic session
d) Critical session
Which of the following offers external chips for memory and peripheral interface circuits?
a) Microcontroller
b) Microprocessor
c) Peripheral system
d) Embedded system
What is CISC?
a) Computing instruction set complex
b) Complex instruction set computing
c) Complimentary instruction set computing
d) Complex instruction set complementary
Which of the following provides a buffer between the user and the low-level interfaces to the
hardware?
a) operating system
b) kernel
c) software
d) hardware
Which of the following enables the user to utilise the system efficiently?
a) kernel
b) operating system
c) software
d) hardware
Which of the following can make the application program hardware independent?
a) software
b) application manager
c) operating system
d) kernel
Which of the following are not dependent on the actual hardware performing the physical task?
a) applications
b) hardware
c) registers
d) parameter block
Which of the following bus can easily upgrade the system hardware?
a) control bus
b) data bus
c) VMEbus
d) bus interface unit
Which of the following becomes a limiting factor while an application program has to be
complete?
a) memory
b) peripheral
c) input
d) output
Which of the following decides which task can have the next time slot?
a) single task operating system
b) applications
c) kernel
d) software
Which of the following controls the time slicing mechanism in a multitasking operating system?
a) kernel
b) single tasking kernel
c) multitasking kernel
d) application manager
Which of the following provides a time period for the context switch?
a) timer
b) counter
c) time slice
d) time machine
Which of the following stores all the task information that the system requires?
a) task access block
b) register
c) accumulator
d) task control block
Which of the following contains all the task and their status?
a) register
b) ready list
c) access list
d) task list
Which determines the sequence and the associated task’s priority?
a) scheduling algorithm
b) ready list
c) task control block
d) application register
Which of the following can implement the message passing and control?
a) application software
b) operating system
c) software
d) kernel
How many types of messages are associated with the real-time operating system?
a) 2
b) 3
c) 4
d) 5
What are the essential tight constraint/s related to the design metrics of an embedded system?
a. System
b. Behaviour
c. RT
d. Logic
a. Single-functioned Characteristic
b. Tightly-constraint Characteristics
c. Reactive & Real time Characteristics
d. All of the above
What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
a) 65
b) 65-D
c) 67
d) 70
What is the punishment in India for stealing computer documents, assets or any software’s
source code from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000
What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components
Accessing computer without prior authorization is a cyber-crimes that come under _______
a) Section 65
b) Section 66
c) Section 68
d) Section 70
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT
Act.
a) Section 65
b) Section 66
c) Section 68
d) Section 70
Download copy, extract data from an open system done fraudulently is treated as _________
a) cyber-warfare
b) cyber-security act
c) data-backup
d) cyber-crime
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around
Rs ________
a) 2 lacs
b) 3 lacs
c) 4 lacs
d) 5 lacs
How many years of imprisonment can an accused person face, if he/she comes under any cyber-
crime listed in section 66 of the Indian IT Act, 2000?
a) 1 year
b) 2 years
c) 3 years
d) 4 years
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-
crime that comes under _________ of IT Act.
a) Section 66
b) Section 67
c) Section 68
d) Section 69
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes
sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a
legitimate amount of fine.
a) section 67-A
b) section 67-B
c) section 67-C
d) section 67-D
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of
_________ years.
a) 2
b) 3
c) 4
d) 5
Using spy cameras in malls and shops to capture private parts of any person comes under
_______ of IT Act, 2008.
a) Section 66
b) Section 67
c) Section 68
d) Section 69
Using spy cameras in malls and shops to capture private parts of any person comes under section
67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
a) True
b) False
Using of spy cameras in malls and shops to capture private parts of any person comes under
section 67 of IT Act, 2008 and is punished with imprisonment of ___________
a) 2 years
b) 3 years
c) 4 years
d) 5 years
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
a) section 65
b) section 66
c) section 71
d) section 72
Sending offensive message to someone comes under _____________ of the Indian IT Act
______
a) section 66-A, 2000
b) section 66-B, 2008
c) section 67, 2000
d) section 66-A, 2008
Which of the following attach is not used by LC4 to recover Windows password?
a) Brute-force attack
b) Dictionary attack
c) MiTM attack
d) Hybrid attacks
____________ is the world’s most popular vulnerability scanner used in companies for checking
vulnerabilities in the network.
a) Wireshark
b) Nessus
c) Snort
d) WebInspect
________________ is a platform that essentially keeps the log of data from networks, devices as
well as applications in a single location.
a) EventLog Analyser
b) NordVPN
c) Wireshark
d) PacketFilter Analyzer
. ________________ helps in protecting businesses against data breaches that may make threats
to cloud.
a) Centrify
b) Mailbox Exchange Recovery
c) Nessus
d) Dashline
advertisement
__________ is a popular corporate security tool that is used to detect the attack on email with
cloud only services.
a) Cain and Abel
b) Proofpoint
c) Angry IP Scanner
d) Ettercap
_________ framework made cracking of vulnerabilities easy like point and click.
a) .Net
b) Metasploit
c) Zeus
d) Ettercap
__________ is a popular tool used for discovering networks as well as in security auditing.
a) Ettercap
b) Metasploit
c) Nmap
d) Burp Suit
Which of this Nmap do not check?
a) services different hosts are offering
b) on what OS they are running
c) what kind of firewall is in use
d) what type of antivirus is in use
Which of the following deals with network intrusion detection and real-time traffic analysis?
a) John the Ripper
b) L0phtCrack
c) Snort
d) Nessus
_______________ is a popular tool used for network analysis in multiprotocol diverse network.
a) Snort
b) SuperScan
c) Burp Suit
d) EtterPeak
_________ is the sum of all the possible points in software or system where unauthorized users
can enter as well as extract data from the system.
a) Attack vector
b) Attack surface
c) Attack point
d) Attack arena
____________ is the cyclic practice for identifying & classifying and then solving the
vulnerabilities in a system.
a) Bug protection
b) Bug bounty
c) Vulnerability measurement
d) Vulnerability management
Remote exploits is that type of exploits acts over any network to exploit on security
vulnerability.
a) True
b) False
________ type of exploit requires accessing to any vulnerable system for enhancing privilege for
an attacker to run the exploit.
a) Local exploits
b) Remote exploits
c) System exploits
d) Network exploits
__________ is the timeframe from when the loophole in security was introduced till the time
when the bug was fixed.
a) Time-frame of vulnerability
b) Window of vulnerability
c) Time-lap of vulnerability
d) Entry-door of vulnerability
___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Leaking your company data to the outside network without prior permission of senior authority
is a crime.
a) True
b) False
_____________ is the technique used in business organizations and firms to protect IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
Before performing any penetration test, through legal procedure, which key points listed below is
not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False
After performing ____________ the ethical hacker should never disclose client information to
other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
__________ is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
. ________ helps to classify arguments and situations, better understand a cyber-crime and helps
to determine appropriate actions.
a) Cyber-ethics
b) Social ethics
c) Cyber-bullying
d) Corporate behaviour
A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
a) privacy and security
b) rules and regulations
c) hacking techniques
d) ethics to talk to seniors
A ______________ tries to formulate a web resource occupied or busy its users by flooding the
URL of the victim with unlimited requests than the server can handle.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
During a DoS attack, the regular traffic on the target _____________ will be either dawdling
down or entirely interrupted.
a) network
b) system
c) website
d) router
The intent of a ______________ is to overkill the targeted server’s bandwidth and other
resources of the target website.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
A DoS attack coming from a large number of IP addresses, making it hard to manually filter or
crash the traffic from such sources is known as a _____________
a) GoS attack
b) PDoS attack
c) DoS attack
d) DDoS attack
Instead of implementing single computer & its internet bandwidth, a ____________ utilizes
various systems & their connections for flooding the targeted website.
a) GoS attack
b) PoS attack
c) DDoS attack
d) DoS attack
___________ is a type of DoS threats to overload a server as it sends a large number of requests
requiring resources for handling & processing.
a) Network Layer DoS
b) Physical Layer DoS
c) Transport Layer DoS
d) Application Layer DoS
Which of the following do not comes under network layer DoS flooding?
a) UDP flooding
b) HTTP Flooding
c) SYN flooding
d) NTP Amplification
Which of the following do not comes under network layer DoS flooding?
a) DNS amplification
b) UDP flooding
c) DNS query flooding
d) NTP Amplification
DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per
second (PPS).
a) True
b) False
A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network
infrastructures.
a) True
b) False
Which of the following type of data, phishers cannot steal from its target victims?
a) bank details
b) phone number
c) passwords
d) apps installed in the mobile
______________ was the first type of phishing where the phishers developed an algorithm for
generating random credit card numbers.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
_________________ type of phishing became very popular as if it has been sent from a
legitimate source with a legitimate link to its official website.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
___________________ is usually targeted by nature where the emails are exclusively designed
to target any exact user.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Spear phishing
. ____________ or smishing is one of the simplest types of phishing where the target victims
may get a fake order detail with a cancellation link.
a) Algo-based phishing
b) SMS phishing
c) Domain Phishing
d) Spear phishing
________________ phishing is that type of phishing where the construction of a fake webpage is
done for targeting definite keywords & waiting for the searcher to land on the fake webpage.
a) Voice
b) SMS
c) Search engine
d) Email
_____________ are programs or devices that capture the vital information from the target
network or particular network.
a) Routers
b) Trappers
c) Wireless-crackers
d) Sniffers
A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all
your data transmitted on its division.
a) True
b) False
A ______________ on the whole turns your system’s NIC to the licentious mode so that it can
listen to all your data transmitted on its division.
a) Phishing site
b) Sniffer tool
c) Password cracker
d) NIC cracker
In _____________ sniffing, the network traffic is not only supervised & locked but also be can
be altered in different ways to accomplish the attack.
a) passive
b) signal
c) network
d) active
__________________ are those devices which can be plugged into your network at the hardware
level & it can monitor traffic.
a) Hardware sniffers & analyzers
b) Hardware protocol analyzers
c) Hardware protocol sniffers
d) Hardware traffic sniffers and observers
Unit-1 Artificial intelligence
2. Weak AI is
a. artificial science
b. heuristic processing
c. human intelligence
d. cognitive science
Ans: d) cognitive science
a. Fisher Ada
b. John McCarthy
c. Allen Newell
d. Alan Turning
Ans: b) John McCarthy
a. Bluetooth
b. UART
c. WIFI
d. HTTP
Ans:d) HTTP
5. Machine learning is
a. The selective acquisition of knowledge through the use of manual programs
b. The autonomous acquisition of knowledge through the use of manual programs
c. The selective acquisition of knowledge through the use of computer programs
d. The autonomous acquisition of knowledge through the use of computer programs
Ans: d) The autonomous acquisition of knowledge through the use of computer programs
6. HTTP resources are located by
a. unique resource locator
b. unique resource identifier
c. none of the mentioned
d. uniform resource identifier
Ans: d) uniform resource identifier
7. MQTT is:
a. Based on client-server architecture
b. Based on publish-subscribe architecture
c. Based on both of the above
d. Based on none of the above
Ans: b) Based on publish-subscribe architecture
8. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a. ALOHA
b. CSMA/CA
c. CDMA
d. none of the mentioned
Ans: b) CSMA/CA
Ans: d) G.Palmar
4. Who proposed Extended Model of Cybercrime Investigation
a) G.Gunsh
b) S.Ciardhuain
c) J.Korn
d) G.Palmar
Ans: b) S.Ciardhuain
5. Digital forensics is all of them except
a) Extraction of computer data
b) Preservation of computer data
c) Interpretation of computer data
d) Manipulation of computer data
Ans:
6. Investigator should satisfy the following point
a) Contribute to the society and human being
b) Avoid harm to others
c) Honest and trustworthy
d) All of the above
Ans: a) True
8. Who proposed Abstract Digital Forensic Model
a) G.Gunsh
b) S.Ciardhuain
c) Kohn , Eloff
d) G.Palmar
Ans: G.Gunsh
9. International Organization on Compter Evidence was formed in
a) 1980
b) 1995
c) 1997
d) 1998
Ans: b) 1995
10. Abstract Digital Forensic model in
a) 2000
b) 2001
c) 2002
d) 2003
Ans: c) 2002
Unit-4: Digital Evidences
Ans: b) False
3. In terms of digital evidence the Internet is an example of
a) Open computer systems
b) Communication systems
c) Embedded computer system
d) None of the above
Ans:
6. Which of the following is not a type of volatile evidence
a) Routing Tables
b) Main Memory
c) Log files
d) Cached Data
Ans: a) Hyderabad
10. The major forensic categories of devices where evidence can be found:
a) Internet-based
b) Stand-alone computers
c) Mobile devices
d) All of the above
Ans: a) hackers
2. Ethical hacking is also known as
a) Black hat hacking
b) White hat hacking
c) Encrypting
d) None of these
Ans: b) Weakness
6. Cracker is known as
a) Black hat
b) White hat
c) Encrypting
d) None of these
Ans: b) NetStumbler
8. It is powered by ______ encryption tools
a) WEP WPA & WPA2
b) WEP
c) WPA
d) None of these
Ans: b) 443
10. What is the attack called “evil twin”
a) Rogue access point
b) ARP poisoning
c) Session hijacking
d) MAC spoofing
1. Which of the following tools is used for Networks Testing and port Scanning
a) NetCat
b) SuperScan
c) NetScan
d) All of Above
Ans: b) 53
4. What port number does HTTP use
a) 53
b) 69
c) 80
d) 79
Ans: c) 80
5. An email bomb is also known as a ___
a) Letter bomb
b) Internet
c) Banner
d) Attack
Ans: a) XSS
8. Banner grabbing is often used for
a) White hat hacking
b) Black hat hacking
c) Gray hat hacking
d) Scepit Kiddies
Ans: b) SuperScan
10. SNMP port is
a) 37
b) 53
c) 111
d) 161
Ans: d) 161
MCQ’s Question and Answers (the answers are highlighted in bold)
Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.
Q16 The Digital evidence are used to established a credible link between……….
A)Attacker and victim and the crime scene B)Attacker And information
Q17 The evidence and proof that can be obtained from the electronic source is called the…….
A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned
A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Q22 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:
Q24 Who are use their skill to identify security problem with computer network
A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Q25 To crack the password you need cracking tool such as:
A)Information
Q32 Which of the following used for the Network Testing and port scanning
Q33 The whole email server may be targeted for a complete interruption of services with these failure
like
Q34 Which is the top most directory in the server file system
A)Root Directory
A)LINUX
A)Ethereal
Q40 An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment
a. SIMD
b. STUDENT
c. SHRDLU
d. BACON
d.Playing a Game
3. Who is the “father” of artificial intelligence?
a.John McCarthy
b. Fisher Ada
c. Allen Newell
d.Alan Turning
4.Which of the following is a proposed means of testing the intelligence of the machine?
a.Turing Test
b.Turning Test
c.Tuning Test
d.None
a.Control System
b.Associative Memory
c.Primary Memory
d.Secondary Memory
a. seven
b. Two
c.three player
d. Multiplayer
a. Validity
b.Satisfiability
c. Logical equivalence
d.All of these
8.Single inference rule also called…
a. Resolution
b. Reference
c.Reference
d.None of these
9.Factoring means…
2. What are the three general categories of computer systems that can contain digital
evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
10. Private networks can be a richer source of evidence than the Internet because:
a. They retain data for longer periods of time.
b. Owners of private networks are more cooperative with law enforcement.
c. Private networks contain a higher concentration of digital evidence.
d. All of the above.
Question 1. Which of the following statements best describes a white-hat hacker?
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Answer 1. Option A.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer 2. Option C..
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer 3. Option D.
Question 4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
Answer 4. Option D
Question 5. The security, functionality, and ease of use triangle illustrates which
concept?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer 6. Option A.
Question 7. What are the three phases of a security evaluation plan? (Choose
three answers.)
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer 8. Option B.
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer 9. Option B.
Question 10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Answer 10. Option A.
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
Answer: b
2. Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
Answer: c
3. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber
crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
Answer: d
4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
Answer: a
5. The amateur or newbie in the field of hacking who don’t have many skills about coding and
in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer: c
7. Criminal minded individuals who work for terrorist organizations and steal information of
nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
Answer: c
8. One who disclose information to public of a company, organization, firm, government and
private agency and he/she is the member or employee of that organization; such individuals are
termed as ___________
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
Answer: d
9. These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
Answer: b
10. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
Answer: a
a. Logical reasoning
b. Common sense
c. Preconceived theory
d. Investigator’s intuition
4. A scientific truth attempts to identify roles that are universally true. Legal judgment, on
The other hand, has a standard of proof in criminal prosecutions of:
a. Balance of probabilities
b. Beyond a reasonable doubt
c. Acquittal
d. None of the above
a. Relevance
b. Authenticity
c. Best evidence
d. Nominally prejudicial
6. According to the text, the most common mistake that prevents evidence seized from
Being admitted is:
a. Uninformed consen
b. Forcible entry
c. Obtained without authorization
d. None of the above
7. In obtaining a warrant, an investigator must convince the judge on all of the following
Points except:
8. If, while searching a computer for evidence of a specific crime, evidence of a new,
Unrelated crime is discovered, the best course of action is:
a. Abandon the original search, and pursue the new line of investigation
b. Continue with the original search but also pursue the new inquiry
c. Stop the search and obtain a warrant that addresses the new inquiry
d. Continue with the original search, ignoring the new information
9. The process of documenting the seizure of digital evidence and, in particular, when that
Evidence changes hands, is known as:
a. Chain of custody
b. Field notes
c. Interim report
d. None of the above
10. Evidence contained in a document provided to prove that statements made in court are
True is referred to as:
a. Inadmissible evidence
b. Illegally obtained evidence
c. Hearsay evidence
d. Direct evidence
Chapter 5 Basics of Ethical hacking
1. What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
Answer: a
3. ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
Answer: a
7. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d
8. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
Answer: a
9. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c
10. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Chapter 5 Basics of Ethical hacking
1. What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
Answer: a
3. ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
Answer: a
7. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d
8. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
Answer: a
9. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c
10. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Chapter 6 Types of hackers
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Answer. Option A.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer. Option C.
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer. Option D.
Question 4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
Answer. Option D.
Question 5. The security, functionality, and ease of use triangle illustrates which
concept?
Question 6. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer. Option A.
Question 7. What are the three phases of a security evaluation plan? (Choose
three answers.)
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer. Option B.
Question 9. Which federal law is most commonly used to prosecute hackers?
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer. Option B.
Question 10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Answer. Option A.
Ans:D
Ans: A
3. Who proposed Road Map for Digital Forensic Research (RMDFR)
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____ question based
on available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document
opens and the application automatically runs); spread via email
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989
Ans: B
A.1960's
B.1970's
C.1980's
D.1990's
Ans: C
10. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
10 MCQs from Each Chapter of Emerging Trend in Computer Science
----------------------------------------------------------------------------------------------
Ans: C
(A) PROLOG
(B) Java
(C) LISP
(D) Perl
Ans: D
3. What is state space?
Ans: D
Ans: C
Ans: A
6.A heuristic is a way of trying
(B) To search and measure how far a node in a search tree seems to be
from a goal
(C) To compare two nodes in a search tree to see if one is better than
the other
Ans: D
7. A* algorithm is based on
Ans: C
Ans: B
Ans: A
10. Which is not a property of representation of knowledge?
Ans: A
Chapter-2 Internet of Things
----------------------------------------------------------------------------------------------
D. None of these
Ans: D
4. Which of the following is not an example of a “small-scale
embedded system”?
A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C
D. All of these
Ans: D
D. All of these
Ans: B
Ans: B
----------------------------------------------------------------------------------------------
5. In the past, the method for expressing an opinion has been to frame
a ____ question based on available factual evidence.
(A) Hypothetical
(B) Nested
(C) Challenging
(D) Contradictory
Ans: A
6. More subtle because you are not aware that you are running these
macros
7. There are three c's in computer forensics. Which is one of the three?
(A) Control
(B) Chance
(C) Chains
(D) Core
Ans: A
----------------------------------------------------------------------------------------------
Ans: C
evidence?
Ans: D
3. In terms of digital evidence, a hard drive is an example of:
B. Communication systems
Ans: A
B. Communication systems
Ans: C
B. Communication systems
Ans: C
6. In terms of digital evidence, the Internet is an example of:
B. Communication systems
Ans: B
C. Civil disputes
Ans: D
Ans: C
9. Cyber trails are advantageous because:
D. Offenders who are unaware of them leave behind more clues than
they otherwise
would have.
Ans: D
Ans: C
Chapter 5 Basics of Hacking (CO5)
----------------------------------------------------------------------------------------------
C. Encryption.
D. None of these.
Ans. B
A. Scanner
B. Decoder
C. Proxy
D. All of these.
Ans. D
A. Strengths.
B. Weakness.
C. A &B
D. None of these.
Ans. B
4. Ethical hacking will allow to____ all the massive security breaches.
A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
A. Maintaining Access.
B. Reconnaissance
C. Scanning.
D. Gaining Access.
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain access to
the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
Ans. A
Ans. B
Ans. A
9. Who described a dissertation on fundamentals of hacker’s attitude?
A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman.
Ans. B
A. Decade.
B. Year.
C. Century
D. Era.
Ans. C
Chapter-6 Types of Hacking (CO6)
-----------------------------------------------------------------------------------------------
Ans: C
2. Which of the following tool is used for Network Testing and port
Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
D. Script Kiddies
Ans: A
4. An attacker can create an________attack by sending hundreds or
thousands of e-mails a with
A. Connection Attack
Ans: B
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
A. Netcat
B. SamSpade
C. SuperScan
Ans: C
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks
Ans: B
9. Which Nmap scan is does not completely open a TCP connection?
B. TCP scan
D. ACK scan
Ans: A
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
Ans: A
MCQ EMERGING TRENDS
Chapter 1: - artificial inteligence
1) is a branch of science which deals with helping machine find solution to complex to
problem in a more human like a fashion.
(a) Artificial intelligence
(b) Internet of think
(c) Embided system
(d) Cyber security
2) Is a message that consist relavat meaning , implication , or input for decision and or
action.
(a) Data
(b) Information
(c) Knowledge
(d) Intelligence
3) The goal is for the software to use what is it is was learned in one area to solve
problem in other area.
(a) Machine learning
(b) Deep learning
(c) Neural network
(d) All of above
4) the consist of computer program that mimic the way the human brain process
information.
(a) Machine learning
(b) Deep learning
(c) Neural learning
(d) All of this
5) A heuristic is a rule of thumb-------
(a) Strategy
(b) Trick
(c) Simplification
(d) All of above
7) Is branch of science that deals with programming the system in such that they
automatically learn with experience
(a) Machine learning
(b) Deep earning
(c) Neural learning
(d) All of above
9) The characteristic of the computer system cable of thinking, reasoning and learning is
know as
(a) Machine intelligence
(b) Human intelligence
(c) Artificial intelligence
(d) Virtual intelligence
7. By clicking which key the PubNub will display public, subscribe, and secret
keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
8. The messageChannel class declares the _________ class attribute that defines
the key string.
a) command_key
b) command-key
c) commandkey
d) Key_command
10. _________ and _________ saves the publish and subscribe keys that we have
generated with the PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe
7) The evidences of proof that can be obtained from the electricity source is
called the
(a) Digital evidence
(b) Demonstrative evidence
(c) Explainable evidence
(d) Substantial evidence
5) What are the three general categories of computer system that can
contain digital evidence
(a) Desktop ,laptop ,server
(b) Personal computer
(c) Hardware, software
(d) Open computer system
3). ___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
4). Leaking your company data to the outside network without prior permission of
senior authority is a crime.
a) True
b) False
5). _____________ is the technique used in business organizations and firms to protect
IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach .
7). Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
8). An ethical hacker must ensure that proprietary information of the firm does
not get leaked.
a) True
b) False
9). After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
10). __________ is the branch of cyber security that deals with morality and
provides different theories and a principle regarding the view-points about what
is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
6) what type of ethical hack test access to the physical infra structure
(a) internal network
(b) remote network
(c) external network
(d) physical network
7) the security functinallity and ease of use triangle illustrated which concept
(a) a security increase, functionality and ease of use increase
(b) a security decrease, functionality and ease of use increase
(c) a security increase, functionality and ease of use decrease
(d) security does not affect functionality and ease of use
10) when a hackers attempt to attack a host via the internet is the know as
what type of attack
(a) remote attack
(b) local access
(c) internal attack
(d) physical access
Unit3. basics of digital forensics
1. What is Digital Forensic?
b. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
c. A process where we develop and test hypotheses that answer questions about digital
events
a. Authenticity
b. Comparison
c. Proving
d. Enhancement
4. Which of the following represents the step of scientific method?
I- Develop hypothesis based on evidence
II- Calculate hash value of evidence
III- Test the hypothesis to look for additional evidence
IV-make an imaging of the original evidence
a. I and IV
b. I and II
c. II, III and IV
d. All of above
5. What is the Primary Objectives of Digital Forensic for Business and Industry?
a. Availability of service
b. Prosecution
c. Continuity of operation
d. Security
6. Which of the following hold the highest value of evidence in the court?
a. Documentary
b. Demonstrative
c. Testimonial
d. Real
10. When you give ____ testimony, you present this evidence and explain what it is and how it
was obtained.
a. technical/scientific
b. expert
c. lay witness
d. deposition
Unit-4 Digital Evidences
1. A valid definition of digital evidence is:
a. Data stored or transmitted using a computer
b. Information of probative value
c. Digital data of probative value
d. Any digital evidence on a computer
2. What are the three general categories of computer systems that can contain digital evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
3. In terms of digital evidence, a hard drive is an example of:
a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above
a) MIT
b) Stanford University
c) California
d) Bell’s Lab
9. In which year, hacking became a practical crime and a matter of concern in the field of
technology?
a) 1971
b) 1973
c) 1970
d) 1974
10. When a hacker attempts to attack a host via the Internet it is known as what type of
attack?
a. Local access
b. Remote attack
c. Internal attack
d. Physical access
11. Which tool can be used to perform a DNS zone transfer on Windows?
a. DNSlookup
b. nslookup
c. whois
d. ipconfig
Unit-6 Types of Hacking
1. Why would a hacker use a proxy server?
a. To create a stronger connection with the target.
b. To create a ghost server on the network.
c. To obtain a remote access connection.
d. To hide malicious activity on the network.
2. A security audit performed on the internal network of an organization by the network
administration is also known as ___________.
a. Grey-box testing
b. Black-box testing
c. White-box testing
d. Active testing E. Passive testing
3. Which are the four regional Internet registries?
a. APNIC, PICNIC, NANIC, RIPE NCC
b. APNIC, MOSTNIC, ARIN, RIPE NCC
c. APNIC, PICNIC, NANIC, ARIN
d. APNIC, LACNIC, ARIN, RIPE NCC
4. Attempting to gain access to a network using an employee’s credentials is called the _____________
mode of ethical hacking.
a. Local networking
b. Social engineering
c. Physical entry
d. Remote networking
5. What tool can be used to perform SNMP enumeration?
a. DNSlookup
b. Whois
c. Nslookup
d. IP Network Browser
a. LDAP
b. TCP
c. SQL
d. HTTP
a. ICANN
b. ARIN
c. APNIC
d. DNS
MCQ Chapter 01
3) Which among this, is an AI created by IBM partner with Fluid PVT. Used specially for
‘Data Analysis?’
a) EVE AI
b) Watson
c) Siri
d) Novel AI
Ans: b) Watson
Ans: b) Languages of AI
5) The given illustrative diagram is related to which topic?
a) Machine Learning
b) Neural Network Processing
c) Reasoning
d) Deep learning
Ans: a) Machine Learning
8) These machines can use stored data for a limited time period only.
a) Reactive Machine
b) Self-Awareness
c) Limited machine
d) Theory of mind
Ans: c) Limited machine
MCQ Chapter 03
Digital Forensics is a series of steps to _________ and _________ electronic data through
________ method.
MCQ Chapter 04
Ans: a. It states that multiple copies of electronic files may be a part of the “original” or equivalent
to the “original.”
4. According to Locard’s Exchange Principle, contact between two items will result in an
_________.
a. War
b. Love
c. Exchange
d. Failure
Ans: c. Exchange
5. Which of the following is used to portray data more specifically and is helpful in determining
the background of digital evidence?
a. Data
b. Metadata
c. Cookies
d. History
Ans: b. Metadata
8. You must have both ____ and ____ to validate your evidence.
a. Proof and victim
b. Power and skill
c. Power and proof
d. Proof and skill
Ans: b. power and skill
2. A hacker who gains access to system with a view to fix the identified weaknesses is known as
a. White hat hackers
b. Grey hath hackers
c. Red hat hackers
d. Hacktivist
Ans: a. white hat hackers
a. Police
b. Victim
c. Thief
d. Hacker
Ans: c. Thief
5. Which type of hackers are invited by the software vendors to find the security flaws in their
system?
a. White hat hackers
b. Black hat hackers
c. Grey hat hackers
d. Blue hat hackers
Ans: d. Blue hat hackers
7. A non-skilled person who gains access to computer system using already made tools are
known as?
a. Grey hat hackers
b. Hacktivist
c. Script kiddies
d. Phreakers
Ans: c. Script kiddies
8. Identifying weakness in computer system or network to exploit its weaknesses to gain access
is known as
a. Cracking
b. Cybersecurity
c. Hacking
d. Threatening
Ans: c. Hacking
MCQ Chapter 06
1. Which of the following is not a network testing and port scanning tool?
a. Nmap
b. SuperScan
c. John the ripper
d. NetCat
Ans: c. John the Rippers
2. Select the most appropriate option for the below two statements.
6. Which attack allows the attacker to execute the scripts on the victim’s browser?
a. SSL attack
b. Cookie attack
c. Banner grabbing
d. XSS attack
Ans: d. XSS attack
8. As an ethical hacker, you should scan all ________ UDP and TCP port on each network host
that’s found by your scanner.
a. 65535
b. 65353
c. 65333
d. 65555
Ans: a. 65535
9. Which of the following are the foundation of all the technical security issues in your
information systems?
a. Network Infrastructure vulnerabilities
b. Information vulnerabilities
c. System Infrastructure vulnerabilities
d. Network Information vulnerabilities
Ans: a. Network infrastructure vulnerabilities
10. Which attack is an HTTP attack which allows attackers to access restricted directories and
execute commands outside the web servers root directory?
a. XSS attack
b. Path Traversal attack
c. MITM attack
d. SQL Injection attack
Ans: b. Path traversal Attack
a. a sensor
d.a network
2. Which command is used to test network connectivity and provide a response to each packet
received by the remote host?
a.test
b.tracer
c.ping
d.connect
3. What type of device could allow a refrigerator to place a replacement order for an item contained
within it?
a.digital network
b.generator
c.smart phone
d.sensor
4. True or False?
Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or
PC.
a.true
b.false
6. What is comprised of millions of smart devices and sensors connected to the internet?
a.the fog
d.the cloud
a.artificial intelligence
b.Packet Tracer
c.internet
d.PAN
8. True or False?
The Internet of Things will connect inanimate objects to the network with intelligent sensors.
a.true
b.false
9. Which type of network is used to connect a company located in one area of a city to another
location in a city far away?
a.LAN
b.PAN
c.MAN
d.WAN
10. Which type of computing is located at the edge of a business or corporate network and that allows
data from sensors to be preprocessed?
a.internet
b.fog
c.wireless
d.WAN
SIMD
STUDENT
SHRDLU
BACON
And:- SHRDLU
Education
Defense
Energy
Justice
And:- Defense.
John McCarthy
Fisher Ada
Allen Newell
Alan Turning
5. KEE is a product of
IntelliCorpn
Teknowledge
Texas Instruments
Tech knowledge
Ans:- IntelliCorpn .
Analogical reasoning
Bitonic reasoning
Non-monotonic reasoning
Monotonic reas
Ans:- Weak AI is the study of mental faculties through the use of mental models
implemented on a computer.
mobile
open loop
intelligent
non-servo
Ans:- intelligent .
9. One of the leading American robotics centers is the Robotics Institute located
at
RAND
MIT
CMU
SRI
And:- CMU
10. What is the name of the computer program that contains the distilled
knowledge of an expert?
setq
add
set
eva
Ans:- setq
13. Which is not the commonly used programming language for AI?
PROLOG
LISP
Perl
Java script
And:- Perl
14. Which is not a property of representation of knowledge?
Inferential Adequacy
Representational Adequacy
Representational Verification
Inferential Efficiency
1. When cases go to trial, you as a forensics examiner can play one of ____ roles.
a. 2 c. 4
b. 3 d.5
Ans:- 2
2. When you give ____ testimony, you present this evidence and explain what it is and how it
was obtained.
b. expert d. deposition
And:- technical/scientific.
3. Validate your tools and verify your evidence with ____ to ensure its integrity
4. For forensics specialists, keeping the ____ updated and complete is crucial to supporting
your role as an expert and showing that you’re constantly enhancing your skills through
training, teaching, and experience.
b. CV d. deposition
Ans:- CV
5. If your CV is more than ____ months old, you probably need to update it to reflect new
cases and additional training.
a. 2 c. 4
b. 3 d. 5
Ans:- 3
6. __ is a written list of objections to certain testimony or exhibits.
a. Defendant c. Plaintiff
b. rebuttal d. venireman
Ans:- strikes
8. ____ from both plaintiff and defense is an optional phase of the trial. Generally, it’s allowed
to cover an issue raised during cross-examination
Ans:- Rebuttal
9. If a microphone is present during your testimony, place it ____ to eight inches from you.
a. 3 c. 5
b. 4 d. 6
Ans:- 6
10. Jurors typically average just over ____ years of education and an eighth-grade reading
level. a. 9 c. 11
b. 10 d. 12
Ans:- 12
4. Digital Evidences
2. What are the three general categories of computer systems that can contain digital
evidence?
b. Communication systems
b. Communication systems
b. Communication systems
b. Communication systems
c. Civil disputes
d. Offenders who are unaware of them leave behind more clues than they otherwise would
have.
10. Private networks can be a richer source of evidence than the Internet because:
5. Basic of Hacking
AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above
3. what is the primary goal of an Ethical Hacker ?
Avoiding detection
Testing security controls
Resolving security vulnerabilities
Determining return on investment for security measures
Maintaining access
Gaining access
Reconnaissance
Scanning
Black-hat hackers
Grey-hat hackers
Script kiddies
Disgruntled employees
Hacktivism
Black-hat hacking
Active hacking
Activism
7. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
Local access
Remote attack
Internal attack
Physical access
8. Which are the four regional Internet registries?
A. Security professional
D. Malicious hacker
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
7. What are the three phases of a security evaluation plan? (Choose
three answers.)
B. Preparation
C. Conclusion
D. Final
E. Reconnaissance
F. Design Security
G. Vulnerability Assessment
Answer :- A, B, C.
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
9. Which federal law is most commonly used to prosecute hackers?
A. Title 12
B. Title 18
C. Title 20
D. Title 2
10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
MCQ’S
1. IOCE is …………………..?
a. Organization on computer evidence
b. Organization on communication evidence
c. Organization on country education
d. Organization on crime evidence
Ans : a)Organization on computer evidence
MCQ’S
a. Routing Table
b. Main memory
c. Log files
d. Cached Data
Ans : c) Log files
6. Investigation means :
a. Collection of information
b. A procedure to find the Digital Evidence
c. Searching over internet
d. Hacking computer systems
Ans : b) A procedure to find the Digital Evidence
7. The evidence or proof that can be obtained from the electronic source is called the ………
a. Digital evidence
b. Demonstrative evidence
c. Explainable evidence
d. Substantial evidence
Ans : a) Digital evidence
MCQ’S
1. What is hacking ?
a. Identifying weakness in computer system or networks
b. Refers to act of locating vulnerabilities
c. A security to your personal data
d. Protocols of corrupting data
Ans : a) Identifying weakness in computer system or networks
7. Which IEEE standards specify the technologies for wireless LANs 802.11
a. IEEE 802.11
b. IEEE 802.10
c. IEEE 279.6
d. IEEE 275.4
Ans : a) 802.11
Watson
Ans: b) Languages of AI
Ans: b) Three
7) The term “Strong” or “Super” AI comes under which ‘type’ of AI?
a) Type-1
b) Type-2
c) None of the above
d) All of the above
Ans: a) Type-1
8) These machines can use stored data for a limited time period only.
a) Reactive Machine
b) Self-Awareness
c) Limited machine
d) Theory of mind Ans: c)
Limited machine
Ans: d) Four
CHAPTER 2: Internet of Things
1) Raspbian is:
a) Assembler
b) Language
c) Compiler
d) OS
Ans:- d. OS
a) SigFox
b) WiFi
c) NB-oT
d) LoRa
Ans:- b. WiFi
3) Computer programs that mimic the way the human brain processes information is called as:-
a) Machine learning
b) Deep learning
c) Neural networks
Ans:- c. Neural
networks
4) is a branch of Science which deals with the helping machine find
solutions to complex problems in a more human like fashion
a. Artificial Intelligence
b. Internet Od Things
c. Embedded system
d. cyber Security
a. RSVP
b.TCP
c. DCCP
d. UDP
Ans:- d. UDP
a) Bluetooth
b) UART
c) WiFi
d) HTTP
Ans:- d. HTTP
8) IoT stands for:-
a) Internet of Technology
b) Intranet of Things
c) Internet of Things
d) Information of Things
Ans:- c. Internet of
Things
d) None of these
a. Connectivity
b. Self-configuring
c. Endpoint Management
d. Artificial Intelligence
Ans:- b. Self-configuring
CHAPTER 3: Basics of Digital Forensics
11. Which of the following sciences pay vital role in criminal justice systems ?
a. Digital Forensics
b. Forensic Science
c. PC Forensics
d. INTERPOL Forensic
Ans : b) Forensic Science
18. Who proposed the UML Modelling of Digital Forensic Process Model
a. Kohn, Eloff and Oliver
b. Response Team
c. Only (a)
d. None of the above
Ans : a) Kohn, Eloff and Oliver
13. How many steps are there the legality of ethical hacking ?
a. 5
b. 2
c. 7
d. 6
Ans : a) 5
17. Which IEEE standards specify the technologies for wireless LANs 802.11
a. IEEE 802.11
b. IEEE 802.10
c. IEEE 279.6
d. IEEE 275.4
Ans : a) 802.11
18. LINUX is an
a. Application
b. Software
c. Toolkit
d. Operating System
Ans : d) Operating System
Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.
Q12 In Computer intrusions the attacker will be leave multiple traces of there presence in:
Q16 The Digital evidence are used to established a credible link between……….
A)Attacker and victim and the crime scene B)Attacker And information
Q17 The evidence and proof that can be obtained from the electronic source is called the…….
A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned
A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Q22 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:
Q24 Who are use their skill to identify security problem with computer network
A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Q25 To crack the password you need cracking tool such as:
A)Information
Q32 Which of the following used for the Network Testing and port scanning
Q33 The whole email server may be targeted for a complete interruption of services with these failure
like
Q34 Which is the top most directory in the server file system
A)Root Directory
Q35 Which list is used in the authorization process
A)LINUX
A)Ethereal
Q40 An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
5. When a hacker attempts to attack a host via the Internet it is known as what
type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user
A. It increases security.
B. It makes security harder to enforce.
C. It removes the employee’s responsibility to make judgments.
D. It decreases security.
Chapter No 3 : Basics Of Digital Forensic
C. A process where we develop and test hypotheses that answer questions about
digital events
A. True
B. False
A. Authenticity
B. Comparison
C. Proving
D. Enhancement
4. Which of the following represents the step of scientific methodI- Develop hypothesis
based on evidenceII- Calculate hash value of evidenceIII- Test the hypothesis to look for
additional evidence IV-make an imaging of the original evidence
A. All above
B. I and III
C. II and IV
A. Availability of service
B. Continuity of operation
C. Prosecution
D. Security
6. Which of the following hold the highest value of evidence in the court?
A. Documentary
B. Demonstrative
C. Testimonial
D. Real
a.Defendant
c.Plaintiff
d.Motion in limine
9. Attorneys can now submit documents electronically in many courts; the standard format
in federal courts is ____.
d. Postscript (PS)
10. A(n) ____is a document that lets you know what questions to expect when you are
testifying.
a.written report
b.affidavit
c.examination plan
d.subpoena
evidence?
b. Communication systems
b. Communication systems
b. Communication systems
b. Communication systems
c. Civil disputes
d. Offenders who are unaware of them leave behind more clues than they otherwise
would have.
10. Private networks can be a richer source of evidence than the Internet because:
3. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
7. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
8. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False
9. After performing ____________ the ethical hacker should never disclose client information
to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
10. __________ is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
4. What are the three general categories of computer systems that can contain digital
evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
1. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
Ans: A
B. ELIZA
Ans: C
B. Logic model
C. Computational model
D. None of above
Ans: C
5. Communication between man and machine is related with ______
A. LISP B.
ELIZA
C. All of above D.
None of above
Ans: B
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D
7. The concept derived from ________ level are propositional logic, tautology,
predicate calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
9. The ____ level contains constituents at the third level which are knowledge based
system, heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A
11. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP B.
ELIZA C.
PROLOG D.
NLP
Ans: A
Chapter-2 Internet of Things
A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D
B. False
Ans: A
B. Internet of Things
Ans: C
Ans: A
5. MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
B. XML
C. XHL
D. MPL
Ans: B
Ans: A
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
9. What does HTTP do?
D. Enables network resources and reduces perception of latency and Allows multiple
concurrent exchange.
Ans: D
Ans: A
Chapter-3 Basics of Digital Forensics
E. None of above
Ans: D
Ans: B
Ans: D
4. What is called as the process of creation a duplicate of digital media for purpose
of examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
5. Which term refers for modifying a computer in a way which was not originally intended
to view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
6. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called?
A.Robotis
C.ComputerForenss
D.Animation
Ans: C
7. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B.Steganogrhy. C.
Liveanalysis
D. Hashing.
And: B
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
C. .iso
D. .asm
Ans: D
Chapter-4 DIGITAL EVIDENCE
9. Private networks can be a richer source of evidence than the Internet because:
a. They retain data for longer periods of time.
b. Owners of private networks are more cooperative with law enforcement.
c. Private networks contain a higher concentration of digital evidence.
d. All of the above
10. Digital evidence can be duplicated exactly without any changes to the original data.
a. True
b. False
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
2. What is the first phase of hacking?
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
3. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
5. Hacking for a cause is called __________________
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
A. Title 12
B. Title 18
C. Title 20
D. Title 2
A. 21
B. 25
C. 23
D. 80
9. What is the primary goal of an Ethical Hacker?
a. Avoiding Detection
b. Determining return on investment (ROI) for security measure
c. Resolving security vulnerabilities
d. Testing Security Controls
10. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to
crack a system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
2. Which is the legal form of hacking based on which jobs are provided in IT industries
and firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
3. They are nefarious hackers, and their main motive is to gain financial profit by doing
cyber crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
5. The amateur or newbie in the field of hacking who don’t have many skills about
coding and in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
6. Criminal minded individuals who work for terrorist organizations and steal
information of nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
7. These types of hackers are the most skilled hackers in the hackers’ community. Who
are “they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
8. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
9. Governments hired some highly skilled hackers. These types of hackers are termed
as _______
a) Special Hackers
b) Government Hackers
c) Cyber Intelligence Agents
d) Nation / State sponsored hackers
10. __________ security consultants uses database security monitoring & scanning
tools to maintain security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
Question Bank (I scheme)
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
BHARATI VIDYAPEETH INSTITUTE OF TECHNOLOGY
QUESTION BANK
--------------------------------------------------------------------------------------------------
2. What are the three general categories of computer systems that can contain digital
evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related
crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This
is an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those
involved with _______ should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above
Ans:
15. An argument for including computer forensic training computer security specialists is:
A. It provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above.
Ans: C
16. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the ___________
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
21. The evidence must be usable in the court which is called as_______
A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a
a type of _____________
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as ____________
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
30.The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as___________
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31.When cases got to trial your forensics examiner play one of ____ role.
A. 2
B. 4
C. 3
D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
---------------------------------------------------------------------------------------------------------------------
True or False Questions
1. Digital evidence is only useful in a court of law.
A. True
B. False
Ans: B
2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
--------------------------------------------------------------------------------------------------------------------
4. Ethical hacking will allow to____ all the massive security breaches.
A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
15._______ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23.______ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of ____-
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25.______ comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32.Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
35. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad
Ans. D
36. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C
37. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
--------------------------------------------------------------------------------------------------------------------
2. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
6. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. _________is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
15. What are the some of the most common vulnerabilities that exist in a network system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
17. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called ________.
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
30. ______________ framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
31.__________ is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32.________ is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 _____ is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. ______is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50.In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52.We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest ______and______.
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53.Network consist devices such as routers, firewalls, hosts that you must assess as a part of
______ process.
A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55.____ attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
64.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Ans:B
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
cwipedia.in
Question Bank (I scheme)
1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
5. What of the following is considered to be a pivotal event in the history of AI. A.
1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
Ans: C
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of
problem solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the
natural language A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human. A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
Ans: A
A. Narrow AI
B. General AI
C. Super AI
D. None of above
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans. A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
Ans: A
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
Ans: A
67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____. A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network. A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server. A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud. A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation? A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
123. ________ in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B
137. ___ is an open source electronic platform based on easy to used hardware and software. A.
Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989 Ans:
B
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as: A.
Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
20. To collect and analyze the digital evidence that was obtained from the physical investigation
phase, is the goal of which phase? A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made A.
Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation? A.
Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others. Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography. C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information? A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics? A.
Acquisition.
B. Steganography. C.
Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
Happy Learning!
www.cwipedia.in
Cwipedia.in
QUESTION BANK
Unit Test-II
Program: - Computer Engineering Group Program Code:- CM/IF
/CW
Course Title: -Emerging Trends in Computer Technology Semester: - Sixth
ETI (22618) Scheme: I
--------------------------------------------------------------------------------------------------
1. A valid definition of digital evidence is: A. Data stored or transmitted using a computer
B. Information of probative value
C. Digital data of probative value
D. Any digital evidence on a computer
Ans: C
2. What are the three general categories of computer systems that can contain digital evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because: A. They retain
data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to limit
the damage and close each investigation as quickly as possible. Which of the following is NOT
a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime scene
he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This is
an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those involved with
_______ should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above Ans:
15. An argument for including computer forensic training computer security specialists is: A. It
provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above. Ans: C
16. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the ___________
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
21. The evidence must be usable in the court which is called as_______
A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a a type of
_____________
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as ____________
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
26. Which is not procedure to establish a chain of custody? A. Save the original materials. B. Take
photos of physical evidence.
C. Don’t take screenshots of digital evidence content.
D. Document date, time, and any other information of receipt.
Ans: C
30.The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as___________
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31. When cases got to trial your forensics examiner play one of ____ role.
A. 2
B. 4
C. 3 D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
----------------------------------------------------------------------------------------------------------------
----
2. Attorneys and police are encountering progressively more digital evidence in their work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data. A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks. A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred. A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
--------------------------------------------------------------------------------------------------------------------
A. B, C, D, A
B. B, A, C, D C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain
access to the authorized user. A. Social Engineering. B.
IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
12.The intent of ethical hacker is to discover vulnerabilities from a_____ point of view to better
secure system.
A. Victims.
B. Attackers.
C. Both A & B D. None of these.
Ans. B
15._______ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23.______ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of ____-
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25.______ comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32.Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
35. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad Ans. D
36. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C
37. Leaking your company data to the outside network without prior permission of senior authority
is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to __________ of personal data. A.
stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed below
is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
--------------------------------------------------------------------------------------------------------------------
2. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. _________is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
14. What is purpose of Denial of Service attacks? A. Exploit weakness in TCP/IP attack. B. To
execute a trojan horse on a system.
C. To overload a system so it is no longer operational.
D. To shutdown services by turning them off.
Ans: C
15. What are the some of the most common vulnerabilities that exist in a network system? A.
Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
16. Which of the following is not a characteristic of ethical hacker? A. Excellent knowledge of
Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Ans: D
17. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called ________.
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
28. What are the types of scanning? A. Port, network, and services
B. Network, vulnerability, and port
C. Passive, active, and interactive
D. Server, client, and network
Ans: B
30. ______________ framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap Ans: B
31.__________ is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32.________ is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 _____ is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. ______is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
44. What is the attack called “evil twin”? A. rouge access point
B. ARP poisoning
C. session hijacking
D. MAC spoofing
Ans: A
47. When a hacker attempts to attack a host via the internet it is known as what type of attack? A.
local access
B. remote attack
C. internal attack
D. physical access
Ans: B
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50.In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52.We can eliminate many well-known network vulnerabilities by simply patch-ing your network
hosts with their latest ______and______.
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53.Network consist devices such as routers, firewalls, hosts that you must assess as a part of
______ process.
A. Prackers
B. Black hat hacking C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security issues in
your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55.____ attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
60. ____ include phishing, SQL injection, hacking, social engineering, spamming, denial of
service attacks, Trojans, virus and worm attacks.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
62. Which of the following is not a typical characteristic of an ethical hacker? A. Excellent
knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Ans:-D
63. What is the purpose of a Denial of Service attack?
A. Exploit a weakness in the TCP/IP stack
B. To execute a Trojan on a system
C. To overload a system so it is no longer operational
D. To shutdown services by turning them off
Ans:- C
64.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system. Ans:B
This Online Exam is for Final Year students of Computer Engineering Group of MSBTE
affiliated Polytechnic.
Date : 21-05-2020
Time 10.00 to 11.30am.
Email address *
0 of 0 points
Full Name *
Institute Name *
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 1/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Institute Code *
Enrollment number *
63 of 70 points
Narrow AI
General AI
Neural AI
Feedback
Narrow AI
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 2/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
2. DARPA, the agency that has funded a great deal of American AI 1/1
research, is part of the Department of:
Defence
Energy
Education
Jastice
Feedback
Defence
3. The conference that launched the AI revolution in 1956 was held at: 1/1
Dartmouth
Harvard
New York
Stanford
Feedback
Dartmouth
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 3/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
4. What is the term used for describing the judgmental or commonsense 1/1
part of problem solving?
Heuristic
Critical
Value based
Analytical
Feedback
Heuristic
Correct answer
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 4/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
David Levy
John McCarthy
Joseph Weizenbaum
Hans Berliner
Feedback
John McCarthy
7. The ability to recover and read deleted or damaged files from a 1/1
criminal’s computer is an example of a law enforcement specialty called?
Robotics
Simulation
Computer Forensics
Animation
Feedback
Computer Forensics
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 5/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
8. What are the important parts of the mobile device which used in 1/1
Digital forensic?
SIM
RAM
ROM
EMMC chip
Feedback
EMMC chip
9. Using what, data hiding in encrypted images be carried out in digital 1/1
forensics?
Acquisition.
Steganography.
Live analysis
Hashing.
Other:
Feedback
Steganography
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 6/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
e-mail harassment
Falsification of data
Sabotage
Identification of data
Feedback
11. Which file is used to store the user entered password? 1/1
.exe
.txt
.iso
.sam
Feedback
.sam
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 7/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Data mining
Data carving
Meta data
Data Spoofing.
Feedback
Data mining
13. What is first step to Handle Retrieving Data from an Encrypted Hard 1/1
Drive?
Formatting disk
Storing data
Deleting files.
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 8/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
14. In phase investigator transfers the relevant data from a venue out of 1/1
physical or administrative control of the investigator to a controlled
location
Preservation phase
Survey phase
Documentation phase
Reconstruction phase
Presentation phase
Feedback
Survey phase
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 9/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
16. A set of instruction compiled into a program that perform a particular 1/1
task is known as:
Hardware.
CPU
Motherboard
Software
Feedback
Software
A copy is made onto forensically sterile media. New media should always be used if
available.
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 10/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
18. To collect and analyze the digital evidence that was obtained from the 1/1
physical investigation phase, is the goal of which phase?
Review phase.
Deployment phase.
Feedback
Review phase
Deployment phase
Feedback
Deployment phase
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 11/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
20. Which phase entails a review of the whole investigation and identifies 1/1
area of improvement?
Review phase.
Deployment phase
Feedback
Review phase.
G. Palmar
J. Korn
Michael Anderson
S.Ciardhuain.
Feedback
Michael Anderson
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 12/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Forensic
Crime
Cyber Crime
Evidence
Feedback
forensic
23. Who proposed End to End Digital Investigation Process (EEDIP)? 1/1
G. Palmar
Stephenson
Michael Anderson
S.Ciardhuain
Feedback
Stephenson.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 13/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 14/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
27. What are the three general categories of computer systems that can 1/1
contain digital evidence?
Desktop, laptop,server
Hardware, software,networks
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 15/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Open computersystems
Communication systems
Embedded computersystems
Correct answer
Communication systems
Offenders who are unaware of them leave behind more clues than they otherwise
would have.
Feedback
Offenders who are unaware of them leave behind more clues than they otherwise would
have.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 16/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
30. Private networks can be a richer source of evidence than the Internet 0/1
because:
Correct answer
31. The criminological principle which states that, when anyone, or 2/2
anything, enters a crime scene he/she takes something of the scene with
him/her, and leaves something of himself/herself behind, is:
Differential AssociationTheory
Beccaria’s SocialContract
None of theabove
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 17/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Encryption.
None ofthese.
Feedback
Strengths.
Weakness.
A &B
None of these.
Feedback
Weakness.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 18/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
G. Palma.
Raymond.
Either.
Jhon Browman
Feedback
Raymond.
Fix identifiesweakness
Steal thedata
No correct answers
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 19/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Nmap
LC4
ToneLOC
Nessus
Feedback
LC4
37. Which tool is used for depth analysis of a web application? 2/2
Whisker
Superscan
Nikto
Kismet
Feedback
Whisker
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 20/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
38. Which hacker try to distribute political or social message through 2/2
their work?
Black hathacker
Hactivist
Scriptkiddes
White hathacker
Feedback
Hactivist
39. A penetration tester must identify and keep in mind the & 2/2
requirements of a firm while evaluating the security postures.
hacking techniques
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 21/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
40. Before performing any penetration test, through legal procedure, 2/2
which key points listed below is not mandatory?
Feedback
Script Kiddies
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 22/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
42. Which of the following tool is used for Windows for network queries 2/2
from DNS lookups to trace routes?
SamSpade
SuperScan
NetScan
Netcat
Feedback
SamSpade
43. Which Nmap scan is does not completely open a TCP connection? 2/2
SYN stealthscan
TCP scan
XMAS treescan
ACKscan
Feedback
SYN stealthscan
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 23/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
Local networking
Social engineering
Physical entry
Remote networking
Feedback
Local networking
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 24/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Reconnaissance
Maintaining Access
Gaining Access
Scanning
Feedback
Gaining Access
47. Which type of hacker represents the highest risk to your network? 0/2
black-hathackers
grey-hathackers
script kiddies
disgruntled employees
Correct answer
disgruntled employees
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 25/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
General Purpose
Special Purpose
Feedback
Special Purpose
Data communication
Monitoring
control
All of above
Feedback
Monitoring
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 26/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
ASIC
ASSP
CPU
CPLD
Feedback
CPU
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy
Forms
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 27/27
Question Bank (I scheme)
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
BHARATI VIDYAPEETH INSTITUTE OF TECHNOLOGY
QUESTION BANK
--------------------------------------------------------------------------------------------------
2. What are the three general categories of computer systems that can contain digital
evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related
crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This
is an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those
involved with _______ should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above
Ans:
15. An argument for including computer forensic training computer security specialists is:
A. It provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above.
Ans: C
16. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the ___________
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
21. The evidence must be usable in the court which is called as_______
A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a
a type of _____________
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as ____________
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
30.The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as___________
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31.When cases got to trial your forensics examiner play one of ____ role.
A. 2
B. 4
C. 3
D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
---------------------------------------------------------------------------------------------------------------------
True or False Questions
1. Digital evidence is only useful in a court of law.
A. True
B. False
Ans: B
2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
--------------------------------------------------------------------------------------------------------------------
4. Ethical hacking will allow to____ all the massive security breaches.
A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
15._______ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23.______ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of ____-
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25.______ comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32.Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
35. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad
Ans. D
36. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C
37. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
--------------------------------------------------------------------------------------------------------------------
2. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
6. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. _________is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
15. What are the some of the most common vulnerabilities that exist in a network system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
17. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called ________.
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
30. ______________ framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
31.__________ is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32.________ is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 _____ is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. ______is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50.In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52.We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest ______and______.
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53.Network consist devices such as routers, firewalls, hosts that you must assess as a part of
______ process.
A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55.____ attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
64.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Ans:B
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
cwipedia.in
Question Bank (I scheme)
1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
5. What of the following is considered to be a pivotal event in the history of AI. A.
1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
Ans: C
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of
problem solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the
natural language A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human. A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
Ans: A
A. Narrow AI
B. General AI
C. Super AI
D. None of above
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans. A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
Ans: A
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
Ans: A
67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____. A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network. A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server. A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud. A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation? A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
123. ________ in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B
137. ___ is an open source electronic platform based on easy to used hardware and software. A.
Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989 Ans:
B
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as: A.
Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
20. To collect and analyze the digital evidence that was obtained from the physical investigation
phase, is the goal of which phase? A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made A.
Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation? A.
Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others. Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography. C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information? A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics? A.
Acquisition.
B. Steganography. C.
Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
Happy Learning!
www.cwipedia.in
Cwipedia.in
QUESTION BANK
Unit Test-II
Program: - Computer Engineering Group Program Code:- CM/IF
/CW
Course Title: -Emerging Trends in Computer Technology Semester: - Sixth
ETI (22618) Scheme: I
--------------------------------------------------------------------------------------------------
1. A valid definition of digital evidence is: A. Data stored or transmitted using a computer
B. Information of probative value
C. Digital data of probative value
D. Any digital evidence on a computer
Ans: C
2. What are the three general categories of computer systems that can contain digital evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because: A. They retain
data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to limit
the damage and close each investigation as quickly as possible. Which of the following is NOT
a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime scene
he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This is
an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those involved with
_______ should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above Ans:
15. An argument for including computer forensic training computer security specialists is: A. It
provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above. Ans: C
16. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the ___________
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
21. The evidence must be usable in the court which is called as_______
A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a a type of
_____________
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as ____________
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
26. Which is not procedure to establish a chain of custody? A. Save the original materials. B. Take
photos of physical evidence.
C. Don’t take screenshots of digital evidence content.
D. Document date, time, and any other information of receipt.
Ans: C
30.The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as___________
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31. When cases got to trial your forensics examiner play one of ____ role.
A. 2
B. 4
C. 3 D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
----------------------------------------------------------------------------------------------------------------
----
2. Attorneys and police are encountering progressively more digital evidence in their work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data. A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks. A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred. A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
--------------------------------------------------------------------------------------------------------------------
A. B, C, D, A
B. B, A, C, D C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain
access to the authorized user. A. Social Engineering. B.
IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
12.The intent of ethical hacker is to discover vulnerabilities from a_____ point of view to better
secure system.
A. Victims.
B. Attackers.
C. Both A & B D. None of these.
Ans. B
15._______ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23.______ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of ____-
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25.______ comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32.Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
35. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad Ans. D
36. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C
37. Leaking your company data to the outside network without prior permission of senior authority
is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to __________ of personal data. A.
stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed below
is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
--------------------------------------------------------------------------------------------------------------------
2. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. _________is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
14. What is purpose of Denial of Service attacks? A. Exploit weakness in TCP/IP attack. B. To
execute a trojan horse on a system.
C. To overload a system so it is no longer operational.
D. To shutdown services by turning them off.
Ans: C
15. What are the some of the most common vulnerabilities that exist in a network system? A.
Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
16. Which of the following is not a characteristic of ethical hacker? A. Excellent knowledge of
Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Ans: D
17. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called ________.
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
28. What are the types of scanning? A. Port, network, and services
B. Network, vulnerability, and port
C. Passive, active, and interactive
D. Server, client, and network
Ans: B
30. ______________ framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap Ans: B
31.__________ is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32.________ is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 _____ is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. ______is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
44. What is the attack called “evil twin”? A. rouge access point
B. ARP poisoning
C. session hijacking
D. MAC spoofing
Ans: A
47. When a hacker attempts to attack a host via the internet it is known as what type of attack? A.
local access
B. remote attack
C. internal attack
D. physical access
Ans: B
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50.In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52.We can eliminate many well-known network vulnerabilities by simply patch-ing your network
hosts with their latest ______and______.
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53.Network consist devices such as routers, firewalls, hosts that you must assess as a part of
______ process.
A. Prackers
B. Black hat hacking C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security issues in
your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55.____ attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
60. ____ include phishing, SQL injection, hacking, social engineering, spamming, denial of
service attacks, Trojans, virus and worm attacks.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
62. Which of the following is not a typical characteristic of an ethical hacker? A. Excellent
knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Ans:-D
63. What is the purpose of a Denial of Service attack?
A. Exploit a weakness in the TCP/IP stack
B. To execute a Trojan on a system
C. To overload a system so it is no longer operational
D. To shutdown services by turning them off
Ans:- C
64.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system. Ans:B
This Online Exam is for Final Year students of Computer Engineering Group of MSBTE
affiliated Polytechnic.
Date : 21-05-2020
Time 10.00 to 11.30am.
Email address *
0 of 0 points
Full Name *
Institute Name *
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 1/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Institute Code *
Enrollment number *
63 of 70 points
Narrow AI
General AI
Neural AI
Feedback
Narrow AI
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 2/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
2. DARPA, the agency that has funded a great deal of American AI 1/1
research, is part of the Department of:
Defence
Energy
Education
Jastice
Feedback
Defence
3. The conference that launched the AI revolution in 1956 was held at: 1/1
Dartmouth
Harvard
New York
Stanford
Feedback
Dartmouth
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 3/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
4. What is the term used for describing the judgmental or commonsense 1/1
part of problem solving?
Heuristic
Critical
Value based
Analytical
Feedback
Heuristic
Correct answer
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 4/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
David Levy
John McCarthy
Joseph Weizenbaum
Hans Berliner
Feedback
John McCarthy
7. The ability to recover and read deleted or damaged files from a 1/1
criminal’s computer is an example of a law enforcement specialty called?
Robotics
Simulation
Computer Forensics
Animation
Feedback
Computer Forensics
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 5/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
8. What are the important parts of the mobile device which used in 1/1
Digital forensic?
SIM
RAM
ROM
EMMC chip
Feedback
EMMC chip
9. Using what, data hiding in encrypted images be carried out in digital 1/1
forensics?
Acquisition.
Steganography.
Live analysis
Hashing.
Other:
Feedback
Steganography
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 6/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
e-mail harassment
Falsification of data
Sabotage
Identification of data
Feedback
11. Which file is used to store the user entered password? 1/1
.exe
.txt
.iso
.sam
Feedback
.sam
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 7/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Data mining
Data carving
Meta data
Data Spoofing.
Feedback
Data mining
13. What is first step to Handle Retrieving Data from an Encrypted Hard 1/1
Drive?
Formatting disk
Storing data
Deleting files.
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 8/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
14. In phase investigator transfers the relevant data from a venue out of 1/1
physical or administrative control of the investigator to a controlled
location
Preservation phase
Survey phase
Documentation phase
Reconstruction phase
Presentation phase
Feedback
Survey phase
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 9/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
16. A set of instruction compiled into a program that perform a particular 1/1
task is known as:
Hardware.
CPU
Motherboard
Software
Feedback
Software
A copy is made onto forensically sterile media. New media should always be used if
available.
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 10/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
18. To collect and analyze the digital evidence that was obtained from the 1/1
physical investigation phase, is the goal of which phase?
Review phase.
Deployment phase.
Feedback
Review phase
Deployment phase
Feedback
Deployment phase
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 11/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
20. Which phase entails a review of the whole investigation and identifies 1/1
area of improvement?
Review phase.
Deployment phase
Feedback
Review phase.
G. Palmar
J. Korn
Michael Anderson
S.Ciardhuain.
Feedback
Michael Anderson
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 12/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Forensic
Crime
Cyber Crime
Evidence
Feedback
forensic
23. Who proposed End to End Digital Investigation Process (EEDIP)? 1/1
G. Palmar
Stephenson
Michael Anderson
S.Ciardhuain
Feedback
Stephenson.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 13/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 14/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
27. What are the three general categories of computer systems that can 1/1
contain digital evidence?
Desktop, laptop,server
Hardware, software,networks
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 15/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Open computersystems
Communication systems
Embedded computersystems
Correct answer
Communication systems
Offenders who are unaware of them leave behind more clues than they otherwise
would have.
Feedback
Offenders who are unaware of them leave behind more clues than they otherwise would
have.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 16/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
30. Private networks can be a richer source of evidence than the Internet 0/1
because:
Correct answer
31. The criminological principle which states that, when anyone, or 2/2
anything, enters a crime scene he/she takes something of the scene with
him/her, and leaves something of himself/herself behind, is:
Differential AssociationTheory
Beccaria’s SocialContract
None of theabove
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 17/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Encryption.
None ofthese.
Feedback
Strengths.
Weakness.
A &B
None of these.
Feedback
Weakness.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 18/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
G. Palma.
Raymond.
Either.
Jhon Browman
Feedback
Raymond.
Fix identifiesweakness
Steal thedata
No correct answers
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 19/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Nmap
LC4
ToneLOC
Nessus
Feedback
LC4
37. Which tool is used for depth analysis of a web application? 2/2
Whisker
Superscan
Nikto
Kismet
Feedback
Whisker
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 20/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
38. Which hacker try to distribute political or social message through 2/2
their work?
Black hathacker
Hactivist
Scriptkiddes
White hathacker
Feedback
Hactivist
39. A penetration tester must identify and keep in mind the & 2/2
requirements of a firm while evaluating the security postures.
hacking techniques
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 21/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
40. Before performing any penetration test, through legal procedure, 2/2
which key points listed below is not mandatory?
Feedback
Script Kiddies
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 22/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
42. Which of the following tool is used for Windows for network queries 2/2
from DNS lookups to trace routes?
SamSpade
SuperScan
NetScan
Netcat
Feedback
SamSpade
43. Which Nmap scan is does not completely open a TCP connection? 2/2
SYN stealthscan
TCP scan
XMAS treescan
ACKscan
Feedback
SYN stealthscan
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 23/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
Local networking
Social engineering
Physical entry
Remote networking
Feedback
Local networking
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 24/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Reconnaissance
Maintaining Access
Gaining Access
Scanning
Feedback
Gaining Access
47. Which type of hacker represents the highest risk to your network? 0/2
black-hathackers
grey-hathackers
script kiddies
disgruntled employees
Correct answer
disgruntled employees
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 25/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
General Purpose
Special Purpose
Feedback
Special Purpose
Data communication
Monitoring
control
All of above
Feedback
Monitoring
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 26/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
ASIC
ASSP
CPU
CPLD
Feedback
CPU
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy
Forms
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 27/27
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI Unit-1(MCQ’s)
1. __________ is a branch of science which deals with helping machines find solutions to
complex problems in a more human-like fashion.
A. AI
B. IOT
C. Embedded System
D. Cyber Security
ANSWER: A
2. These machines only focus on current scenarios and react on it as per possible best action.
A. Reactive Machines
B. Limited Memory
C. Theory of mind
D. self awareness
ANSWER: A
A. Cognition
B. Knowledge
C. Research
D. vision
ANSWER: A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A. Self-driving cars
B. Apple series
C. Speech recognition
ANSWER: D
A. Theory of Mind
B. Self Awareness
C. IOT
D. Limited Memory
ANSWER: D
A. Theory of Mind
B. Strong
C. IOT
D. Deep learning
ANSWER: B
B. Computational Level
C. First Dimension
D. Cognition
ANSWER: C
A. Knowledge
B. Reasoning
C. NLP
ANSWER: D
A. Intention
B. Behavior
C. Vision
D. Body language
ANSWER: A
ANSWER: B
A. Embedded System
B. AI
C. IOT
D. LISP
ANSWER: D
A. Knowledge
B. Experience
D. All of these
ANSWER: C
13.What is the name for information sent from robot sensors to robot controllers?
A. Temperature
B. Feedback
C. Pressure
D. Signal
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
ANSWER: B
A.John McCarthy
B. Alan Turing
C. Allen Newell
D. Fisher Ada
ANSWER: D
ANSWER: C
ANSWER: B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
17. Which is the third course outcome of this subject
ANSWER: D
D. None of these
ANSWER: A
B. AI
C. Robotics
D. ES
ANSWER: A
A. Type osf AI
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B. deals with learning a function from available training data
B. make sense of unlabled data without having any predefined dataset for its training
C. Type of IOT
D. None of these
ANSWER: B
A. k-menas
B. self-organization
C. Driverless car
ANSWER: D
A. voice recognition
C. text tecognition
D. k-means
ANSWER: D
D. None of these
ANSWER: C
A. AI
B. IOT
C. Forensics
D. Deep Learning
ANSWER: D
A. Data
B. Inforamtion
C. Knowledge
a. Learning
b. Observing
c. Perceiving
d. None of the mentioned
Answer: A
30. A completely automated chess engine (Learn from previous games) is based on?
31. Which of the following task/tasks Artificial Intelligence could not do yet?
a. John McCarthy
b. Marvin Minsky
c. Alan Turing
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d. Allen Newell and Herbert Simon
Answer: A
34. Which is not the commonly used programming language for AI?
a. PROLOG
b. Java
c. LISP
d. Perl
Answer: D
35. Which of the following offers external chips for memory and peripheral interface circuits?
a. Microcontroller
b. Microprocessor
c. Peripheral system
d. Embedded system
Answer:B
a. Machine Learning
b. Deep Learning
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
c. Both (1) and (2)
d. None of the above
Answer: C
38. "Artificial Intelligence means to mimic a human. Hence, if a robot can move from one place
to another like a human, then it comes under Artificial Intelligence."True or False
a. True
b. False
Answer: B
39. Which of the mentioned human behavior does the AI aim to mimic?
a. Thinking
b. Eating
c. Sleeping
d. All of the above
Answer: A
a. Thinking humanly
b. Adapting to the environment and situations
c. To rule over humans
d. Real Life Problem Solving
Answer: C
a. Microcontroller
b. Microprocessor
c. Debugger
d. Microcontroller and Microprocessor
Answer: D
a. To measure information
b. To generates actual output
c. To correct output
d. All of the above
Answer: B
a. Power supply
b. Timers
c. Parallel ports
d. Proteus
Answer: D
a. MAC OS
b. RTOS
c. Linux
d. None of the above
Answer: B
a. A set of Rule
b. A sequence of steps
c. Both (a) and (b)
d. Arbitrary representation to problem
Answer: C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
48. Which is the best way to go for Game playing problem?
a. Linear approach
b. Heuristic approach
c. Random approach
d. Optimal approach
Answer: B
a. Representational Verification
b. Representational Adequacy
c. Inferential Adequacy
d. Inferential Efficiency
Answer: A
51. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
a. machine intelligence
b. human intelligence
c. artificial intelligence
d. virtual intelligence
Answer: C
a. BASIC
b. FORTRAN
c. IPL
d. LISP
Answer: C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
53. The first widely-used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
It allows machines to handle vague information with a deftness that mimics human intuition.
What is the name of this AI?
a. Boolean logic
b. Human logic
c. Fuzzy logic
d. Functional logi
Answer: C
54. What is the term used for describing the judgmental or commonsense part of problem
solving?
a. Heuristic
b. Critical
c. Value based
d. Analytical
Answer: A
55. Which kind of planning consists of successive representations of different levels of a plan?
a. hierarchical planning
b. non-hierarchical planning
c. project planning
d. All of the above
Answer: A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans:D
Ans: A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989
Ans: B
A.1960's
B.1970's
C.1980's
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D.1990's
Ans: C
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
Ans: B
A. Accessing the system's directories viewing mode and navigating through the various systems
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans: D
D. The investigator must maintain strict confidentiality, discussing the results of an investigation
Ans: B
A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
15. In _______phase investigator transfers the relevant data from a venue out of physical or
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
J. Presentation phase
Ans:B
Ans: C
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B. A copy is made onto forensically sterile media. New media should always be used if
available.
D. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation
C. Review phase.
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. Deployment phase.
Ans: B
phase?
C. Review phase.
D. Deployment phase.
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
C. Review phase.
D. Deployment phase
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans: C
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B
Ans: B
Ans. D
A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. Centrify
Ans: A
D. All of above
E. None of above
Ans: D
D. All of above
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
E. None of above
Ans: D
D. To honor confidentially.
Ans: B
33. Which of following is a not unethical norm for Digital Forensics Investigation?
Ans: D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and analysis
on user input.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: A
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
D. Deleting files.
Ans: C
Ans: A
Ans: A
46. Who was proposed UML modeling of digital forensics process model (UMDFPM)?
A. kohn
B. Eloff
C. Oliver
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. All of these
Ans. D
A. DFPM
B. UML
C. case diagram
D. EMIC
Ans. A
48. How many phase are included in Integrated Digital Investigation Process(IDIP)?
A. Five
B. Four
C. Six
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. Seven
Ans. C
49. Which model follow by the Extended Model of Cybercrime Investigation (EMCI) ?
A. Spiral Model
B. Interactive Model
C. SDLC Model
D. Waterfall Model
Ans. D
50. DFPM Along With ……….. group and ………… phases are proposed by carrier and Stafford ?
A. 5, 17
B. 17, 5
C. 4, 17
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D. 17, 4
Ans. A
Unit -4 ETI
Q. Chap QUESTION
1. 4.1&4.2 Investigation of computer security which step follow
A. Incident leads to legal proceeding B. Legal proceeding to leads incident
C. incident leads to legal procedure D. Legal proceeding to leads incident
Answer: A
3. 4 To meet the requirement of the judging body and to withstand or face any
challenges, it is essential to follow the _______
A. Evidence-handing procedure B. security
C. Incident-handing procedure D. Relevant evidence
Answer: A
11. 4 Accepting digital evidence court will determine if the evidence is _____
A. relevant B. Authentic
C. Both a and b D. None of the above
Answer: C
12. 4 Evidence can be acquired when electronic device are ____ for examination
A. seized B. Secured
C. Seized and secured D. None of the above
Answer: C
16. 4 Digital evidence topic are divided into how many types
A. 4 B. 2
C. 3 D. 6
Answer: C
19. 4 Digital evidence are used to establish a credible link between the ______
A. Attacker and victim B. Crime scene
C. Both a and b D. None of the above
Answer: C
7. Which type of evidence is typically used in criminal cases in which it support the dependent,
either partially removing their guilt in the case.
A. Explainable evidence
B. Demonstrate evidence
C. Electronic evidence
D. Documents evidence
Ans. D
Chapter
Q. QUESTION
topics
26. 4-4.5.1 The laws of jurisdictions define data as _______________________
A. Written works and record keeping B. Record keeping words
C. None of above D. both
Answer: Written works and record keeping
28. The chain of custody in digital forensics can also be referred to as the________
A. Forensic link B. Scientific link
C. Digital link D. Custody link
Answer: Forensic link
A. iv-i-iii-ii-vi-v B. v-vi-iii-i-ii-iv
C. iii-iv-i-vi-v-ii D. i-ii-iii-iv-v-vi
Answer: iii-iv-i-vi-v-ii
34. To maintained the data in the PDA, its needs to keep in?
A. Continuously charge mode B. Evidence locker
C. In safe place D. both
Answer: Continuously charge mode
43. The owners of these establishments identified the holder of the __________
A. Add-on card B. Identity card
C. Aadhar card D. none
Answer: Add-on card
44. Which case won the second runner -up position for the India Cyber Cop
Award?
A. Credit card fraud B. Hosting Obscene Profiles
C. Illegal money Transfer D. Fake travel agent
Answer: Credit card fraud
48. Who won the India Cyber Cop Award while investigating cases ?
A. Mr S.Balu B. Mr R.S Jadhav
C. Mr Edmond Locard’s D. Mr Sanjay Jadhav
Answer: Mr Sanjay Jadhav
49. Which of the following is not a type of volatile evidence?
A. Log files B. Routing tables
1.Before accessing the security of system,one may want to understand something about the........
A.Victim Mindset
B.Investigator Mindset
C.Offender Mindset
ANS-C
A.Good Guys
D.Both B and C
ANS-D
C.Both A and B
Ans-A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
4.Who states that the public misunderatands them?
A.Victim
B.Hacker
C.Investigators
Ans-B
A.Prejudge
B.postjudge
C.judge
D.missjudge
Ans-A
A.Investigators
B.Crowd
C.Judge
D.Public
Ans-D
7.Many Hackers Stereotype are based on misunderstanding rather than fact.Here Stereotype
means what???
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A.Mind
B.Image
C.Look
Ans-B
Ans-C
A.Hackers
B.Public
C.Judge
Ans-A
A.courage
B.abilities
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C.knowledge
D.problems
Ans-C
A.Normal
B.Positive
C.Negative
D.Both B and C
Ans-B
12.The negavtive aspects of hacking usually overshadow the positive aspects and
promotes...........
A.Positive Aspects
B.Positive Stereotypes
C.Negative Aspects
D.Negative stereotypes
Ans-D
13.Hackers hack for ........of knowledge and the ...... of the challanges.
Ans-D
Ans-D
15.......Hackers might think they can improve electronics and mechanical devices by rewiring
them.
A.Old-School
B.Old-Aged
C.Old-Minded
Ans-A
16.Old-School hackers might think they can improve electronics and mechanical devices by...
A.Fixing them
B.Recreating them
C.Rewiring them
D.Buying new
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans-C
17.Recent Evidence shows that many hackers may also hack for.........Purpose
A.Political
B.Social
C.Both A and B
Ans-C
18.Hackers dont think about the fact that human beings are behind.......
A.walls
B.Firewall
C.wired Network
Ans-B
A.Negative way
B.Positive way
C.neutral Way
D.Both B and C
Ans-A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
20.Hacker looks for victims
A.Files
B.Server
C.Databases
Ans-D
A.Steal
B.Modify
C.Delete
D.A,B,C
Ans-D
A.Easy
B.Hard
C.Normal
D.High
Ans-B
A.Good
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B.Bad
C.Best
D.Worst
Ans-C
A.Acheivement
B.Advancment
C.Adverseness
Ans-B
25. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________
Ans-B
26.Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
A.Cracking
D.Hactivism
Ans-C
27. __________ security consultants uses database security monitoring & scanning tools to
maintain security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
Ans-a
28.Governments hired some highly skilled hackers. These types of hackers are termed as
_______
a) Special Hackers
b) Government Hackers
Ans-d
29.These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
b) Elite Hackers
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
c) Licensed Penetration Testers
Ans-b
30.Someone (from outside) who tests security issues for bugs before launching a system or
application, and who is not a part of that organization or company are ______
Ans-c
Ans-D
A.protect
B.Avoid
C.preserve
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D.Leave
Ans-A
A.Cops
B.Organized Criminals
C.Normal People
D.Detective
Ans-B
A.Nothing
C.fly under radar and find the weaknesses to get their target
Ans-C
35.Which of the following is an eaxmple of how hackers and malicious users think and work:
A.Cycber-terrorits
D.Both A and C
Ans-C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans-D
C.Both A and B
Ans-C
B.Because they are easy to access and minimum chances to get caught
D.Both A and B
Ans-B
D.None of these
Ans-A
40. Using unauthorized software that would otherwise be blocked at the firewall by changing ...
A.Default IP Address
Ans-B
41.What hackers can do by gaining overly trusting colleague's user ID and password............
C.Both A and B
D.None of these
Ans-A
A.Not equal
B.Same
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C.Equal
D.Both B and c
Ans-A
A.motives
B.methods
C.skill
Ans-D
A.Two
B.Three
C.Four
D.Five
Ans-B
A.Script Kiddies
B.Criminal hackers
C.Security researchers
D.Both A and B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans-D
A.Computer Beginners
B.Engineers
C.Programmers
D.All of these
Ans-A
A.Hacker tools
B.Vulnerability scanners
C.Documentation available
D.All of these
Ans-D
48.Who dont have any real knowledge of what's really going on behind the scenes?
A.Criminal hackers
B.Script kiddies
C.Hacktivists
D.Cycber Terrorists
Ans-B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
49.Who are Skilled criminal experts?
A.Script kiddies
B.Hacktivits
C.Cycber terrorists
D.None of these
Ans-D
A.Script kiddies
B.Hacktivits
C.Criminal hackers
D.Cycber terrorists
Ans-C
A.Script
B.Other programs
D.All of these
Ans-D
A.Script kiddies
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
B.Criminal Hackers
C.Security researchers
D.Hackitivists
Ans-B
B.Malware
C.Vriuses
D.Worms
Ans-A
A.A.Script kiddies
B.Criminal Hackers
C.Security researchers
D.Hackitivists
Ans-B
A.Criminal
B.Investigator
C.Advanced Hacker
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
D.Hacker
Ans-C
A.A.A.Script kiddies
B.Hackitivists
C.Security researchers
D.Criminal Hackers
Ans-D
A.Security researchers
B.Hackitivists
C.Cycber terrorist
Ans-A
A.Track Computer
B. Network
C.Applicaation vulnerabilites
D.All of these
Ans-D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A.White hat
B.Black hat
C.Grey Hat
D.Script kiddies
Ans-A
A.White hat
B.Black hat
C.Grey Hat
D.Script kiddies
Ans-B
A.White hat
B.Black hat
C.Grey Hat
D.Script kiddies
Ans-C
61.Who are invited by software vendors to find security flaws in their system.
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A.White hat
B.Black hat
C.Grey Hat
D.Blue hat
Ans-D
A.Security Researchers
B.IT Professionals
C.Hacktivists
D.Both A and B
Ans-D
A.Security researchers
B.Hackitivists
C.Cycber terrorist
Ans-B
A.Private
B.Public
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C.Common
D.None of these
Ans-B
D.All of these
Ans-D
A.Unorganised
B.organised
C.Both A and B
D.None of these
Ans-C
A.Security researchers
B.Hackitivists
C.Cycber terrorist
A.Security researchers
C.Cycber terrorist
D.Hackitivists
Ans-B
D.All of these
Ans-D
A.Revenge
C.curiosity
Ans-D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
72.Arrange the following steps to become hacker in proper way-
from experts
vulerability
A.i-ii-iii-iv-v-vi-vii-viii-ix-xi-x-xii-xiv-xiii
B.ii-i-iv-viii-iii-xii-vi-vii-v-xiii-ix-xiv-x-xi
C.ii-ix-vi-iii-viii-v-iv-vii-i-xi-xii-xiii-xiv-x
D.ii-ix-iv-iii-viii-v-vi-vii-i-xi-xii-xiii-xiv-x
Ans-D
73.The 3rd step to become hacker is Learn more than one ............
A.Operating System
B.Programming Language
C.Networking concepts
D.Both a and b
Ans-B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
A.12
B.13
C.14
D.0-13
Ans-C
75.Computer programs and scripts that help you find and exploit weaknesses in computer
system,web applications,servers and networks is called
A.HAcking tools
B.Hacking weapon
C.Samspade
D.none of these
Ans-A
A.Probely
B.Savvius
C.Medusa
Ans-D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
77.Which tool is easy to use webapplication scanner?
A.Ettercap
B.InsightVM
C.Netspaker
D.Aircrack
Ans-C
A.SAAS
B.PASS
C.IASS
D.none ofthese
Ans-A
79.The fully automated ethical hacking solution that mimics a hacker to keep one step ahead
ofmalicious intruders.
A.Probely
B.Acunetix
C.saferVPN
D.Hashcat
Ans-B
B.JavaScript
Ans-D
D.Both B and C
Ans-D
A.Probely
B.Etterccap
C.Hashcat
D.Both A and B
Ans-A
A.Savvius
B.AirCrack
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
C.InsightVM
D.WebInspect
Ans-C
A.InsightVM
B.SaferVPN
C.Netsparker
D.Both A and B
Ans-B
A.Qualys guard
B.GFI LanGuard
C.Ettercap
Ans-D
86.Ettercap supports ........... dissection includes features for network and host analysis
A.Active
B.Passive
D.none of these
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Ans-C
A.Untrustable
B.Trustable
C.Faithful
D.Most used
Ans-B
A.Angry Ip Scanner
B.GFI LanGuard
C.Ettercap
D.Qualys guard
Ans-A
A.Angry Ip Scanner
B.GFI LanGuard
C.Ettercap
D.Qualys guard
Ans-B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
90............ is automated dynamic application security testing that allows performing ethical
hacking techniques.
A.Acunetix
B.Ettercap
C.Rainbow Crack
D.WebInspect
Ans-D
A.Hashcast
B.SQL Map
C.Qualys Guard
D.medusa
Ans-C
A.SQL Map
B.Hashcast
C.Qualys Guard
D.medusa
Ans-B
C.Sniffing networks
Ans -D
94.............is one of the best oline brute force enthical hacking tool
A.IronWASP
B.Medusa
C.L0phtCrack 6
D.Hashcat
Ans-B
A.NetStumbler
B.Medusa
C.L0phtCrack 6
D.Hashcat
Ans-A
D.All of these
Ans-D
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-4 Part-1(MCQ’s)
Ans-c
a.Email-messages
b.cookies
c.Encrypted files
Ans-d
3. What are the three general categories of computer systems that can contain digital
evidence
4.The digital Evidence are used to establish a credible link between the.........
Ans-a
a. True
b. False
Ans-b
6.The most complete copy or a copy which includes all neccessary parts of evidence,which is
closely related to the original evidence
a.Best Evidence
b.orginal Evidence
c.Documented Evidence
Ans-a
c.both a and b
Ans-b
a. Process
b. End result
c. Substance
d. Documents
Ans-d
a. Admissible
b. Belivable
c. Both a and b
d. UnReliable
Ans-c
a. Witness Memory
b. Objective
c. Honesty
11.According to.......... principle when two items make contact there will be an interchange
a.Cohen
b.Edmond Locard
c.Culley
d.Both b and c
Ans-b
a.Illustrative Evidence
b.Best Evidence
c.Origital Evidence
Ans-a
a.Electronic
b.Substantial
c.Documented
d.Illustrative
ans-d
b.Illustrative
c.Documented
d.Both b and c
Ans-c
a.Photographs
b.DNA samples
c.dried blood
d.Footprints
Ans-a
a.Explainable Evidence
b.ELectronic Evidence
c.Illustrative Evidence
d.Substainable Evidence
Ans-d
a.Forensic link
c.Chronological Documentation
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d.all of the above
Ans-d
a.Collection
b.Sequence of control
c.both a and b
d.forensic link
Ans-c
d.both a and c
Ans-a
d.both a and c
Ans-b
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
20.The Substanial Evidence also called as ........
a.Physical Evidence
b.Non-Physical Evidence
c.Exculpatory Evidence
Ans-a
a.Physical Evidence
b.Non-Physical Evidence
c.Exculpatory Evidence
Ans-c
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Class: TYCO Subject: ETI(22618) Unit-2(MCQ’s)
1. Embedded system is a _____ and _____ .
a. microprocessor
b. microcontroller
c. Both a And b
Answer: C
2. Which of the following allows the reuse of the software and the hardware components?
Answer: A
3. Which of the following is the design in which both the hardware and software are considered
during the design?
a) platform based design
b) memory based design
c) software/hardware codesign
d) peripheral design
Answer: C
Answer: B
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
5. Which of the following is a meet-in-the-middle approach?
a) peripheral based design
b) platform based design
c) memory based design
d) processor design
Answer: B
6. Which of the following helps in reducing the energy consumption of the embedded system?
a) compilers
b) simulator
c) debugger
d) emulator
Answer: A
Answer: B
8. Which of the following provides a buffer between the user and the low-level interfaces to the
hardware?
a) operating system
b) kernel
c) software
d) hardware
Answer: A
9. Which of the following can make the application program hardware independent?
a) software
b) application manager
c) operating system
d) kernel
Answer: C
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
10. Which of the following includes its own I/O routine?
a) hardware
b) kernel
c) operating system
d) application manager
Answer: C
11. How many types of messages are associated with the real-time operating system?
a) 2
b) 3
c) 4
d) 5
Answer: A
12. Which can control the memory sharing between the tasks?
a) kernel
b) application
c) software
d) OS
Answer: A
a. Hardware Plafform
b. Interrupt controllers
c. Processor
Answer: A
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
14. Which one of the following offers CPUs as integrated memory or peripheral interfaces?
a) Microcontroller
b) Microprocessor
c) Embedded system
d) Memory system
15. Which of the following offers external chips for memory and peripheral interface circuits?
a) Microcontroller
b) Microprocessor
c) Peripheral system
d) Embedded system
17. How is the protection and security for an embedded system made?
a) OTP
b) IPR
c) Memory disk security
d) Security chips
18. It retains its content when power is removed. What type of memory is this?
a) Volatile memory
b) Nonvolatile memory
c) RAM
d) SRAM
a. Control Unit
b. Execution Unit
c. Data memory
23. PIC microcontroller are the ______ microcontrollers can be programmed to be performed a
large range of task.
a. Huge
b. Large
c. Small
b. Connectivity
c. Human interface
d. Both a And b
a. 1978
b. 1996
c. 1997
d. 1990
a. Atmel Corporation
b. Vegard Wollan
c. Alf-Egil Bogan
d. Harvard
b. Vegard Wollan
c. Alf-Egil Bogan
d. Both b And c
c. Both a And c
d. RISC architecture
b. digital power
c. Automotive
Answer: B
32. The main importance of ARM micro-processors is providing operation with ______
a) Low cost and low power consumption
b) Higher degree of multi-tasking
c) Lower error or glitches
d) Efficient memory management
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Answer: A
Answer: C
a) True
b) False
Answer: B
Answer: b
Answer: a
Answer: b
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
38 . Barometer is which type of sensor________
a) Pressure sensor
b) Touch sensor
c) Temperature sensor
d) Humidity sensor
Answer: a
Answer: d
Answer: c
40. The computer devices and smart phones that have _______ with pressure sensor.
a) Automotive Industry
b) Industrial
c) Aviation
d) Touch screen
Answer: d
41. In which place the pressure sensor is needed for monitoring gases and their partial
pressures.
a) Touch screen
b) Automotive Industry
c) Industrial
d) Aviation
Answer: c
Answer: b
Answer: d
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
43. Dew point and Fost point are mainly used in which conditions?
a) Water vapor
b) Pressure of gas
c) Dryness of gas
d) Moisture in gas
Answer: c
Answer: a
Answer: d
47. Humidity sensors are divided into how many types and depending on what?
a) 2 types depending on output
b) 2 types depending on measurement units
c) 3 types depending on measurement units
d) 3 types depending on output
Answer: b
48. Electronic type hygrometers are divided into how many types?
a) 5 types
b) 3 types
c) 4 types
d) 2 types
Answer: d
Answer: c
Answer: a
51. ________ sensors measure the electrical change in devices such as conductive polymers.
a) Capacitive Sensor
b) Resistive Sensor
c) Thermal Conductivity
d) Both resistive and conductive
Answer: d
52. ________ sensors are suitable for environments that have high temperatures.
a) Capacitive Sensor
b) Resistive Sensor
c) Thermal Conductivity
d) Both resistive and conductive
Answer: c
Answer: a
Answer: c
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
55. Which sensor can detect nearby objects?
a) Proximity sensor
b) Humidity sensor
c) Touch sensor
d) Pressure sensor
Answer: a
56. The monitoring of machines, gears and objects are achieved by which sensor?
a) Humidity sensor
b) Proximity sensor
c) Touch sensor
d) Pressure sensor
Answer: b
Answer: d
Answer: a
Answer: d
Answer: c
Answer: a
Answer: b
Answer: a
Answer: a
65. Which device generates output signal when metal objects are either inside or entering into
sensing area.
a) Capacitive Proximity
b) Magnetic Proximity
c) Inductive proximity
d) Parallel Proximity
Answer: a
66. ________ detects metals but along with it can also detect resins, liquids.
a) Inductive proximity
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
b) Capacitive Proximity
c) Magnetic Proximity
d) Parallel Proximity
Answer: b
67. _________ sensors have no electrical noise effect and it can work DC.
a) Inductive proximity
b) Capacitive Proximity
c) Magnetic Proximity
d) Parallel Proximity
Answer: c
Answer: a
Answer: c
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: a
a) High
b) Medium
c) Low
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d) Very Low
Answer: c
a) Low
b) Very high
c) Medium
d) High
Answer: a
a) Smart Irrigation
b) Home automation
c) Tracking package handling
d) Noise monitoring
Answer: b
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: a
a) Smart Irrigation
b) Home automation
c) Tracking package handling
d) Noise monitoring
Answer: a
a) Smart Irrigation
b) Home automation
c) Tracking package handling
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d) Noise monitoring
Answer: c
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: a
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: d
a) Smart Irrigation
b) Home automation
c) Tracking package handling
d) Noise monitoring
Answer: d
80. …………….IOT system is not suitable for solutions where the data involved is big.
a) IOT Lvel1
b) IOT Lvel2
c) IOT Lvel3
d) IOT Lvel5
Answer: a
a) Single node
b) Double node
c) Triple node
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
d) Multiple node
Answer: d
a) Single node
b) Double node
c) Triple node
d) Multiple node
Answer: d
Answer: a
a) Smart Irrigation
b) Weather Monitoring System
c) Tracking package handling
d) Noise monitoring
Answer: b
Answer: c
Answer: b
Answer: b
Answer: a
91.Does the level shifter converts the voltage levels between RS-232 and transistor-transistor
logic.
a) True
b) False
Answer: a
Answer: d
94.A program written with the IDE for Arduino is called _________
a) IDE source
b) Sketch
c) Cryptography
d) Source code
Answer: b
Answer: c
Answer: a
Answer: c
Answer: a
Answer: d
100. ___________ are pre built circuit boards that fit on top of Android.
a) Sensor
b) Data types
c) Breadboard
d) Sheilds
Answer: d
Answer: b
Answer: a
Answer: c
Answer: a
Answer: d
Answer: b
Answer: d
Answer: c
Answer: d
Answer: b
Answer: d
Answer: a
Answer: c
115. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Humidity
b) Temperature
c) Motion
d) Gas
Answer: b
115. -----------------sensor
a) Humidity
b) Temperature
c) Motion
d) Gas
Answer: b
116. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Accelerator
b) IR
c) Proximity
d) Motion
Answer: d
117. -----------------sensor
a) Accelerator
b) Gas
c) Proximity
d) Smoke
Answer: b
118. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Accelerator
b) Gas
c) Proximity
d) Smoke
Answer: d
119. -----------------sensor
a) Accelerator
b) Gas
c) Proximity
d) Image
Answer: d
120. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Accelerator
b) Gas
c) Proximity
d) Image
Answer: a
121. -----------------sensor
a) Accelerator
b) IR
c) Proximity
d) Motion
Answer: b
122. -----------------sensor
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
a) Accelerator
b) Gas
c) Proximity
d) Image
Answer: c
a) Stepper
b) Servo
c) DC
d) Linear
Answer: b
Answer: a
a) Stepper
b) Servo
c) DC
d) Linear
Answer: c
a) Chain
b) Linear
c) Rack
d) Locking
Answer: b
The Shirpur Education Society’s
R. C. Patel Polytechnic, Shirpur
Department of Computer Engineering
Question Bank (I scheme)
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
BHARATI VIDYAPEETH INSTITUTE OF TECHNOLOGY
QUESTION BANK
--------------------------------------------------------------------------------------------------
2. What are the three general categories of computer systems that can contain digital
evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related
crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This
is an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those
involved with _______ should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above
Ans:
15. An argument for including computer forensic training computer security specialists is:
A. It provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above.
Ans: C
16. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the ___________
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
21. The evidence must be usable in the court which is called as_______
A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a
a type of _____________
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as ____________
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
30.The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as___________
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31.When cases got to trial your forensics examiner play one of ____ role.
A. 2
B. 4
C. 3
D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
---------------------------------------------------------------------------------------------------------------------
True or False Questions
1. Digital evidence is only useful in a court of law.
A. True
B. False
Ans: B
2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
--------------------------------------------------------------------------------------------------------------------
4. Ethical hacking will allow to____ all the massive security breaches.
A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
15._______ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23.______ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of ____-
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25.______ comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32.Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
35. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad
Ans. D
36. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C
37. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
--------------------------------------------------------------------------------------------------------------------
2. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
6. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. _________is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
15. What are the some of the most common vulnerabilities that exist in a network system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
17. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called ________.
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
30. ______________ framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
31.__________ is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32.________ is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 _____ is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. ______is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50.In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52.We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest ______and______.
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53.Network consist devices such as routers, firewalls, hosts that you must assess as a part of
______ process.
A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55.____ attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
64.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Ans:B
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
EMERGING TRENDS IN COMPUTER AND
INFORMATION TECHNOLOGY (22618)
2. What are the three general categories of computer systems that can contain digital
evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related
crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This
is an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those
involved with should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above
Ans:
15. An argument for including computer forensic training computer security specialists is:
A. It provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above.
Ans: C
16. The digital evidence are used to establish a credible link between
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
30. The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31. When cases got to trial your forensics examiner play one of role.
A. 2
B. 4
C. 3
D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
True or False Questions
1. Digital evidence is only useful in a court of law.
A. True
B. False
Ans: B
2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
15. is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23. exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24. Connecting into network through a rogue modem attached to computer behind a firewall is an
example of -
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25. comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32. Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
37. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the &
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
2. Which of the following tool is used for Network Testing and port Scanning
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
6. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
15. What are the some of the most common vulnerabilities that exist in a network system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
17. Attempting to gain access to a network using an employee’s credentials is called the
mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called .
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
30. framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
31. is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32. is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
45. Which type of hacker represents the highest risk to your network?
A. black-hat hackers
B. grey-hat hackers
C. script kiddies
D. disgruntled employees
Ans: D
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50. In computer networking, is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52. We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest and .
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53. Network consist devices such as routers, firewalls, hosts that you must assess as a part of
process.
A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55. attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
64. What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Ans:B
Instructions :---
1) THIS PDF only for study purpose.
2) Totally free do not buy from anyone.
3) Best of luck.
1) In an optical fiber communication system, which among the following is not a typical
transmitter function?
a. Coding for error protection
b. Decoding of input data
c. Electrical to optical conversion
d. Recoding to match output standard
ANSWER: (d) Recoding to match output standard
2) Which among the following is provided by an optical receiver for the regeneration of data
signal with minimum error?
a. Photo-diode
b. Signal Processing Circuits
c. Linear Circuitry
d. None of the above
ANSWER: (c) Linear Circuitry
4) Which property/ies of PCM stream determine/s the fidelity to original analog signal?
a. Sampling rate
b. Bit depth
c. Both a and b
d. None of the above
ANSWER: (c) Both a and b
5) In single-mode fibers, how does the fraction of energy traveling through bound mode
appear in the cladding?
a. As a crescent wave
b. As a gibbous wave
c. As an evanescent wave
d. All of the above
ANSWER: (c) As an evanescent wave
7) If a light travels in a certain medium and it gets reflected off an optically denser medium
with high refractive index, then it is regarded as
a. External Reflection
b. Internal Reflection
c. Both a and b
d. None of the above
ANSWER: (a) External Reflection
8) In an optical fiber, the concept of Numerical aperture is applicable in describing the ability
of
a. Light Collection
b. Light Scattering
c. Light Dispersion
d. Light Polarization
ANSWER:(a) Light Collection
9) Which among the following do/does not support/s the soot formation process?
a. OVPO
b. MCVD
c. PCVD
d. All of the above
ANSWER: (c) PCVD
10) Which type of photonic crystal fiber exhibit/s its/their similarity to the periodic crystalline
lattice in a semiconductor?
a. Index guiding fiber
b. Photonic bandgap fiber
c. Both a and b
d. None of the above
ANSWER: (b) Photonic bandgap fiber
11) Which type of fiber optic cable has/have its/their core with the size of about 480 μm to 980
μm & made up of polymethylmethacrylate (PMMA)?
a. Glass fiber optic cable
b. Plastic fiber optic cable
c. Plastic clad silica fiber optic cable
d. All of the above
ANSWER: (b) Plastic fiber optic cable
12) In multifiber cable system, which form of outer jacket/s consist/s of polyolefin compounds
and are regarded as halogen free?
a. OFNR
b. OFNP
c. LSZH
d. All of the above
ANSWER: (c) LSZH
13) During the design of FOC system, which among the following reasons is/are responsible for
an extrinsic absorption?
a. Atomic defects in the composition of glass
b. Impurity atoms in glass material
c. Basic constituent atoms of fiber material
d. All of the above
ANSWER: (b) Impurity atoms in glass material
14) Which among the following represent/s the measure/s to minimize the inhomogenities for
Mie scattering reduction?
a. Extrusion Control
b. Increase in relative R.I. difference
c. Removal of imperfections due to glass manufacturing process
d. All of the above
ANSWER: (d) All of the above
15) In Kerr effect, induced index change has its proportionality with respect to
a. square of electric field
b. cube of electric field
c. cube root of electric field
d. one-fourth power of electric field
ANSWER: (a) square of electric field
17) Which kind/s of misalignment assist/s in the reduction of overlap region in fiber?
a. Angular
b. Longitudinal
c. Lateral
d. All of the above
ANSWER: (c) Lateral
18) Which is the correct order of sequential steps for an electric arc fusion technique?
A. Pressing of fiber ends for fusion
B. Application of heat for smoothening of end-surfaces
C. Alignment of broken fiber edges
a. A, B, C
b. B, A, C
c. C, B, A
d. C, A, B
ANSWER: (c) C, B, A
19) Which splicing technique involves the alignment and locking of broken fiber edges by
means of positioning devices & optical cement?
a. Fusion
b. Mechanical
c. Both a and b
d. None of the above
ANSWER:(b) Mechanical
20) By using Springroove splicing technique, what is the value of mean insertion loss for multi
mode graded index fiber?
a. 0.01
b. 0.03
c. 0.05
d. 0.09
ANSWER: (c) 0.05
21) In the fiber optic link, power transfer from one fiber to another and from fiber to detector
must take place with coupling efficiency.
a. maximum
b. stable
c. minimum
d. unpredictable
ANSWER: (a) maximum
22) In spontaneous emission, the light source in an excited state undergoes the transition to a
state with
a. Higher energy
b. Moderate energy
c. Lower energy
d. All of the above
ANSWER: (c) Lower energy
23) Which among the following is a key process adopted for the laser beam formation as it
undergoes the light amplification?
a. Spontaneous Emission
b. Stimulated Emission
c. Both a and b
d. None of the above
ANSWER: (b) Stimulated Emission
24) While coupling of LEDs with fiber, on which factor/s does the size of source and lighting
angle generated within the semiconductor depend/s?
a. Geometry of die
b. Refractive index of semiconductor
c. Encapsulation Medium
d. All of the above
ANSWER: (d) All of the above
25) Which among the following results in the removal of LED lens interface for achieving high
coupling efficiency?
a. Spherical lens
b. Cylindrical lens
c. Integral lens LED
d. All of the above
ANSWER: (c) Integral lens LED
26) For a photo-diode with responsivity of 0.50 A/W & optical power of about 12μW, what
would be the value of generated photocurrent?
a. 3 μA
b. 6 μA
c. 9 μA
d. 12 μA
ANSWER: (b) 6 μA
27) Which component of an optical receiver is a linear frequency shaping filter used for the
compensation of signal distortion and Inter Symbol Interference (ISI)?
a. Photodetector
b. Amplifier
c. Equalizer
d. None of the above
ANSWER: (c) Equalizer
28) In digital receivers, which codes are used to designate the sampled analog signals after
their quantization into discrete levels?
a. Binary
b. Decimal
c. ASCII
d. Excess-3
ANSWER: (a) Binary
29) Which feature of an eye-diagram assists in the measurement of additive noise in the signal?
a. Eye opening (height, peak to peak)
b. Eye overshoot/ undershoot
c. Eye width
d. None of the above
ANSWER: (a) Eye opening (height, peak to peak)
31) Which phenomenon causes the dynamic line width broadening under the direct
modulation of injection current?
a. Modal Noise
b. Mode-partition Noise
c. Frequency Chirping
d. Reflection Noise
ANSWER: (c) Frequency Chirping
32) Speckle pattern is generated due to interference of nodes from a coherent source especially
when the coherence time of source is the intermodal dispersion time in the fiber.
a. Less than
b. Greater than
c. Equal to
d. None of the above
ANSWER: (b) Greater than
33) Which among the following is/are determined by the fiber characterization?
a. Fiber integrity & performance for desired transmission rate
b. Installation practices
c. Service Implementation
d. All of the above
ANSWER: (d) All of the above
34) From the tests carried out in fiber characterization, which among the following measures
the total light reflected back to the transmitter caused by the fiber as well as the components
like connector pairs and mechanical splices?
a. ORL
b. OTDR
c. LTS
d. PMD
ANSWER: (a) ORL
35) In fiber fault location, the equation of length (l) for time difference (t) is expressed as L = ct
/ 2n1 . Which factor in this equation implies that the light travels a length from source to break
point and then through another length on the return trip?
a. L
b. c
c. t
d. 2
ANSWER: (d) 2
36) Which line code in PCM indicates the return of signal to zero between each pulse & takes
place even due to occurrence of consecutive 0‟s & 1‟s in the signal?
a. Return-to-zero (RZ)
b. Non-Return to zero space
c. Return to zero inverted
d. Non-return to zero inverted
ANSWER: (a) Return-to-zero (RZ)
37) In the structure of fiber, the light is guided through the core due to total internal
a. reflection
b. refraction
c. diffraction
d. dispersion
ANSWER: (a) reflection
38) In the structure of a fiber, which component provides additional strength and prevents the
fiber from any damage?
a. Core
b. Cladding
c. Buffer Coating
d. None of the above
ANSWER: (c) Buffer Coating
39) Which is the transmission medium for VLF electromagnetic waves especially applicable for
aeronautical and submarine cables?
a. Paired wires
b. Coaxial cable
c. Waveguide
d. Wireless
ANSWER: (a) Paired wires
40) Which rays exhibit the variation in the light acceptability ability of the fiber?
a. Meridional
b. Skew
c. Leaky
d. All of the above
ANSWER: (b) Skew
41) If a fiber operates at 1400nm with the diameter of about 10 μm, n1 = 1.30, Δ = 0.80% , V =
3.5, then how many modes will it have?
a. 6.125
b. 9.655
c. 12.95
d. 16.55
ANSWER: (a) 6.125
42) Which kind of dispersion phenomenon gives rise to pulse spreading in single mode fibers?
a. Intramodal
b. Intermodal
c. Material
d. Group Velocity
ANSWER: (a) Intramodal
43) With respect to single mode and graded index fibers, which parameter specifies the
propagation of polarization modes with different phase velocities & the difference between their
effective refractive indices?
a. Mode field diameter
b. Birefringence
c. Fiber beat length
d. Spot Size
ANSWER: (b) Birefringence
44) On which of the following factor/s do/does the „Hydrogen Effect‟ depend/s?
a. Type of fiber & Cable Design
b. Operating Wavelength
c. Installation Method
d. All of the above
ANSWER: (d) All of the above
45) Consider the statements given below. Which among them is not a drawback of double
crucible method?
a. Utility in mass production of fibers
b. High attenuation
c. High OH content in drawn fiber
d. Addition of impurity while the fiber is drawn
ANSWER: (a) Utility in mass production of fibers
46) Consider the assertions given below. Which is the correct sequential order of process
adopted in glass fiber preparation?
A. Drawing of fiber
B. Production of pure glass
C. Pulling of fiber
D. Conversion of pure glass into preform
a. B, D, A, C
b. A, B, C, D
c. C, A, D, B
d. D, B, A, C
ANSWER: (a) B, D, A, C
47) At which level of temperature does the oxidation process occur in MCVD?
a. Low
b. Moderate
c. High
d. Unpredictable
ANSWER: (c) High
48) Assuming no ISI, the maximum possible bandwidth of a multimode graded index fiber
with 5 MHz, shows the total pulse broadening of 0.1s for the distance of about 12km. What
would be the value of bandwidth length product?
a. 40 MHz
b. 60 MHz
c. 90 MHz
d. 120 MHz
ANSWER: (b) 60 MHz
49) In Rayleigh scattering of light in glass, at which type of temperature does the glass attain
the state of thermal equilibrium and exhibits its relativity to annealing temperature?
a. Junction
b. Fictive
c. Breakdown
d. Decomposition
ANSWER: (b) Fictive
50) Which type of scattering occurs due to interaction of light in a medium with time
dependent optical density variations thereby resulting into the change of energy (frequency) &
path?
a. Stimulated Brilliouin Scattering (SBS)
b. Stimulated Raman Scattering (SRS)
c. Mie Scattering
d. Rayleigh Scattering
ANSWER: (a) Stimulated Brilliouin Scattering (SBS)
https://electronicspost.com/multiple-choice-questions-and-answers-on-optical-fiber-
communicationpart-1/
Part-2
1) The macroscopic bending losses show an exponential increase due to in radius of
curvature.
a. Increase
b. Decrease
c. Stability
d. None of the above
ANSWER: (b) Decrease
2) Which type of mechanical splicing exhibits the permanent bonding of prepared fiber ends
with the rigid alignment of the tube?
a. Snug Tube Splicing
b. Loose Tube Splicing
c. Elastomeric Splicing
d. Precision Pin Splicing
ANSWER: (a) Snug Tube Splicing
3) Which component of fiber-optic connector has a provision of entry for the fiber along with
the fixation to connector housing?
a. Ferrule
b. Cable
c. Connector Housing
d. Coupling Device
ANSWER: (b) Cable
4) Which among the following is regarded as a keyed bayonet connector along with its
feasibility of easiest insertion and removal from the fiber optic cable?
a. FC Connectors
b. LC Connectors
c. MT-RJ Connectors
d. ST Connectors
ANSWER: (d) ST Connectors
5) How many mating cycles are being rated by typically matched SC Connectors?
a. 500
b. 600
c. 800
d. 1000
ANSWER: (d) 1000
6) In Stimulated Emission, which among the following parameters of generated photon is/are
similar to the photon of incident wave?
a. Phase
b. Frequency
c. Polarization & direction of travel
d. All of the above
ANSWER: (d) All of the above
7) Consider a crystal of ruby laser whose length is 6 cm and the refractive index is 1.8, emits
the wavelength of about 0.55 μm. What will be the value of number of longitudinal modes?
a. 3.9 x 105
b. 4.9 x 105
c. 5.6 x 105
d. 7.7 x 105
ANSWER: (a) 3.9 x 105
8) In a laser structure, the existence of standing waves is possible at frequencies for which the
distance between the mirrors is an integral number of
a. λ / 2
b. λ / 4
c. λ / 6
d. λ / 8
ANSWER: (a) λ / 2
9) The small section of fiber which is coupled to the optical source is known as
a. Flylead
b. Pigtail
c. Both a and b
d. None of the above
ANSWER: (c) Both a and b
10) In Lambertian output pattern of LED, the source is bright from all directions.
a. Less
b. Equally
c. More
d. Unpredictably
ANSWER: (b) Equally
12) Which type of preamplifier plays a crucial role in reducing the effect of thermal noise?
a. Low Impedance Pre-amplifier
b. High Impedance Preamplifier
c. Transimpedance Preamplifier
d. None of the above
ANSWER: (b) High Impedance Preamplifier
13) In high impedance preamplifier, how are the noise sources kept to minimum level?
a. By reducing dark current with proper selection of photodiode
b. By reducing thermal noise of biasing resistor
c. By using high impedance amplifier
d. All of the above
ANSWER: (d) All of the above
14) Which among the following are the disadvantages of an optical feedback transimpedance
receiver?
A. Increase in receiver input capacitance
B. Increase in dark current
C. Decrease in receiver input capacitance
D. Decrease in dark current
a. A & B
b. C & D
c. A & D
d. B & C
ANSWER: (a) A & B
15) Which category/ies of wavelength division multiplexer comprise/s two 3dB couplers where
the splitting of an incident beam takes place into two fiber paths, followed by the recombination
with second 3-dB coupler?
a. Interference filter based devices
b. Angular dispersion based devices
c. Mach-Zehnder Interferometers
d. All of the above
ANSWER: (c) Mach-Zehnder Interferometers
16) Which among the following controls the length of Fabry-Perot interferometer so that it can
act as a tunable optical filter?
a. Transducer
b. Tachometer
c. Multimeter
d. Phase-meter
ANSWER: (a) Transducer
18) Which among the following is/are responsible for generating attenuation of an optical
power in fiber?
a. Absorption
b. Scattering
c. Waveguide effect
d. All of the above
ANSWER: (d) All of the above
19) Consider the assertions/ characteristics given below. Which type of attenuation
measurement technique exhibits these characteristics?
1. Necessity of accessing both ends of fiber.
2. Measurements corresponding to specific wavelengths.
3. Requirement of spectral response over a range of wavelengths.
a. Cutback Technique
b. Insertion Loss Technique
c. Use of OTDR Technique
d. None of the above
ANSWER: (a) Cutback Technique
20) For neglecting the pulse dispersion in the digital systems, the rms width of fiber impulse
response must be one-quarter of the pulse spacing.
a. Less than
b. Equal to
c. Greater than
d. None of the above
ANSWER: (a) Less than
21) If a noisy channel has a bandwidth of 4 MHz with signal to noise ratio of about 1, what
would be the maximum capacity of the channel?
a. 2 Mb/sec
b. 4 Mb/sec
c. 6 Mb/sec
d. 8 Mb/sec
ANSWER: (b) 4 Mb/sec
22) In the structure of fiber optic cable, the refractive index of core is always the
refractive index of cladding.
a. Less than
b. Equal to
c. Greater than
d. None of the above
ANSWER: (c) Greater than
23) The order of mode is equal to the number of field across the guide.
a. Zeros
b. Poles
c. Ones
d. All of the above
ANSWER: (a) Zeros
24) Which among the following represents the lateral shift of a light beam on reflection at a
dielectric interface?
a. Doppler’s Shift
b. Goos-Haenchen’s Shift
c. Frequency Shift
d. Phase Shift
ANSWER: (b) Goos-Haenchen‟s Shift
25) Why are plastic clad silica fiber optic cables not used widely?
a. Difficulty in connector application due to excessive plasticity in cladding
b. Difficulty in bonding
c. Insolubility in organic solvents
d. All of the above
ANSWER: (d) All of the above
26) In cables, water is prevented from filling the spaces with resistant compounds.
a. moisture
b. pressure
c. temperature
d. stress
ANSWER: (a) moisture
27) Which reason/s is/are responsible for the occurrence of non-linear Cross Phase Modulation
(XPM)?
a. Difference in transmission phase of peak pulse & leading or trailing edges of pulse
b. Third-order optical non-linearity
c. Intensity dependence of refractive index
d. All of the above
ANSWER: (c) Intensity dependence of refractive index
28) What is/ are the consequence/s of Self Phase Modulation in non-linear optics?
a. Modification in pulse spectrum
b. Limited transmission rate
c. Dispersion effect
d. All of the above
ANSWER: (d) All of the above
29) Which type of fiber-optic coupler causes the distribution of an optical power from more
than two input ports among the several output ports?
a. Star Coupler
b. Tree Coupler
c. X Coupler
d. All of the above
ANSWER: (a) Star Coupler
30) Which optical devices are adopted or applicable for routing signals from one waveguide to
another?
a. Optical Combiner
b. Optical Splitter
c. Optical Coupler
d. None of the above
ANSWER: (c) Optical Coupler
31) Which among the following characteristics of Laser light specifies the precise movement of
all individual light waves together through time and space?
a. Monochromatic
b. Directional
c. Coherent
d. Brightness
ANSWER: (c) Coherent
32) Which modes are acknowledged due to their association with electromagnetic field and
beam profile in the direction perpendicular to the plane of pn junction?
a. Longitudinal Modes
b. Transverse Modes
c. Lateral Modes
d. All of the above
ANSWER: (b) Transverse Modes
33) Which type of injection laser involves the use of geometry for fabrication of the multimode
injection laser with a single or small number of lateral modes?
a. Gain guided laser
b. Index guided laser
c. Quantum well laser
d. Quantum dot laser
ANSWER: (a) Gain guided laser
34) In the dynamic response of Injection Laser Diode (ILD), the delay which is followed by
frequency damped oscillations give rise to the generation of relaxation oscillations.
a. Low
b. Medium
c. High
d. All of the above
ANSWER: (c) High
35) The spectral response of an ideal photodetector depicts its efficiency as a function of
a. amplitude
b. frequency
c. period
d. wavelength
ANSWER: (d) wavelength
36) According to frequency response of photo-detector, the modulation frequency at which the
output current decreases to of peak value.
a. one-third
b. one-fourth
c. half
d. one-tenth
ANSWER: (c) half
37) Which photodiodes are crucially applicable to overcome the bandwidth-quantum efficiency
trade-off along with its resemblence to the pyramid structure?
a. Mushroom Waveguide Photodiode
b. Traveling Wave Photodiode
c. Resonant Cavity Photodiode
d. All of the above
ANSWER: (a) Mushroom Waveguide Photodiode
38) When an optical signal is incident on a photo-detector, which noise originate/s due to
statistical nature of production and collection of photoelectrons?
a. Dark Current Noise
b. Quantum Noise
c. Surface Leakage Current noise
d. All of the above
ANSWER: (b) Quantum Noise
39) In an eye-diagram, digital signals with very bad interference resembles the shape of
a. circle
b. rectangle
c. triangle
d. straight line
ANSWER:(d) straight line
41) Which nature of charge carriers give rise to the current fluctuations thereby resulting into
the generation of shot noise?
a. Continuous
b. Discrete
c. Sampled
d. All of the above
ANSWER: (b) Discrete
42) Which among the following parameters is/are decided by the front-end of a receiver?
a. Sensitivity
b. Bandwidth
c. Both a and b
d. None of the above
ANSWER: (c) Both a and b
43) In an optical network, increase in the number of lasers the bit rate.
a. Increases
b. Stabilizes
c. Decreases
d. None of the above
ANSWER: (a) Increases
44) Which band/s specify/ies the operation range of Erbium doped fiber amplifier (EDFA)?
a. By O band
b. By C band
c. By S band
d. All of the above
ANSWER: (b) By C band
45) Basically, solitons are pulses which propagates through the fiber without showing any
variation in
a. Amplitude
b. Velocity
c. Shape
d. All of the above
ANSWER: (d) All of the above
46) Why is an electrical isolation required between several portions of an electronic circuit?
a. Provision of high voltage protection
b. Reduction in noise level
c. Both a & b
d. None of the above
ANSWER: (c) Both a & b
47) For measuring the shape of input pulse in time-domain intermodal dispersion method, the
test fiber is replaced by another fiber whose length is less than of the test fiber.
a. 1%
b. 5%
c. 10%
d. 20%
ANSWER: (a) 1%
48) In chromatic dispersion, which parameter for the modulation of the received signal is
measured with the help of a vector voltmeter?
a. Amplitude
b. Frequency
c. Phase
d. Period
ANSWER: (c) Phase
49) Which among the following stages is/are adopted in Splice Loss Experiment?
a. Translational
b. Rotational
c. Both a and b
d. None of the above
ANSWER: (c) Both a and b
50) Which among the following misalignments give/gives rise to the occurrence of splice loss?
a. Longitudinal separation between the end-faces of fiber
b. Angular tilt between fiber ends
c. Transverse offset between fiber ends
d. All of the above
ANSWER: (d) All of the above
https://electronicspost.com/multiple-choice-questions-and-answers-on-optical-fiber-
communicationpart-2/
Satellite Communication
Q1. Satellite engine uses …………
a. Jet propulsion
b. Ion propulsion system
c. Liquid fuel
d. Solar jet
Answer : b
Q2. The earth area covered by a satellite radio beam is known as ……..
a. Beam width
b. Band width
c. Footprint
d. Zone
Answer : c
Q5. To make antenna more directional, either its size must be increased or
a. the number of its feed horns must be increased
b.the frequency of its transmission must be increased
c. its effective isotropic radiated power (EIRP) must be increased
d. its footprint must be increased
Answer : b
Q6. India‟s first domestic geostationary satellite 1NSAT-IA was launched on 10th April 1982
from
a. USSR
b.USA
c. UK
d. UP
Answer : b
Q7. Satellite launch sites are invariably located on Eastern seaboards to ensure that
a. launch takes place eastward
b. expenditure of propulsion fuel is reduced during plane changing
c. the satellite achieves circular orbit quickly
d. spent rocket motor and other launcher debris falls into the sea
Answer : d
Q8. The owner of a communication satellite is usually required to keep the spacecraft on station
at its assigned place in the geosynchronous orbit with an accuracy of degree.
a. 0.1
b. 1.0
c. 2.0
d. 0.5
Answer : a
Q9. The number of days when Earth‟s shadow falls on a geosynchronous satellite is
a. 88
b. 277
c. 5
d. 10
Answer : a
Q10. A satellite signal transmitted from a satellite transponder to earth‟s station is ……….
a. Uplink
b. Downlink
c. Terrestrial
d. Earthbound
Answer : b
Q15. ………….is a loss of power of a satellite downlink signal due to earth‟s atmosphere.
a. Atmospheric loss
b. Path loss
c. Radiation loss
d. RFI
Answer : b
Q17. As the height of a satellite orbit gets lower, the speed of the satellite ……………
a. Increases
b. Decreases
c. Remains the same
d. None of the above
Answer : a
Q18. A satellite beam that covers almost 42.4% of the earth‟s surface is called ……………
a. Zone beam
b. Hemispheric beam
c. Spot beam
d. Global beam
Answer : d
Q21. The INTELSAT-IV satellite launched in 1974 had two earth coverage antenna and two
narrower-angle antennas subtending 4.5°. The signal from narrow-angle antenna was stronger
than that from earth- coverage antenna by a factor of ……………
a. 17.34/4.5
b. 17.34/4.5
c. (17.34/4.5)2
d. (17.34/4.5)4
Answer : c
Q24. A 20 m antenna gives a certain uplink gain at frequencies of 4/6 GHz. For getting same
gain in the 20/30 GHz band, antenna size required is ..............metre.
a. 100
b. 4
c. 1
d. 10
Answer : b
Q25. Of the four INSAT-I satellites planned by India so for, only ..................... has proved to be
successful.
a. INSAT-IA
b. INSAT-IB
c. INSAT-IC
d. INSAT-ID
Answer : b
Q27. As compared to 17.34° antenna, the total increase in the signal relayed by 4.5° antenna of
INTELSAT-IV is ……….
a. 14.85
b. 220
c. 78
d. 3.85
Answer : b
Q31. The useful operational life of INSAT-IB (launched in 1983) is expected to end by
a. 1992-93
b. 1991-92
c. 1989-90
d. 1993-94
Answer : c
Q32. At present, the radio-frequency band mainly used by most satellites is ……….
a. EHF
b. UHF
c. VHF
d. SHF
Answer : d
Q38. Power received from Sun per m2 surface area of a geosynchronous satellite in
nearly................. watt.
a. 100
b. 500
c. 2000
d. 1000
Answer : d
Q39. A certain sound has 10000 times more energy than another sound. The number of times it
would sound stronger to a listener is
a. 40
b. 10000
c. 100
d. 10
Answer : a
Q42. What kind of battery panels are used in some advance satellites?
a. Germanium based panels
b. Silicon based panel
c. Galium Phosphate solar panel array
d. Galium Arsenide solar panel array
Answer : d
Q43. What is the local oscillator (mixer) frequency of the satellite with an uplink frequency in
GHz band?
a. 3500 MHz
b. 4500 MHz
c. 2225 MHz
d. 2555 MHz
Answer : c
Q44. How many satellite orbital slots are requested by the Philippine Government from ITU ?
a. 2
b. 4
c. 6
d. 8
Answer : c
Q45. The switching from one element to the other element in a typical mobile satellite array.
a. Series
b. Radial
c. Matrix
d. Shunt
Answer : d
Q46. What circuit is responsible in activating and deactivating adjacent antenna elements in a
mobile satellite array ?
a. Radial divider
b. Divider/combiner
c. Radial combiner
d. Radial multiplexer
Answer : a
Q48. ................... is an artificial body that is projected from earth to orbit either earth (or)
another body of solar systems.
a. Satellite
b. moon
c. sun
d. none of the above
Answer : a
Q49. .................. is defined as the use of orbiting satellites to receive, amplify and retransmit data
to earth stations.
a. Optical communication
b. Digital communication
c. Analog communication
d. Satellite communication
Answer : d
Q50. .................. law states that the path followed by the satellite around the primary will be an
ellipse.
a. Newton’s 1st law
b. kepler’s first law
c. kepler’s second law
d. kepler’s third law
Answer : b
Q51. Which law states that for equal time intervals, the satellite will sweep out equal areas in its
orbital plane, focused at the barycenter.
a. Newton’s 1st law
b. kepler’s first law
c. kepler’s second law
d. kepler’s third law
Answer : c
Q52. Which law states that the square of the periodic time of orbit is perpendicular to the cube
of the mean distance between the two bodies. A3 = 3/n2
a. Newton’s 1st law
b. kepler’s first law
c. kepler’s second law
d. kepler’s third law
Answer : d
Q57. A satellite downlink at 12 GHz operates with a transmit power of 6 W and an antenna gain
of 48.2 dB. Calculate the EIRP in dBW.
a. 45 dBW
b. 50 dBW
c. 75 dBW
d. 56 dBW
Answer : d
Q58. The range between a ground station and a satellite is 42000 km. Calculate the free space
loss a frequency of 6 GHz.
a. 100 dB
b. 150 dB
c. 175dB
d. 200.4dB
Answer : d
Q59. The flux density required at the receiving antenna to produce saturation of TWTA is
known as ……….
a. Electric flux density
b. Magnetic flux density
c. Saturation flux density
d. Photon flux density
Answer : c
Q61. In some phase detection systems, the phase detector must be allowed for some time to
recover from one burst before the next burst is receiving by it. This waiting time is known as
…………
a. Preamble
b. Guard time
c. Frame efficiency
d. Decoding quenching
Answer : d
Q62. .................. is a measure of the fraction of frame time which is used for the transmission of
traffic.
a. . Preamble
b. Guard time
c. Frame efficiency
d. Decoding quenching
Answer : c
Q64. Which of the following comes under methods of multiple access techniques?
a. FDMA & TDMA
b. SCPC & CDMA
c. CDMA & GSM
d. none of these
Answer : a
Q66. For satellite communication, standard Earth stations have antenna diameters in the range
of ................... metre.
a. 27.5 to 30
b. 10 to 15
c. 30 to 50
d. 5 to 10
Answer : a
Q68. The ending part of the popular teleserial Mahabharat will be beamed to the viewers
a. WESTAT
b. INSAT-IC
c. ARABSAT
d. INSAT-ID
Answer : c
Q70. While keeping the down-link frequency constant, the diameter of a satellite antenna is
reduced by half. To offer the same EIRP over the increased coverage area, the RF output power
has to be increases by a factor of ………..
a. 2
b. 4
c. 8
d. 16
Answer : b
Q71. The Sun blots out the transmission of a geosynchronous satellite twice a year when satellite
passes directly in front of it. This outage lasts for about
a. 10 minutes on 5 consecutive days
b. 5 minutes on 10 consecutive days
c. 30 minutes for 5 consecutive days
d. one hour for 5 consecutive days
Answer : a
Q72. In satellite communication, frequency modulation is used because satellite channel has
a. small bandwidth and negligible noise
b. large bandwidth and severe noise
c. maximum bandwidth and minimum noise
d. high modulation index
Answer : b
Q73. Which of the following factor does NOT contribute to the drift of a geostationary satellite
from its stationary position in space?
a. Pressure of solar radiations
b. Gravitational changes due to Sun and Moon
c. Oblateness of the Earth
d. Weight of the satellite
Answer : d
Q74. In communication satellites, the up-link normally operates at a higher frequency than the
down-link because it
a. gives a narrow beam shining into space
b. results in lesser signal attenuation
c. gives better beam-shaping
d. is easier to polarize a high frequency beam
Answer : a
Q77. Assuming earth to be a sphere of radius 6400 km and height of a geosynchronous satellite
above Earth as 36000 km, the velocity of a geosynchronous satellite is km/hr.
a. 28000
b. 15000
c. 36000
d. 11100
Answer : d
Q78. In the context of error detection in satellite transmission, ARQ stands for ……………
a. Automatic Repeat Request
b. Automatic Relay Request
c. Accelerated Recovery Request
d. Automatic Radiation Quenching
Answer : a
Q79. To cover all inhabited regions of the Earth, the number of geosynchronous communication
satellites required
a. 5
b. 3
c. 10
d. 2
Answer : b
Q80. Depending on the technique used, digitized television requires a bit rate between
millions.
a. 40 and 92.5
b. 25 and 60
c. 30 and 82.5
d. 2
Answer : a
Q83. India‟s Polar Satellite Launch vehicle (PSLV) to be ready in 1991 is designed to launch
1000 kg spacecraft into orbit.
a. geostationary
b. equatorial
c. polar
d. sun-synchronous polar
Answer : d
Q84. Most of the communication satellites are stationed to the West of their service areas in
order to reduce their ………..
a. eclipse period
b. loss of power
c. battery power provision
d. mass of station-keeping fuel
Answer : c
Q85. The degradation of satellite solar cells with time is mainly due to
a. their bombardment by electrons
b. collection of meteoric dust
c. increase in resistivity of silicon
d. gradual leakage of charge carriers from the semiconductor material
Answer : a
Q86. The echo heard by a telephone user on a satellite channel can be removed by using
a. a vocoder
b. a multiplexer
c. echo suppressor
d. digital techniques
Answer : c
Q87. The 1150 kg geosynchronous satellite INSAT-IA parked 36000 km above India had greatly
improved India‟s
a. intelligence gathering capacity
b. domestic communications
c. meteorological capability
d. both (b) and (c)
Answer : d
Q88. Presently, the worlds‟s largest and most advanced multi-purpose communication satellite
is ……………
a. INSAT-2
b. Intelsat-V
c. INSAT-ID
d. Olympus-I
Answer : d
Q89. A satellite link uses different frequencies for receiving and transmitting in order to ……..
a. avoid interference from terrestrial microwave links
b. avoid interference between its powerful transmitted signal and weak in coming signal
c. minimise free-space losses
d. maximise antenna gain
Answer : b
Q91. Master control facility (MCF) for INSAT-2 series satellites is located at …………..
a. Madras
b. New Delhi
c. Leh
d. Hassan
Answer : d
Q92. The communication satellite INSAT-IB had to take up the job of INSAT-IA because the
latter collapsed within ..................... months of its launch.
a. 12
b. 20
c. 5
d. 36
Answer : c
Q93. The distance of a synchronous satellite from Earth‟s surface is ................... km.
a. 300
b. 10000
c.35900
d. 5
Answer : c
Q94. The traffic-handling capacity of an Earth station on the uplink depends on …………
a. its EIRP
b. satellite antenna gain
c. noise associated with the satellite
d. all of the above
Answer : d
Q97. Geosynchronous satellites are always launched in the equatorial plane because it is the
only plane which provides
a. 24-hour orbit
b. stationary satellite
c. global communication
d. zero-gravity environs
Answer : c
Q98. A few minutes disturbance in space communications occurs twice a year during
Sunblinding when are in line.
a. Sun and satellite
b. Sun and Earth station
c. Satellite and Earth station
d. Sun, satellite and Earth station
Answer : d
Q99. After the death of INSAT-IB, the mainstay of the entire Indian satellite network for some
time to come would be
a. INSTELSAT-V
b. INSAT-ID
c. INSAT-2
d. ARABSAT
Answer : d
Q100. For satellite transmission, analog signals may be converted into digital form with the help
of ……………..
a. modem
b. transponder
c. codec
d. compandor
Answer : c
Q105. The average noise temperature of Earth, as viewed from space, is .............. °K
a. 254
b. 303
c. 100
d. 500
Answer : a
Q106. Low-orbit satellites are not used for communications because they
a. produce sonic booms
b. do not provide 24 hour/ day contact to the users on Earth
c. heat up and melt
d. none
Answer : c
BHARATI VIDYAPEETH INSTITUTE OF TECHNOLOGY
QUESTION BANK
--------------------------------------------------------------------------------------------------
2. What are the three general categories of computer systems that can contain digital
evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related
crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This
is an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those
involved with _______ should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above
Ans:
15. An argument for including computer forensic training computer security specialists is:
A. It provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above.
Ans: C
16. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the ___________
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
21. The evidence must be usable in the court which is called as_______
A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a
a type of _____________
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as ____________
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
30.The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as___________
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31.When cases got to trial your forensics examiner play one of ____ role.
A. 2
B. 4
C. 3
D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
---------------------------------------------------------------------------------------------------------------------
True or False Questions
1. Digital evidence is only useful in a court of law.
A. True
B. False
Ans: B
2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
--------------------------------------------------------------------------------------------------------------------
4. Ethical hacking will allow to____ all the massive security breaches.
A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
15._______ is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23.______ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24.Connecting into network through a rogue modem attached to computer behind a firewall is an
example of ____-
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25.______ comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32.Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
35. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad
Ans. D
36. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C
37. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
--------------------------------------------------------------------------------------------------------------------
2. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
6. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. _________is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
15. What are the some of the most common vulnerabilities that exist in a network system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
17. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called ________.
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
30. ______________ framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
31.__________ is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32.________ is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 _____ is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. ______is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50.In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52.We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest ______and______.
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53.Network consist devices such as routers, firewalls, hosts that you must assess as a part of
______ process.
A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55.____ attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
64.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Ans:B
2. Weak AI is
a. artificial science
b. heuristic processing
c. human intelligence
d. cognitive science
Ans: d) cognitive science
a. Fisher Ada
b. John McCarthy
c. Allen Newell
d. Alan Turning
Ans: b) John McCarthy
a. Bluetooth
b. UART
c. WIFI
d. HTTP
Ans:d) HTTP
5. Machine learning is
a. The selective acquisition of knowledge through the use of manual programs
b. The autonomous acquisition of knowledge through the use of manual programs
c. The selective acquisition of knowledge through the use of computer programs
d. The autonomous acquisition of knowledge through the use of computer programs
Ans: d) The autonomous acquisition of knowledge through the use of computer programs
6. HTTP resources are located by
a. unique resource locator
b. unique resource identifier
c. none of the mentioned
d. uniform resource identifier
Ans: d) uniform resource identifier
7. MQTT is:
a. Based on client-server architecture
b. Based on publish-subscribe architecture
c. Based on both of the above
d. Based on none of the above
Ans: b) Based on publish-subscribe architecture
8. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a. ALOHA
b. CSMA/CA
c. CDMA
d. none of the mentioned
Ans: b) CSMA/CA
Ans: d) G.Palmar
4. Who proposed Extended Model of Cybercrime Investigation
a) G.Gunsh
b) S.Ciardhuain
c) J.Korn
d) G.Palmar
Ans: b) S.Ciardhuain
5. Digital forensics is all of them except
a) Extraction of computer data
b) Preservation of computer data
c) Interpretation of computer data
d) Manipulation of computer data
Ans:
6. Investigator should satisfy the following point
a) Contribute to the society and human being
b) Avoid harm to others
c) Honest and trustworthy
d) All of the above
Ans: a) True
8. Who proposed Abstract Digital Forensic Model
a) G.Gunsh
b) S.Ciardhuain
c) Kohn , Eloff
d) G.Palmar
Ans: G.Gunsh
9. International Organization on Compter Evidence was formed in
a) 1980
b) 1995
c) 1997
d) 1998
Ans: b) 1995
10. Abstract Digital Forensic model in
a) 2000
b) 2001
c) 2002
d) 2003
Ans: c) 2002
Unit-4: Digital Evidences
Ans: b) False
3. In terms of digital evidence the Internet is an example of
a) Open computer systems
b) Communication systems
c) Embedded computer system
d) None of the above
Ans:
6. Which of the following is not a type of volatile evidence
a) Routing Tables
b) Main Memory
c) Log files
d) Cached Data
Ans: a) Hyderabad
10. The major forensic categories of devices where evidence can be found:
a) Internet-based
b) Stand-alone computers
c) Mobile devices
d) All of the above
Ans: a) hackers
2. Ethical hacking is also known as
a) Black hat hacking
b) White hat hacking
c) Encrypting
d) None of these
Ans: b) Weakness
6. Cracker is known as
a) Black hat
b) White hat
c) Encrypting
d) None of these
Ans: b) NetStumbler
8. It is powered by ______ encryption tools
a) WEP WPA & WPA2
b) WEP
c) WPA
d) None of these
Ans: b) 443
10. What is the attack called “evil twin”
a) Rogue access point
b) ARP poisoning
c) Session hijacking
d) MAC spoofing
1. Which of the following tools is used for Networks Testing and port Scanning
a) NetCat
b) SuperScan
c) NetScan
d) All of Above
Ans: b) 53
4. What port number does HTTP use
a) 53
b) 69
c) 80
d) 79
Ans: c) 80
5. An email bomb is also known as a ___
a) Letter bomb
b) Internet
c) Banner
d) Attack
Ans: a) XSS
8. Banner grabbing is often used for
a) White hat hacking
b) Black hat hacking
c) Gray hat hacking
d) Scepit Kiddies
Ans: b) SuperScan
10. SNMP port is
a) 37
b) 53
c) 111
d) 161
Ans: d) 161
MCQ’s Question and Answers (the answers are highlighted in bold)
Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.
Q16 The Digital evidence are used to established a credible link between……….
A)Attacker and victim and the crime scene B)Attacker And information
Q17 The evidence and proof that can be obtained from the electronic source is called the…….
A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned
A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Q22 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:
Q24 Who are use their skill to identify security problem with computer network
A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Q25 To crack the password you need cracking tool such as:
A)Information
Q32 Which of the following used for the Network Testing and port scanning
Q33 The whole email server may be targeted for a complete interruption of services with these failure
like
Q34 Which is the top most directory in the server file system
A)Root Directory
A)LINUX
A)Ethereal
Q40 An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment
a. SIMD
b. STUDENT
c. SHRDLU
d. BACON
d.Playing a Game
3. Who is the “father” of artificial intelligence?
a.John McCarthy
b. Fisher Ada
c. Allen Newell
d.Alan Turning
4.Which of the following is a proposed means of testing the intelligence of the machine?
a.Turing Test
b.Turning Test
c.Tuning Test
d.None
a.Control System
b.Associative Memory
c.Primary Memory
d.Secondary Memory
a. seven
b. Two
c.three player
d. Multiplayer
a. Validity
b.Satisfiability
c. Logical equivalence
d.All of these
8.Single inference rule also called…
a. Resolution
b. Reference
c.Reference
d.None of these
9.Factoring means…
2. What are the three general categories of computer systems that can contain digital
evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
10. Private networks can be a richer source of evidence than the Internet because:
a. They retain data for longer periods of time.
b. Owners of private networks are more cooperative with law enforcement.
c. Private networks contain a higher concentration of digital evidence.
d. All of the above.
Question 1. Which of the following statements best describes a white-hat hacker?
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Answer 1. Option A.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer 2. Option C..
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer 3. Option D.
Question 4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
Answer 4. Option D
Question 5. The security, functionality, and ease of use triangle illustrates which
concept?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer 6. Option A.
Question 7. What are the three phases of a security evaluation plan? (Choose
three answers.)
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer 8. Option B.
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer 9. Option B.
Question 10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Answer 10. Option A.
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
Answer: b
2. Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
Answer: c
3. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber
crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
Answer: d
4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
Answer: a
5. The amateur or newbie in the field of hacking who don’t have many skills about coding and
in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer: c
7. Criminal minded individuals who work for terrorist organizations and steal information of
nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
Answer: c
8. One who disclose information to public of a company, organization, firm, government and
private agency and he/she is the member or employee of that organization; such individuals are
termed as ___________
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
Answer: d
9. These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
Answer: b
10. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
Answer: a
a. Logical reasoning
b. Common sense
c. Preconceived theory
d. Investigator’s intuition
4. A scientific truth attempts to identify roles that are universally true. Legal judgment, on
The other hand, has a standard of proof in criminal prosecutions of:
a. Balance of probabilities
b. Beyond a reasonable doubt
c. Acquittal
d. None of the above
a. Relevance
b. Authenticity
c. Best evidence
d. Nominally prejudicial
6. According to the text, the most common mistake that prevents evidence seized from
Being admitted is:
a. Uninformed consen
b. Forcible entry
c. Obtained without authorization
d. None of the above
7. In obtaining a warrant, an investigator must convince the judge on all of the following
Points except:
8. If, while searching a computer for evidence of a specific crime, evidence of a new,
Unrelated crime is discovered, the best course of action is:
a. Abandon the original search, and pursue the new line of investigation
b. Continue with the original search but also pursue the new inquiry
c. Stop the search and obtain a warrant that addresses the new inquiry
d. Continue with the original search, ignoring the new information
9. The process of documenting the seizure of digital evidence and, in particular, when that
Evidence changes hands, is known as:
a. Chain of custody
b. Field notes
c. Interim report
d. None of the above
10. Evidence contained in a document provided to prove that statements made in court are
True is referred to as:
a. Inadmissible evidence
b. Illegally obtained evidence
c. Hearsay evidence
d. Direct evidence
Chapter 5 Basics of Ethical hacking
1. What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
Answer: a
3. ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
Answer: a
7. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d
8. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
Answer: a
9. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c
10. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Chapter 5 Basics of Ethical hacking
1. What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
Answer: a
3. ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
Answer: a
7. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d
8. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
Answer: a
9. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c
10. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Chapter 6 Types of hackers
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Answer. Option A.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer. Option C.
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer. Option D.
Question 4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
Answer. Option D.
Question 5. The security, functionality, and ease of use triangle illustrates which
concept?
Question 6. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer. Option A.
Question 7. What are the three phases of a security evaluation plan? (Choose
three answers.)
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer. Option B.
Question 9. Which federal law is most commonly used to prosecute hackers?
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer. Option B.
Question 10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Answer. Option A.
Ans:D
Ans: A
3. Who proposed Road Map for Digital Forensic Research (RMDFR)
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____ question based
on available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document
opens and the application automatically runs); spread via email
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989
Ans: B
A.1960's
B.1970's
C.1980's
D.1990's
Ans: C
10. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
10 MCQs from Each Chapter of Emerging Trend in Computer Science
----------------------------------------------------------------------------------------------
Ans: C
(A) PROLOG
(B) Java
(C) LISP
(D) Perl
Ans: D
3. What is state space?
Ans: D
Ans: C
Ans: A
6.A heuristic is a way of trying
(B) To search and measure how far a node in a search tree seems to be
from a goal
(C) To compare two nodes in a search tree to see if one is better than
the other
Ans: D
7. A* algorithm is based on
Ans: C
Ans: B
Ans: A
10. Which is not a property of representation of knowledge?
Ans: A
Chapter-2 Internet of Things
----------------------------------------------------------------------------------------------
D. None of these
Ans: D
4. Which of the following is not an example of a “small-scale
embedded system”?
A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C
D. All of these
Ans: D
D. All of these
Ans: B
Ans: B
----------------------------------------------------------------------------------------------
5. In the past, the method for expressing an opinion has been to frame
a ____ question based on available factual evidence.
(A) Hypothetical
(B) Nested
(C) Challenging
(D) Contradictory
Ans: A
6. More subtle because you are not aware that you are running these
macros
7. There are three c's in computer forensics. Which is one of the three?
(A) Control
(B) Chance
(C) Chains
(D) Core
Ans: A
----------------------------------------------------------------------------------------------
Ans: C
evidence?
Ans: D
3. In terms of digital evidence, a hard drive is an example of:
B. Communication systems
Ans: A
B. Communication systems
Ans: C
B. Communication systems
Ans: C
6. In terms of digital evidence, the Internet is an example of:
B. Communication systems
Ans: B
C. Civil disputes
Ans: D
Ans: C
9. Cyber trails are advantageous because:
D. Offenders who are unaware of them leave behind more clues than
they otherwise
would have.
Ans: D
Ans: C
Chapter 5 Basics of Hacking (CO5)
----------------------------------------------------------------------------------------------
C. Encryption.
D. None of these.
Ans. B
A. Scanner
B. Decoder
C. Proxy
D. All of these.
Ans. D
A. Strengths.
B. Weakness.
C. A &B
D. None of these.
Ans. B
4. Ethical hacking will allow to____ all the massive security breaches.
A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
A. Maintaining Access.
B. Reconnaissance
C. Scanning.
D. Gaining Access.
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain access to
the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
Ans. A
Ans. B
Ans. A
9. Who described a dissertation on fundamentals of hacker’s attitude?
A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman.
Ans. B
A. Decade.
B. Year.
C. Century
D. Era.
Ans. C
Chapter-6 Types of Hacking (CO6)
-----------------------------------------------------------------------------------------------
Ans: C
2. Which of the following tool is used for Network Testing and port
Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
D. Script Kiddies
Ans: A
4. An attacker can create an________attack by sending hundreds or
thousands of e-mails a with
A. Connection Attack
Ans: B
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
A. Netcat
B. SamSpade
C. SuperScan
Ans: C
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks
Ans: B
9. Which Nmap scan is does not completely open a TCP connection?
B. TCP scan
D. ACK scan
Ans: A
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
Ans: A
MCQ EMERGING TRENDS
Chapter 1: - artificial inteligence
1) is a branch of science which deals with helping machine find solution to complex to
problem in a more human like a fashion.
(a) Artificial intelligence
(b) Internet of think
(c) Embided system
(d) Cyber security
2) Is a message that consist relavat meaning , implication , or input for decision and or
action.
(a) Data
(b) Information
(c) Knowledge
(d) Intelligence
3) The goal is for the software to use what is it is was learned in one area to solve
problem in other area.
(a) Machine learning
(b) Deep learning
(c) Neural network
(d) All of above
4) the consist of computer program that mimic the way the human brain process
information.
(a) Machine learning
(b) Deep learning
(c) Neural learning
(d) All of this
5) A heuristic is a rule of thumb-------
(a) Strategy
(b) Trick
(c) Simplification
(d) All of above
7) Is branch of science that deals with programming the system in such that they
automatically learn with experience
(a) Machine learning
(b) Deep earning
(c) Neural learning
(d) All of above
9) The characteristic of the computer system cable of thinking, reasoning and learning is
know as
(a) Machine intelligence
(b) Human intelligence
(c) Artificial intelligence
(d) Virtual intelligence
7. By clicking which key the PubNub will display public, subscribe, and secret
keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
8. The messageChannel class declares the _________ class attribute that defines
the key string.
a) command_key
b) command-key
c) commandkey
d) Key_command
10. _________ and _________ saves the publish and subscribe keys that we have
generated with the PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe
7) The evidences of proof that can be obtained from the electricity source is
called the
(a) Digital evidence
(b) Demonstrative evidence
(c) Explainable evidence
(d) Substantial evidence
5) What are the three general categories of computer system that can
contain digital evidence
(a) Desktop ,laptop ,server
(b) Personal computer
(c) Hardware, software
(d) Open computer system
3). ___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
4). Leaking your company data to the outside network without prior permission of
senior authority is a crime.
a) True
b) False
5). _____________ is the technique used in business organizations and firms to protect
IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach .
7). Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
8). An ethical hacker must ensure that proprietary information of the firm does
not get leaked.
a) True
b) False
9). After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
10). __________ is the branch of cyber security that deals with morality and
provides different theories and a principle regarding the view-points about what
is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
6) what type of ethical hack test access to the physical infra structure
(a) internal network
(b) remote network
(c) external network
(d) physical network
7) the security functinallity and ease of use triangle illustrated which concept
(a) a security increase, functionality and ease of use increase
(b) a security decrease, functionality and ease of use increase
(c) a security increase, functionality and ease of use decrease
(d) security does not affect functionality and ease of use
10) when a hackers attempt to attack a host via the internet is the know as
what type of attack
(a) remote attack
(b) local access
(c) internal attack
(d) physical access
Unit3. basics of digital forensics
1. What is Digital Forensic?
b. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
c. A process where we develop and test hypotheses that answer questions about digital
events
a. Authenticity
b. Comparison
c. Proving
d. Enhancement
4. Which of the following represents the step of scientific method?
I- Develop hypothesis based on evidence
II- Calculate hash value of evidence
III- Test the hypothesis to look for additional evidence
IV-make an imaging of the original evidence
a. I and IV
b. I and II
c. II, III and IV
d. All of above
5. What is the Primary Objectives of Digital Forensic for Business and Industry?
a. Availability of service
b. Prosecution
c. Continuity of operation
d. Security
6. Which of the following hold the highest value of evidence in the court?
a. Documentary
b. Demonstrative
c. Testimonial
d. Real
10. When you give ____ testimony, you present this evidence and explain what it is and how it
was obtained.
a. technical/scientific
b. expert
c. lay witness
d. deposition
Unit-4 Digital Evidences
1. A valid definition of digital evidence is:
a. Data stored or transmitted using a computer
b. Information of probative value
c. Digital data of probative value
d. Any digital evidence on a computer
2. What are the three general categories of computer systems that can contain digital evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
3. In terms of digital evidence, a hard drive is an example of:
a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above
a) MIT
b) Stanford University
c) California
d) Bell’s Lab
9. In which year, hacking became a practical crime and a matter of concern in the field of
technology?
a) 1971
b) 1973
c) 1970
d) 1974
10. When a hacker attempts to attack a host via the Internet it is known as what type of
attack?
a. Local access
b. Remote attack
c. Internal attack
d. Physical access
11. Which tool can be used to perform a DNS zone transfer on Windows?
a. DNSlookup
b. nslookup
c. whois
d. ipconfig
Unit-6 Types of Hacking
1. Why would a hacker use a proxy server?
a. To create a stronger connection with the target.
b. To create a ghost server on the network.
c. To obtain a remote access connection.
d. To hide malicious activity on the network.
2. A security audit performed on the internal network of an organization by the network
administration is also known as ___________.
a. Grey-box testing
b. Black-box testing
c. White-box testing
d. Active testing E. Passive testing
3. Which are the four regional Internet registries?
a. APNIC, PICNIC, NANIC, RIPE NCC
b. APNIC, MOSTNIC, ARIN, RIPE NCC
c. APNIC, PICNIC, NANIC, ARIN
d. APNIC, LACNIC, ARIN, RIPE NCC
4. Attempting to gain access to a network using an employee’s credentials is called the _____________
mode of ethical hacking.
a. Local networking
b. Social engineering
c. Physical entry
d. Remote networking
5. What tool can be used to perform SNMP enumeration?
a. DNSlookup
b. Whois
c. Nslookup
d. IP Network Browser
a. LDAP
b. TCP
c. SQL
d. HTTP
a. ICANN
b. ARIN
c. APNIC
d. DNS
MCQ Chapter 01
3) Which among this, is an AI created by IBM partner with Fluid PVT. Used specially for
‘Data Analysis?’
a) EVE AI
b) Watson
c) Siri
d) Novel AI
Ans: b) Watson
Ans: b) Languages of AI
5) The given illustrative diagram is related to which topic?
a) Machine Learning
b) Neural Network Processing
c) Reasoning
d) Deep learning
Ans: a) Machine Learning
8) These machines can use stored data for a limited time period only.
a) Reactive Machine
b) Self-Awareness
c) Limited machine
d) Theory of mind
Ans: c) Limited machine
MCQ Chapter 03
Digital Forensics is a series of steps to _________ and _________ electronic data through
________ method.
MCQ Chapter 04
Ans: a. It states that multiple copies of electronic files may be a part of the “original” or equivalent
to the “original.”
4. According to Locard’s Exchange Principle, contact between two items will result in an
_________.
a. War
b. Love
c. Exchange
d. Failure
Ans: c. Exchange
5. Which of the following is used to portray data more specifically and is helpful in determining
the background of digital evidence?
a. Data
b. Metadata
c. Cookies
d. History
Ans: b. Metadata
8. You must have both ____ and ____ to validate your evidence.
a. Proof and victim
b. Power and skill
c. Power and proof
d. Proof and skill
Ans: b. power and skill
2. A hacker who gains access to system with a view to fix the identified weaknesses is known as
a. White hat hackers
b. Grey hath hackers
c. Red hat hackers
d. Hacktivist
Ans: a. white hat hackers
a. Police
b. Victim
c. Thief
d. Hacker
Ans: c. Thief
5. Which type of hackers are invited by the software vendors to find the security flaws in their
system?
a. White hat hackers
b. Black hat hackers
c. Grey hat hackers
d. Blue hat hackers
Ans: d. Blue hat hackers
7. A non-skilled person who gains access to computer system using already made tools are
known as?
a. Grey hat hackers
b. Hacktivist
c. Script kiddies
d. Phreakers
Ans: c. Script kiddies
8. Identifying weakness in computer system or network to exploit its weaknesses to gain access
is known as
a. Cracking
b. Cybersecurity
c. Hacking
d. Threatening
Ans: c. Hacking
MCQ Chapter 06
1. Which of the following is not a network testing and port scanning tool?
a. Nmap
b. SuperScan
c. John the ripper
d. NetCat
Ans: c. John the Rippers
2. Select the most appropriate option for the below two statements.
6. Which attack allows the attacker to execute the scripts on the victim’s browser?
a. SSL attack
b. Cookie attack
c. Banner grabbing
d. XSS attack
Ans: d. XSS attack
8. As an ethical hacker, you should scan all ________ UDP and TCP port on each network host
that’s found by your scanner.
a. 65535
b. 65353
c. 65333
d. 65555
Ans: a. 65535
9. Which of the following are the foundation of all the technical security issues in your
information systems?
a. Network Infrastructure vulnerabilities
b. Information vulnerabilities
c. System Infrastructure vulnerabilities
d. Network Information vulnerabilities
Ans: a. Network infrastructure vulnerabilities
10. Which attack is an HTTP attack which allows attackers to access restricted directories and
execute commands outside the web servers root directory?
a. XSS attack
b. Path Traversal attack
c. MITM attack
d. SQL Injection attack
Ans: b. Path traversal Attack
a. a sensor
d.a network
2. Which command is used to test network connectivity and provide a response to each packet
received by the remote host?
a.test
b.tracer
c.ping
d.connect
3. What type of device could allow a refrigerator to place a replacement order for an item contained
within it?
a.digital network
b.generator
c.smart phone
d.sensor
4. True or False?
Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or
PC.
a.true
b.false
6. What is comprised of millions of smart devices and sensors connected to the internet?
a.the fog
d.the cloud
a.artificial intelligence
b.Packet Tracer
c.internet
d.PAN
8. True or False?
The Internet of Things will connect inanimate objects to the network with intelligent sensors.
a.true
b.false
9. Which type of network is used to connect a company located in one area of a city to another
location in a city far away?
a.LAN
b.PAN
c.MAN
d.WAN
10. Which type of computing is located at the edge of a business or corporate network and that allows
data from sensors to be preprocessed?
a.internet
b.fog
c.wireless
d.WAN
SIMD
STUDENT
SHRDLU
BACON
And:- SHRDLU
Education
Defense
Energy
Justice
And:- Defense.
John McCarthy
Fisher Ada
Allen Newell
Alan Turning
5. KEE is a product of
IntelliCorpn
Teknowledge
Texas Instruments
Tech knowledge
Ans:- IntelliCorpn .
Analogical reasoning
Bitonic reasoning
Non-monotonic reasoning
Monotonic reas
Ans:- Weak AI is the study of mental faculties through the use of mental models
implemented on a computer.
mobile
open loop
intelligent
non-servo
Ans:- intelligent .
9. One of the leading American robotics centers is the Robotics Institute located
at
RAND
MIT
CMU
SRI
And:- CMU
10. What is the name of the computer program that contains the distilled
knowledge of an expert?
setq
add
set
eva
Ans:- setq
13. Which is not the commonly used programming language for AI?
PROLOG
LISP
Perl
Java script
And:- Perl
14. Which is not a property of representation of knowledge?
Inferential Adequacy
Representational Adequacy
Representational Verification
Inferential Efficiency
1. When cases go to trial, you as a forensics examiner can play one of ____ roles.
a. 2 c. 4
b. 3 d.5
Ans:- 2
2. When you give ____ testimony, you present this evidence and explain what it is and how it
was obtained.
b. expert d. deposition
And:- technical/scientific.
3. Validate your tools and verify your evidence with ____ to ensure its integrity
4. For forensics specialists, keeping the ____ updated and complete is crucial to supporting
your role as an expert and showing that you’re constantly enhancing your skills through
training, teaching, and experience.
b. CV d. deposition
Ans:- CV
5. If your CV is more than ____ months old, you probably need to update it to reflect new
cases and additional training.
a. 2 c. 4
b. 3 d. 5
Ans:- 3
6. __ is a written list of objections to certain testimony or exhibits.
a. Defendant c. Plaintiff
b. rebuttal d. venireman
Ans:- strikes
8. ____ from both plaintiff and defense is an optional phase of the trial. Generally, it’s allowed
to cover an issue raised during cross-examination
Ans:- Rebuttal
9. If a microphone is present during your testimony, place it ____ to eight inches from you.
a. 3 c. 5
b. 4 d. 6
Ans:- 6
10. Jurors typically average just over ____ years of education and an eighth-grade reading
level. a. 9 c. 11
b. 10 d. 12
Ans:- 12
4. Digital Evidences
2. What are the three general categories of computer systems that can contain digital
evidence?
b. Communication systems
b. Communication systems
b. Communication systems
b. Communication systems
c. Civil disputes
d. Offenders who are unaware of them leave behind more clues than they otherwise would
have.
10. Private networks can be a richer source of evidence than the Internet because:
5. Basic of Hacking
AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above
3. what is the primary goal of an Ethical Hacker ?
Avoiding detection
Testing security controls
Resolving security vulnerabilities
Determining return on investment for security measures
Maintaining access
Gaining access
Reconnaissance
Scanning
Black-hat hackers
Grey-hat hackers
Script kiddies
Disgruntled employees
Hacktivism
Black-hat hacking
Active hacking
Activism
7. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
Local access
Remote attack
Internal attack
Physical access
8. Which are the four regional Internet registries?
A. Security professional
D. Malicious hacker
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
7. What are the three phases of a security evaluation plan? (Choose
three answers.)
B. Preparation
C. Conclusion
D. Final
E. Reconnaissance
F. Design Security
G. Vulnerability Assessment
Answer :- A, B, C.
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
9. Which federal law is most commonly used to prosecute hackers?
A. Title 12
B. Title 18
C. Title 20
D. Title 2
10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
MCQ’S
1. IOCE is …………………..?
a. Organization on computer evidence
b. Organization on communication evidence
c. Organization on country education
d. Organization on crime evidence
Ans : a)Organization on computer evidence
MCQ’S
a. Routing Table
b. Main memory
c. Log files
d. Cached Data
Ans : c) Log files
6. Investigation means :
a. Collection of information
b. A procedure to find the Digital Evidence
c. Searching over internet
d. Hacking computer systems
Ans : b) A procedure to find the Digital Evidence
7. The evidence or proof that can be obtained from the electronic source is called the ………
a. Digital evidence
b. Demonstrative evidence
c. Explainable evidence
d. Substantial evidence
Ans : a) Digital evidence
MCQ’S
1. What is hacking ?
a. Identifying weakness in computer system or networks
b. Refers to act of locating vulnerabilities
c. A security to your personal data
d. Protocols of corrupting data
Ans : a) Identifying weakness in computer system or networks
7. Which IEEE standards specify the technologies for wireless LANs 802.11
a. IEEE 802.11
b. IEEE 802.10
c. IEEE 279.6
d. IEEE 275.4
Ans : a) 802.11
Watson
Ans: b) Languages of AI
Ans: b) Three
7) The term “Strong” or “Super” AI comes under which ‘type’ of AI?
a) Type-1
b) Type-2
c) None of the above
d) All of the above
Ans: a) Type-1
8) These machines can use stored data for a limited time period only.
a) Reactive Machine
b) Self-Awareness
c) Limited machine
d) Theory of mind Ans: c)
Limited machine
Ans: d) Four
CHAPTER 2: Internet of Things
1) Raspbian is:
a) Assembler
b) Language
c) Compiler
d) OS
Ans:- d. OS
a) SigFox
b) WiFi
c) NB-oT
d) LoRa
Ans:- b. WiFi
3) Computer programs that mimic the way the human brain processes information is called as:-
a) Machine learning
b) Deep learning
c) Neural networks
Ans:- c. Neural
networks
4) is a branch of Science which deals with the helping machine find
solutions to complex problems in a more human like fashion
a. Artificial Intelligence
b. Internet Od Things
c. Embedded system
d. cyber Security
a. RSVP
b.TCP
c. DCCP
d. UDP
Ans:- d. UDP
a) Bluetooth
b) UART
c) WiFi
d) HTTP
Ans:- d. HTTP
8) IoT stands for:-
a) Internet of Technology
b) Intranet of Things
c) Internet of Things
d) Information of Things
Ans:- c. Internet of
Things
d) None of these
a. Connectivity
b. Self-configuring
c. Endpoint Management
d. Artificial Intelligence
Ans:- b. Self-configuring
CHAPTER 3: Basics of Digital Forensics
11. Which of the following sciences pay vital role in criminal justice systems ?
a. Digital Forensics
b. Forensic Science
c. PC Forensics
d. INTERPOL Forensic
Ans : b) Forensic Science
18. Who proposed the UML Modelling of Digital Forensic Process Model
a. Kohn, Eloff and Oliver
b. Response Team
c. Only (a)
d. None of the above
Ans : a) Kohn, Eloff and Oliver
13. How many steps are there the legality of ethical hacking ?
a. 5
b. 2
c. 7
d. 6
Ans : a) 5
17. Which IEEE standards specify the technologies for wireless LANs 802.11
a. IEEE 802.11
b. IEEE 802.10
c. IEEE 279.6
d. IEEE 275.4
Ans : a) 802.11
18. LINUX is an
a. Application
b. Software
c. Toolkit
d. Operating System
Ans : d) Operating System
Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.
Q12 In Computer intrusions the attacker will be leave multiple traces of there presence in:
Q16 The Digital evidence are used to established a credible link between……….
A)Attacker and victim and the crime scene B)Attacker And information
Q17 The evidence and proof that can be obtained from the electronic source is called the…….
A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned
A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Q22 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:
Q24 Who are use their skill to identify security problem with computer network
A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Q25 To crack the password you need cracking tool such as:
A)Information
Q32 Which of the following used for the Network Testing and port scanning
Q33 The whole email server may be targeted for a complete interruption of services with these failure
like
Q34 Which is the top most directory in the server file system
A)Root Directory
Q35 Which list is used in the authorization process
A)LINUX
A)Ethereal
Q40 An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
5. When a hacker attempts to attack a host via the Internet it is known as what
type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user
A. It increases security.
B. It makes security harder to enforce.
C. It removes the employee’s responsibility to make judgments.
D. It decreases security.
Chapter No 3 : Basics Of Digital Forensic
C. A process where we develop and test hypotheses that answer questions about
digital events
A. True
B. False
A. Authenticity
B. Comparison
C. Proving
D. Enhancement
4. Which of the following represents the step of scientific methodI- Develop hypothesis
based on evidenceII- Calculate hash value of evidenceIII- Test the hypothesis to look for
additional evidence IV-make an imaging of the original evidence
A. All above
B. I and III
C. II and IV
A. Availability of service
B. Continuity of operation
C. Prosecution
D. Security
6. Which of the following hold the highest value of evidence in the court?
A. Documentary
B. Demonstrative
C. Testimonial
D. Real
a.Defendant
c.Plaintiff
d.Motion in limine
9. Attorneys can now submit documents electronically in many courts; the standard format
in federal courts is ____.
d. Postscript (PS)
10. A(n) ____is a document that lets you know what questions to expect when you are
testifying.
a.written report
b.affidavit
c.examination plan
d.subpoena
evidence?
b. Communication systems
b. Communication systems
b. Communication systems
b. Communication systems
c. Civil disputes
d. Offenders who are unaware of them leave behind more clues than they otherwise
would have.
10. Private networks can be a richer source of evidence than the Internet because:
3. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
7. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
8. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False
9. After performing ____________ the ethical hacker should never disclose client information
to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
10. __________ is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
4. What are the three general categories of computer systems that can contain digital
evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
1. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
Ans: A
B. ELIZA
Ans: C
B. Logic model
C. Computational model
D. None of above
Ans: C
5. Communication between man and machine is related with ______
A. LISP B.
ELIZA
C. All of above D.
None of above
Ans: B
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D
7. The concept derived from ________ level are propositional logic, tautology,
predicate calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
9. The ____ level contains constituents at the third level which are knowledge based
system, heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A
11. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP B.
ELIZA C.
PROLOG D.
NLP
Ans: A
Chapter-2 Internet of Things
A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D
B. False
Ans: A
B. Internet of Things
Ans: C
Ans: A
5. MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
B. XML
C. XHL
D. MPL
Ans: B
Ans: A
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
9. What does HTTP do?
D. Enables network resources and reduces perception of latency and Allows multiple
concurrent exchange.
Ans: D
Ans: A
Chapter-3 Basics of Digital Forensics
E. None of above
Ans: D
Ans: B
Ans: D
4. What is called as the process of creation a duplicate of digital media for purpose
of examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
5. Which term refers for modifying a computer in a way which was not originally intended
to view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
6. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called?
A.Robotis
C.ComputerForenss
D.Animation
Ans: C
7. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B.Steganogrhy. C.
Liveanalysis
D. Hashing.
And: B
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
C. .iso
D. .asm
Ans: D
Chapter-4 DIGITAL EVIDENCE
9. Private networks can be a richer source of evidence than the Internet because:
a. They retain data for longer periods of time.
b. Owners of private networks are more cooperative with law enforcement.
c. Private networks contain a higher concentration of digital evidence.
d. All of the above
10. Digital evidence can be duplicated exactly without any changes to the original data.
a. True
b. False
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
2. What is the first phase of hacking?
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
3. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
5. Hacking for a cause is called __________________
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
A. Title 12
B. Title 18
C. Title 20
D. Title 2
A. 21
B. 25
C. 23
D. 80
9. What is the primary goal of an Ethical Hacker?
a. Avoiding Detection
b. Determining return on investment (ROI) for security measure
c. Resolving security vulnerabilities
d. Testing Security Controls
10. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to
crack a system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
2. Which is the legal form of hacking based on which jobs are provided in IT industries
and firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
3. They are nefarious hackers, and their main motive is to gain financial profit by doing
cyber crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
5. The amateur or newbie in the field of hacking who don’t have many skills about
coding and in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
6. Criminal minded individuals who work for terrorist organizations and steal
information of nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
7. These types of hackers are the most skilled hackers in the hackers’ community. Who
are “they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
8. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
9. Governments hired some highly skilled hackers. These types of hackers are termed
as _______
a) Special Hackers
b) Government Hackers
c) Cyber Intelligence Agents
d) Nation / State sponsored hackers
10. __________ security consultants uses database security monitoring & scanning
tools to maintain security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
This Online Exam is for Final Year students of Computer Engineering Group of MSBTE
affiliated Polytechnic.
Date : 21-05-2020
Time 10.00 to 11.30am.
Email address *
0 of 0 points
Full Name *
Institute Name *
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 1/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Institute Code *
Enrollment number *
63 of 70 points
Narrow AI
General AI
Neural AI
Feedback
Narrow AI
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 2/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
2. DARPA, the agency that has funded a great deal of American AI 1/1
research, is part of the Department of:
Defence
Energy
Education
Jastice
Feedback
Defence
3. The conference that launched the AI revolution in 1956 was held at: 1/1
Dartmouth
Harvard
New York
Stanford
Feedback
Dartmouth
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 3/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
4. What is the term used for describing the judgmental or commonsense 1/1
part of problem solving?
Heuristic
Critical
Value based
Analytical
Feedback
Heuristic
Correct answer
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 4/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
David Levy
John McCarthy
Joseph Weizenbaum
Hans Berliner
Feedback
John McCarthy
7. The ability to recover and read deleted or damaged files from a 1/1
criminal’s computer is an example of a law enforcement specialty called?
Robotics
Simulation
Computer Forensics
Animation
Feedback
Computer Forensics
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 5/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
8. What are the important parts of the mobile device which used in 1/1
Digital forensic?
SIM
RAM
ROM
EMMC chip
Feedback
EMMC chip
9. Using what, data hiding in encrypted images be carried out in digital 1/1
forensics?
Acquisition.
Steganography.
Live analysis
Hashing.
Other:
Feedback
Steganography
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 6/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
e-mail harassment
Falsification of data
Sabotage
Identification of data
Feedback
11. Which file is used to store the user entered password? 1/1
.exe
.txt
.iso
.sam
Feedback
.sam
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 7/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Data mining
Data carving
Meta data
Data Spoofing.
Feedback
Data mining
13. What is first step to Handle Retrieving Data from an Encrypted Hard 1/1
Drive?
Formatting disk
Storing data
Deleting files.
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 8/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
14. In phase investigator transfers the relevant data from a venue out of 1/1
physical or administrative control of the investigator to a controlled
location
Preservation phase
Survey phase
Documentation phase
Reconstruction phase
Presentation phase
Feedback
Survey phase
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 9/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
16. A set of instruction compiled into a program that perform a particular 1/1
task is known as:
Hardware.
CPU
Motherboard
Software
Feedback
Software
A copy is made onto forensically sterile media. New media should always be used if
available.
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 10/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
18. To collect and analyze the digital evidence that was obtained from the 1/1
physical investigation phase, is the goal of which phase?
Review phase.
Deployment phase.
Feedback
Review phase
Deployment phase
Feedback
Deployment phase
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 11/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
20. Which phase entails a review of the whole investigation and identifies 1/1
area of improvement?
Review phase.
Deployment phase
Feedback
Review phase.
G. Palmar
J. Korn
Michael Anderson
S.Ciardhuain.
Feedback
Michael Anderson
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 12/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Forensic
Crime
Cyber Crime
Evidence
Feedback
forensic
23. Who proposed End to End Digital Investigation Process (EEDIP)? 1/1
G. Palmar
Stephenson
Michael Anderson
S.Ciardhuain
Feedback
Stephenson.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 13/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 14/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
27. What are the three general categories of computer systems that can 1/1
contain digital evidence?
Desktop, laptop,server
Hardware, software,networks
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 15/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Open computersystems
Communication systems
Embedded computersystems
Correct answer
Communication systems
Offenders who are unaware of them leave behind more clues than they otherwise
would have.
Feedback
Offenders who are unaware of them leave behind more clues than they otherwise would
have.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 16/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
30. Private networks can be a richer source of evidence than the Internet 0/1
because:
Correct answer
31. The criminological principle which states that, when anyone, or 2/2
anything, enters a crime scene he/she takes something of the scene with
him/her, and leaves something of himself/herself behind, is:
Differential AssociationTheory
Beccaria’s SocialContract
None of theabove
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 17/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Encryption.
None ofthese.
Feedback
Strengths.
Weakness.
A &B
None of these.
Feedback
Weakness.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 18/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
G. Palma.
Raymond.
Either.
Jhon Browman
Feedback
Raymond.
Fix identifiesweakness
Steal thedata
No correct answers
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 19/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Nmap
LC4
ToneLOC
Nessus
Feedback
LC4
37. Which tool is used for depth analysis of a web application? 2/2
Whisker
Superscan
Nikto
Kismet
Feedback
Whisker
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 20/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
38. Which hacker try to distribute political or social message through 2/2
their work?
Black hathacker
Hactivist
Scriptkiddes
White hathacker
Feedback
Hactivist
39. A penetration tester must identify and keep in mind the & 2/2
requirements of a firm while evaluating the security postures.
hacking techniques
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 21/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
40. Before performing any penetration test, through legal procedure, 2/2
which key points listed below is not mandatory?
Feedback
Script Kiddies
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 22/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
42. Which of the following tool is used for Windows for network queries 2/2
from DNS lookups to trace routes?
SamSpade
SuperScan
NetScan
Netcat
Feedback
SamSpade
43. Which Nmap scan is does not completely open a TCP connection? 2/2
SYN stealthscan
TCP scan
XMAS treescan
ACKscan
Feedback
SYN stealthscan
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 23/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
Local networking
Social engineering
Physical entry
Remote networking
Feedback
Local networking
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 24/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Reconnaissance
Maintaining Access
Gaining Access
Scanning
Feedback
Gaining Access
47. Which type of hacker represents the highest risk to your network? 0/2
black-hathackers
grey-hathackers
script kiddies
disgruntled employees
Correct answer
disgruntled employees
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 25/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
General Purpose
Special Purpose
Feedback
Special Purpose
Data communication
Monitoring
control
All of above
Feedback
Monitoring
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 26/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
ASIC
ASSP
CPU
CPLD
Feedback
CPU
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy
Forms
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 27/27
Emerging Trends in Computer Engineering
and Information Technology
(22618)
Prepared by
RISHAN SIR
CHAPTER NO -1
ARTIFICIAL INTELLIGENCE
• 1. Which of these schools was not among the early leaders in AI research?
• A. Dartmouth University
• B. Harvard University
• C. Massachusetts Institute of Technology
• D. Stanford University
• 2. DARPA, the agency that has funded a great deal of American AI research,
is part of the Department of:
• A. Defense
• B. Energy
• C. Education
• D. Justice
• 3. The conference that launched the AI revolution in 1956 was held at:
• A. Dartmouth
• B. Harvard
• C. New York
• D. Stanford
• E. None of the above
• 4. What is the term used for describing the judgmental or commonsense part
of problem solving? A. Heuristic
• B. Critical
• C. Value based
• D. Analytical
• E. None of the above
• 5. What of the following is considered to be a pivotal event in the history of
AI.
• A. 1949, Donald O, The organization of Behavior.
• B. 1950, Computing Machinery and Intelligence.
• C. 1956, Dartmouth University Conference Organized by John McCarthy.
• D. 1961, Computer and Computer Sense.
• 6. A certain Professor at the Stanford University coined the word 'artificial
intelligence' in 1956 at a conference held at Dartmouth College. Can you
name the Professor?
• A. David Levy
• B. John McCarthy
• C. Joseph Weizenbaum
• D. Hans Berliner
• 7. The field that investigates the mechanics of human intelligence is:
• A. History
• B. cognitive science
• C. psychology
• D. sociology
• 8. A.M. turing developed a technique for determining whether a computer
could or could not demonstrate the artificial Intelligence,, Presently, this
technique is called
• A. Turing Test
• B. Algorithm
• C. Boolean Algebra
• D. Logarithm
• 9. The first AI programming language was called:
• A. BASIC
• B. FORTRAN
• C. IPL
• D. LISP
• 10. What is Artificial intelligence?
• A. Putting your intelligence into Computer
• B. Programming with your own intelligence
• C. Making a Machine intelligent
• D. Putting more memory into Computer
• 11. Who is a father of AI?
• A. Alain Colmerauer
• B. John McCarthy
• C. Nicklaus Wirth
• D. Seymour Papert
• 12. Artificial Intelligence has its expansion in the following application.
• A. Planning and Scheduling
• B. Game Playing
• C. Robotics
• D. All of the above
• 13. The characteristics of the computer system capable of thinking,
reasoning and learning is known is
• A. machine intelligence
• B. human intelligence
• C. artificial intelligence
• D. virtual intelligence
• 14. Which is not the commonly used programming language for AI?
• A. PROLOG
• B. LISP
• C. Perl
• D. Java script
• 15. The first widely used commercial form of Artificial Intelligence (Al) is
being used in many popular products like microwave ovens, automobiles and
plug in circuit boards for desktop PCs. What is name of AI?
• A. Boolean logic
• B. Human logic
• C. Fuzzy logic
• D. Functional logic
• 16. What is the term used for describing the judgmental or commonsense
part of problem solving?
• A. Heuristic
• B. Critical
• C. Value based
• D. Analytical
• 17. ______ is a branch of computer science which deals with helping
machines finds solutions to complex problems in a more human like
fashions
• A. Artificial Intelligence
• B. Internet of Things
• C. Embedded System
• D. Cyber Security
• 18. In ____ the goal is for the software to use what it has learned in one area
to solve problems in other areas.
• A. Machine Learning
• B. Deep Learning
• C. Neural Networks
• D. None of these
• 19. Computer programs that mimic the way the human brain processes
information is called as
• A. Machine Learning
• B. Deep Learning
• C. Neural Networks
• D. None of these
• 20. A ____ is a rule of thumb, strategy, trick, simplification, or any other
kind of device which drastically limits search for solutions in large problem
spaces.
• A. Heuristic
• B. Critical
• C. Value based
• D. Analytical
• 21. ______ do not guarantee optimal/any solutions
• A. Heuristic
• B. Critical
• C. Value based
• D. Analytical
• 22. Cognitive science related with _____
• A. Act like human
• B. ELIZA
• C. Think like human
• D. None of above
• 23. _____ Model should reflect how results were obtained.
• A. Design model
• B. Logic model
• C. Computational model
• D. None of above
• 24. Communication between man and machine is related with ______
• A. LISP
• B. ELIZA
• C. All of above
• D. None of above
• 25. ELIZA created by _____
• A. John McCarthy
• B. Steve Russell
• C. Alain Colmerauer
• D. Joseph Weizenbaum
• 26. The concept derived from ________ level are propositional logic,
tautology, predicate calculus, model, temporal logic.
• A. Cognition level
• B. Logic level
• C. Functional level
• D. All of above
• 27. PROLOG is an AI programming language which solves problems with a
form of symbolic logic known as ______.
• A. Propositional logic
• B. Tautology
• C. Predicate calculus
• D. Temporal logic
• 28. The ____ level contains constituents at the third level which are
knowledge based system, heuristic search, automatic theorem proving, multi-
agent system.
• A. Cognition level
• B. Gross level
• C. Functional level
• D. All of above
• 29. PROLOG, LISP, NLP are the language of ____
• A. Artificial Intelligence
• B. Machine Learning
• C. Internet of Things
• D. Deep Learning
• 30. ______ is used for AI because it supports the implementation of
software that computes with symbols very well.
• A. LISP
• B. ELIZA
• C. PROLOG
• D. NLP
• 31. Symbols, symbolic expressions and computing with those is at the core
of ______
• A. LISP
• B. ELIZA
• C. PROLOG
• D. NLP
• 32. ______ that deals with the interaction between computers and humans
using the natural language
• A. LISP
• B. ELIZA
• C. PROLOG
• D. NLP
• 33. The core components are constituents of AI are derived from
• A. Concept of logic
• B. Cognition
• C. Computation
• D. All of above
• 34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure
reasoning made knowledge on _____.
• A. Logic
• B. Computation logic
• C. Cognition logic
• D. All of above
• 35. Charles Babbage and Boole who demonstrate the power of _______
• A. Logic
• B. Computation logic
• C. Cognition logic
• D. All of above
• 36. In 1960s, _____ pushed the logical formalism to integrate reasoning with
knowledge.
• A. Marvin Minsky
• B. Alain Colmerauer
• C. John McCarthy
• D. None of above
• 37. Sensing organs as input, mechanical movement organs as output and
central nervous system (CNS) in brain as control and computing devices is
known as _____ of human being
• A. Information Control Paradigm
• B. Information Processing Paradigm
• C. Information Processing Control
• D. None of above
• 38. _____ model were developed and incorporated in machines which
mimicked the functionalities of human origin.
• A. Functional model
• B. Neural model
• C. Computational model
• D. None of above
• 39. Chomsky’s linguistic computational theory generated a model for
syntactic analysis through __________
• A. Regular Grammar
• B. Regular Expression
• C. Regular Word
• D. None of these
• 40. Human to Machine is _____ and Machine to Machine is ______.
• A. Process, Process
• B. Process, Program
• C. Program, Hardware
• D. Program, Program
• 41. Weak AI is also known as ____
• A. Narrow AI
• B. General AI
• C. Neural AI
• D. None of above
• 42. _____ AI is able to perform dedicated task.
• A. Narrow AI
• B. General AI
• C. Neural AI
• D. None of above
• 43. Narrow AI is performs multiple task at a time.
• A. True
• B. False
• 44. Weak AI is____________
• A. The embodiment of human intellectual capabilities within a computer.
• B. A set of computer programs that produce output that would be
considered to reflect intelligence if it were generated by humans.
• C. The study of mental faculties through the use of mental models
implemented on a computer
• D. All of the above
• 45. Strong AI is__________
• A. The embodiment of human intellectual capabilities within a computer.
• B. A set of computer programs that produce output that would be
considered to reflect intelligence if it were generated by humans.
• C. The study of mental faculties through the use of mental models
implemented on a computer D. All of the above
• 46. Artificial intelligence is___________
• A. The embodiment of human intellectual capabilities within a computer.
• B. A set of computer programs that produce output that would be
considered to reflect intelligence if it were generated by humans.
• C. The study of mental faculties through the use of mental models
implemented on a computer
• D. All of the above
• 47. Apple siri is a good example of ______ AI.
• A. Narrow AI
• B. General AI
• C. Neural AI
• D. None of above
• 48. IBM Watson supercomputer comes under ____ AI.
• A. Narrow AI
• B. General AI
• C. Neural AI
• D. None of above
• 49. ____ AI is a type of intelligence which could perform any intellectual
task with efficiency like human.
• A. Narrow AI
• B. General AI
• C. Super AI
• D. None of above
• 50. The idea behind _________AI to make such a system which could be
smarter and think like a human by its own.
• A. Narrow AI
• B. General AI
• C. Super AI
• D. None of above
CHAPTER NO -2
INTERNET OF THINGS
• 1. Embedded systems are_____
• A. General purpose
• B. Special purpose
• C. both
• D . none
• 2. Embedded system is______
• A. An electronic system
• B. A pure mechanical system
• C. An electro-mechanical system
• D. (A) or (C)
• 3. Which of the following is not true about embedded systems?
• A. Built around specialized hardware
• B. Always contain an operating system
• C. Execution behavior may be deterministic
• D. None of these
• 4. Which of the following is not an example of a “small-scale embedded
system”?
• A. Electronic Barbie doll
• B. Simple calculator
• C. Cell phone
• D. Electronic toy car
• 5. The first recognized modern embedded system is
• A. Apple computer
• B. Apollo Guidance Computer (AGC)
• C. Calculator
• D. Radio navigation system
• 6. The first mass produced embedded system is
• A. Minuteman-I
• B. Minuteman-II
• C. Autonetics D-17
• D. Apollo Guidance Computer (AGC)
• 7. Which of the following is an (are) an intended purpose(s) of embedded
systems?
• A. Data collection
• B. Data processing
• C. Data communication
• D. All of these
• 8. Which of the following is (are) example(s) of embedded system for data
communication? USB Mass Storage device
• A. Network router
• B. Digital camera
• C. Music player
• D. All of these
• 9. What are the essential tight constraint/s related to the design metrics of an
embedded system?
• A. Ability to fit on a single chip
• B. Low power consumption
• C. Fast data processing for real-time operations
• D .All of the above
• 10. A digital multi meter is an example of an embedded system for
• A. Data communication
• B. Monitoring
• C. Control
• D. All of these
• 11. Which of the following is an (are) example(s) of an embedded system for
signal processing?
• A. Apple iPOD (media player device)
• B. SanDisk USB mass storage device
• C. Both (A) and (B)
• D. None of these
• 12. The instruction set of RISC processor is
• A. Simple and lesser in number
• B. Complex and lesser in number
• C. Simple and larger in number
• D. Complex and larger in number
• 13. Which of the following is true about CISC processors?
• A. The instruction set is non-orthogonal
• B. The number of general purpose registers is limited
• C. Instructions are like macros in c language
• D. Variable length instructions
• E. All of these
• 14. Main processor chip in computers is_______
• A. ASIC
• B. ASSP
• C. CPU
• D. CPLD
• 15. Processors used in many microcontroller products need to be______
• A. high power
• B. low power
• C. low interrupt response
• D. low code density
• 16. In microcontrollers, UART is acronym of_____
• A. Universal Applied Receiver/Transmitter
• B. Universal Asynchronous Rectified Transmitter
• C. Universal Asynchronous Receiver/Transmitter
• D. United Asynchronous Receiver/Transmitter
• 17. Which architecture is followed by general purpose microprocessors?
• A. Harvard architecture
• B. Von Neumann architecture
• C. None of the mentioned
• D. All of the mentioned
• 18. Which architecture involves both the volatile and the non-volatile
memory?
• A. Harvard architecture
• B. Von Neumann architecture
• C. None of the mentioned
• D. All of the mentioned
• 19. Which architecture provides separate buses for program and data
memory?
• A. Harvard architecture
• B. Von Neumann architecture
• C. None of the mentioned
• D. All of the mentioned
• 20. Harvard architecture allows:
• A. Separate program and data memory
• B. Pipe-ling
• C. Complex architecture
• D. All of the mentioned
• 21. Which of the following processor architecture supports easier instruction
pipelining?
• A. Harvard
• B. Von Neumann
• C. Both of them
• D. None of these
• 22. Which of the following is an example for wireless communication
interface?
• A. RS-232C
• B. Wi-Fi
• C. Bluetooth
• D. Both (B) and (C)
• 23. ARM stands for _________
• A. Advanced RISC Machine
• B. Advanced RISC Methodology
• C. Advanced Reduced Machine
• D. Advanced Reduced Methodology
• 24. What is the processor used by ARM7?
• A. 8-bit CISC
• B. 8-bit RISC
• C. 32-bit CISC
• D. 32-bit RISC
• 25. The main importance of ARM micro-processors is providing operation
with ______
• A. Low cost and low power consumption
• B. Higher degree of multi-tasking
• C. Lower error or glitches
• D. Efficient memory management
• 26. ARM processors where basically designed for _______
• A. Main frame systems
• B. Distributed systems
• C. Mobile systems
• D. Super computers
• 27. ASIC chip is
• A. Simple in design.
• B. Manufacturing time is less.
• C. It is faster.
• D. Both A&C.
• 28. ASIC stands for
• A. Application-System Integrated Circuits
• B. Application-Specific Integrated Circuits
• C. Application-System Internal Circuits
• D. Application-Specific Internal Circuits
• 29. In microcontrollers, I2C stands for
• A. Inter-Integrated Clock
• B. Initial-Integrated Clock
• C. Intel-Integrated Circuit
• D. Inter-Integrated Circuit
• 30. ______________ is the smallest microcontrollers which can be
programmed to perform a large range of tasks.
• A. PIC microcontrollers
• B. ARM microcontrollers
• C. AVR microcontrollers
• D. ASIC microcontrollers
• 31. _______________ was developed in the year 1996 by ATMEL
Corporation
• A. PIC
• B. AVR
• C. ARM
• D. ASIC
• 32. AVR stands for_____________________.
• A. Advanced Virtual RISC.
• B. Alf-Egil Bogen and Vegard Wollan RISC
• C. Both A & B
• D. None of the above
• 33. AVR microcontroller executes most of the instruction in
_________________.
• A. Single execution cycle.
• B. Double execution cycle.
• C. Both A& B
• D. None of the above.
• 34. Term "the Internet of things" was coined by
• A. Edward L. Schneider
• B. Kevin Ashton
• C. John H.
• D. Charles Anthony
• 35. The huge numbers of devices connected to the Internet of Things have
to communicate automatically, not via humans, what is this called?
• A. Bot to Bot(B2B)
• B. Machine to Machine(M2M)
• C. InterCloud
• D. Skynet
• 36. What does “Things” in IoT refers to?
• A. General device
• B. Information
• C. IoT devices
• D. Object
• 37. Interconnection of Internet and computing devices embedded in
everyday objects, enabling them to send and receive data is
called_____________
• A. Internet of Things
• B. Network Interconnection
• C. Object Determination
• D. None of these
• 38. _____________ is a computing concept that describes the idea of
everyday physical objects being connected to the internet.
• A. IOT (Internet of Things)
• B. MQTT
• C. COAP
• D. SPI
• 39 _____ devices may support a number of interoperable communication
protocols and communicate with other device and also with infrastructure.
• A. Artificial Intelligence
• B. Machine Learning
• C. Internet of Things
• D. None of above
• 40. Which one is not element of IOT?
• A. Process
• B. People
• C. Security
• D. Things
• 41. IIOT stands for
• A. Information Internet of Things
• B. Industrial Internet of Things
• C. Inovative Internet of Things
• D. None of above
• 42. Name of the IOT device which is first recognized?
• A. Smart Watch
• B. ATM
• C. Radio
• D. Video Game
• 43. _____ is used by IOT
• A. Radio information technology
• B. Satellite
• C. Cable
• D. Broadband
• 44. ______ consists of communication protocols for electronic devices,
typically a mobile device and a standard device.
• A. RFID
• B. MQTT
• C. NFC
• D. None of above
• 45. _____________ refers to establish a proper connection between all the
things of IOT.
• A. Connectivity
• B. Analyzing
• C. Sensing
• D. Active Engagement
• 46. IOT devices which have unique identities and can perform
________________________.
• A. Remote sensing
• B. Actuating
• C. Monitoring capabilities
• D. All of the above
• 47. The sensed data communicated ___________________. A. Cloud-based
servers/storage.
• B. I/O interfaces.
• C. Internet connectivity.
• D. None of the above
• 48. IOT devices are various types, for instance______________.
• A. Wearable sensors.
• B. Smart watches.
• C. LED lights.
• D. All of the above
• 49. ______________ is a collection of wired Ethernet standard for the link
layer.
• A. IEEE 802.3
• B. IEEE 802.11
• C. IEEE 802.16
• D. IEEE 802.15.4
• 50.______ is a collection of WLAN communication standards.
• A. IEEE 802.3
• B. IEEE 802.11
• C. IEEE 802.16
• D. IEEE 802.15.4
• 51. ____ is a collection of wireless broadband standards (WiMax).
• A. IEEE 802.3
• B. IEEE 802.11
• C. IEEE 802.16
• D. IEEE 802.15.4
• 52 ___ is a collection of standards for LR-WPANs.
• A. IEEE 802.3
• B. IEEE 802.11
• C. IEEE 802.16
• D. IEEE 802.15.4
• 53. LR-WPANs standards from basis of specifications for high level
communication protocol such as ___.
• A. Zigbee
• B. Allsean
• C. Tyrell
• D. Microsoft's Azure
• 54. ______ includes GSM and CDMA.
• A. 2G
• B. 3G
• C. 4G
• D. None of above
• 55. ______include UMTS and CDMA2000.
• A. 2G
• B. 3G
• C. 4G
• D. None of above
• 56 ______include LTE.
• A. 2G
• B. 3G
• C. 4G
• D. None of above
• 57. _____________ layer protocols determine how the data is physically sent
over the network’s physical layer or medium.
• A. Application layer
• B. Transport layer
• C. Network layer
• D. Link layer
• 58 _______ layer is responsible for sending of IP datagrams from the source
network to the destination network.
• A. Application layer
• B. Transport layer
• C. Network layer
• D. Link layer
• 59. ___ layer perform the host addressing and packet routing.
• A. Application layer
• B. Transport layer
• C. Network layer
• D. Link layer
• 60. _____________ protocols provide end to end message transfer
capability independent of the underlying network.
• A. Network layer
• B. Transport layer
• C. Application layer
• D. Link layer
• 61. The ___ protocols define how the applications interface with the lower
layer protocol to send the data over the network.
• A. Application layer
• B. Transport layer
• C. Network layer
• D. Link layer
• 62. 6LOWPAN stands for
• A. 6 LOW Personal Area Network
• B. IPv6 LOW Personal Area Network
• C. IPv6 over Low power wireless personal area network
• D. None of above
• 63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________
cable as shared medium.
• A. Twisted pair cable
• B. Coaxial cable
• C. Fiber optic cable
• D. None of the above
• 64. IEEE 802.11 standards provide data rates ______________
• A. 10 Gbit/s.
• B. 1 Gbit/s
• C. 1 Mb/s to up to 6.75 Gb/s
• D. 250 Kb/s
• 65. ________ of the following is a protocol related to IOT
• A. Zigbee
• B. 6LoWPAN
• C. CoAP
• D. All of the above
• 66. _______________ is useful for time-sensitive application that have very
small data units to exchange and do not want the overhead of connection
setup.
• A. TCP
• B. UDP
• C. Transport layer
• D. None of the above.
• 67. ____________ protocol uses Universal Resource Identifiers (URIs) to
identify HTTP resources.
• A. HTTP
• B. COAP
• C. WebSocket
• D. MQTT
• 68. The 10/100Mbit Ethernet support enables the board to connect to
_________
• A. LAN
• B. MAN
• C. WAN
• D. WLAN
• 69. Which one out of these is not a data link layer technology?
• A. Bluetooth
• B. UART
• C. Wi-Fi
• D. HTTP
• 70. What is size of the IPv6 Address?
• A. 32 bits
• B. 64 bits
• C. 128 bits
• D. 256 bits
• THANKS
CHAPTER-3
• Ans: B
• 7. Computers can be involved in which of the following types of crime?
• A. Homicide and sexual assault
• B. Computer intrusions and intellectual property theft
• C. Civil disputes
• D. All the above
• Ans: D
• 8. A logon record tells us that, at a specific time:
• A. An unknown person logged into the system using the account
• B. The owner of a specific account logged into the system
• C. The account was used to log into the system
• D. None of the above
• Ans: C
• 9. Cyber trails are advantageous because:
• A. They are not connected to the physical world.
• B. Nobody can be harmed by crime on the Internet.
• C. They are easy to follow.
• D. Offenders who are unaware of them leave behind more clues than they
otherwise would have.
• Ans: D
• 10. Private networks can be a richer source of evidence than the Internet because:
• A. They retain data for longer periods of time.
• B. Owners of private networks are more cooperative with law enforcement.
• C. Private networks contain a higher concentration of digital evidence.
• D. All the above.
• Ans: C
• 12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of
himself/herself behind, is:
• A. Locard’s Exchange Principle
• B. Differential Association Theory
• C. Beccaria’s Social Contract
• D. None of the above
• Ans: A
• 13. The author of a series of threatening e-mails consistently uses “im” instead of
“I’m.” This is an example of:
• A. An individual characteristic
• B. An incidental characteristic
• C. A class characteristic
• D. An indeterminate characteristic
• Ans: A
• 14. Personal computers and networks are often a valuable source of evidence.
Those involved with _______ should be comfortable with this technology.
• A. Criminal investigation
• B. Prosecution
• C. Defense work
• D. All of the above
• Ans: A
• 15. An argument for including computer forensic training computer security
specialists is:
• A. It provides an additional credential.
• B. It provides them with the tools to conduct their own investigations.
• C. It teaches them when it is time to call in law enforcement.
• D. None of the above.
• Ans: C
• 16. The digital evidence are used to establish a credible link between____________
• A. Attacker and victim and the crime scene
• B. Attacker and the crime scene
• C. Victim and the crime scene
• D. Attacker and Information
• Ans: A
• 17. Digital evidences must follow the requirements of the ___________
• A. Ideal Evidence rule
• B. Best Evidence rule
• C. Exchange rule
• D. All the mentioned
• Ans: B
• 18. From the two given statements 1 and 2, select the correct option from a-d.
• a. Original media can be used to carry out digital investigation process.
• b. By default, every part of the victim’s computer is considered as unreliable.
• Ans: B
• 19. The evidences or proof can be obtained from the electronic source is called the
___________
• A. digital evidence
• B. demonstrative evidence
• C. Explainable evidence
• D. substantial evidence
• Ans: A
• 20. Which of the following is not a type of volatile evidence?
• A. Routing tables
• B. Main memory
• C. Log files
• D. Cached data
• Ans: C
• 21. The evidence must be usable in the court which is called as_______
• A. Admissible
• B. Authentic
• C. Complete
• D. Reliable
• Ans: A
• 22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a
a type of _____________
• A. Illustrative evidence
• B. Electronic evidence
• C. Documented evidence
• D. Explainable evidence
• Ans: A
• 23. Email, hard drives are examples of ____________
• A. Illustrative evidence
• B. Electronic evidence
• C. Documented evidence
• D. Explainable evidence
• Ans: B
• 24. Blood, fingerprints, DNA these are examples of____________
• A. Illustrative evidence
• B. Electronic evidence
• C. Documented evidence
• D. Substantial evidence
• Ans: D
• 25. When an incident takes place, a criminal will leave a hint evidence at the scene
and remove a hint from the scene which is called as ____________
• A. Locard’s Exchange principle
• B. Anderson’s Exchange principle
• C. Charles’s Anthony principle
• D. Kevin Ashton principle
• Ans: A
• 26. Which is not procedure to establish a chain of custody?
• A. Save the original materials.
• B. Take photos of physical evidence.
• C. Don’t take screenshots of digital evidence content.
• D. Document date, time, and any other information of receipt.
• Ans: C
• 27. Which is not related with digital evidence?
• A. Work with the original evidence to develop procedures.
• B. Use clean collecting media.
• C. Document any extra scope.
• D. Consider safety of personnel at the scene.
• Ans: A
• 28. Which is example of non-volatile memory.
• A. Flash memory
• B. Registers and Cache
• C. Process table
• D. Arp cache
• Ans: A
• 29._________ is known as testimonial.
• A. Oath affidavit
• B. DNA samples
• C. Fingerprint
• D. Dried blood
• Ans: A
• 30.The process of ensuring that providing or obtaining the data that you have collected is
similar to the data provided or presented in a court is known as___________
• A. Evidence validation
• B. Relative evidence
• C. Best evidence
• D. Illustrative evidence
• Ans: A
• 31.When cases got to trial your forensics examiner play one of ____ role.
• A. 2
• B. 4
• C. 3
• D. 5
• Ans. A
• 32.Types of digital evidence
• A. Eye witness
• B. Picture and video
• C. Paper work
• D. None of the above
• Ans B
• 33.Rule of evidence is also known as __________
• A. Law of witness
• B. Law of litigation
• C. Law of evidence
• D. All of the above
• Ans. C
• 34. Digital evidence is only useful in a court of law.
• A. True
• B. False
• Ans: B
• 35. Attorneys and police are encountering progressively more digital
evidence in their work.
• A. True
• B. False
• Ans: A
CHAPTER N0 - 05
• Ans. B
• 2. Tool(s) used by ethical hacker_____.
• A. Scanner
• B. Decoder
• C. Proxy
• D. All of these.
• Ans. D
• 3. Vulnerability scanning in Ethical hacking finds_____.
• A. Strengths.
• B. Weakness.
• C. A &B
• D. None of these.
• Ans. B
• 4. Ethical hacking will allow to____ all the massive security breaches.
• A. Remove.
• B. Measure.
• C. Reject.
• D. None of these.
• Ans. B
• 5. Sequential step hackers use are: _ _ _ _. A. Maintaining Access.
• B. Reconnaissance , C. Scanning. , D. Gaining Access.
• A. B, C, D, A
• B. B, A, C, D
• C. A, B, C, D
• D. D, C, B, A
• Ans. A
• 6. ______ is the art of exploiting the human elements to gain access to the
authorized user.
• A. Social Engineering.
• B. IT Engineering.
• C. Ethical Hacking.
• D. None of the above.
• Ans. A
• 7. Which hacker refers to ethical hacker?
• A. Black hat hacker.
• B. White hat hacker.
• C. Grey hat hacker.
• D. None of the above.
• Ans. B
• 8. The term cracker refers to_____
• A. Black hat hacker.
• B. White hat hacker.
• C. Grey hat hacker.
• D. None of the above.
• Ans. A
• 9. Who described a dissertation on fundamentals of hacker’s attitude?
• A. G. Palma.
• B. Raymond.
• C. Either.
• D. Jhon Browman.
• Ans. B
• 10.Computer Hackers have been in existence for more than a____.
• A. Decade.
• B. Year.
• C. Century
• D. Era.
• Ans. C
• 11.Hackers do hack for?
• A. Fame.
• B. Profit.
• C. Revenge.
• D. All the above
• Ans. D
• 12.The intent of ethical hacker is to discover vulnerabilities from a_____ point of
view to better secure system.
• A. Victims.
• B. Attackers.
• C. Both A & B
• D. None of these.
• Ans. B
• 13.Security audits are usually based on___
• A. Entries.
• B. Checklists.
• C. Both A & B
• D. None of the above
• Ans. B
• 14.Ethical hacking consist of _______
• A. Penetration testing.
• B. Intrusion testing.
• C. Red teaming.
• D. All of the above.
• Ans. D
• 15._______ is a person who find and exploits the weakness in computer system.
• A. Victim
• B. Hacker
• C. Developer
• D. None of the above.
• Ans. B
• 16. A white hat hacker is the one who _____
• A. Fix identifies weakness
• B. Steal the data
• C. Identifies the weakness and leave message to owner
• D. None of the above
• Ans. A
• 17.A black hat hacker is the one who _______
• A. Fix identifies weakness
• B. Steal the data
• C. Identifies the weakness and leave message to owner
• D. None of the above.
• Ans. B
• 18. A grey hat hacker is the one who_______
• A. Fix identifies weakness
• B. Steal the data
• C. Identifies the weakness and leave message to owner
• D. None of the above
• Ans. C
• 19. Keeping information secured can protect an organization image and save
and organization lot of money
• A. True
• B. False
• Ans. A
• 20.Information is a one of the most valuable assets of organization
• A. True
• B. False
• Ans. A
• 21. To catch a thief, think like _____
• A. Police
• B. Forensics
• C. Thief
• D. Hacker
• Ans. C
• 22._______can create false feeling of safety
• A. Firewall
• B. Encryption
• C. VNPs
• D. All the above
• Ans. D
• 23.______ exploits that involves manipulating people and user even your self are
the greatest vulnerability within any computer
• A. Nontechnical attacks
• B. Network infrastructure attack
• C. Operating system attack
• D. Application and other specialized attack
• Ans. A
• 24.Connecting into network through a rogue modem attached to computer behind a
firewall is an example of ____-
• A. Nontechnical attacks
• B. Network infrastructure attack
• C. Operating system attack
• D. Application and other specialized attack
• Ans. B
• 25.______ comprise of large portion of hacker attacks simply because every
computer has one and so well know exploits can be used against them
• A. Nontechnical attacks
• B. Network infrastructure attack
• C. Operating system attack
• D. Application and other specialized attack
• Ans. C
• 26.______ should be done before ethical hacking process. A.
• Data gathering.
• B. Attacking
• C. Planning
• D. Research
• Ans. C
• 27.Which permission is necessary before ethical hacking?
• A. Written permission.
• B. Decision maker permission
• C. Privacy permission
• D. Risk permission.
• Ans. A
• 28. Which tool is used to crack the password?
• A. Nmap
• B. LC4
• C. ToneLOC
• D. Nessus
• Ans. B
• 29. Which tool is used for depth analysis of a web application?
• A. Whisker
• B. Super scan
• C. Nikto
• D. Kismet
• Ans. A
• 30. Which tool is used to encrypt Email?
• A. WebInspect
• B. QualyGuard
• C. PGP (pretty good privacy)
• D. None of the above.
• Ans. C
• 31.Malicious attacker often think like?
• A. Thieves
• B. Kidnapper
• C. Both A & B
• D. None of the above
• Ans. C
• 32.Which hacker try to distribute political or social message through their work?
• A. Black hat hacker
• B. Hactivist
• C. Script kiddes
• D. White hat hacker
• Ans. B
• 33._______ are part of organized crime on internet.
• A. Criminal
• B. Antinationalist
• C. Hacker for hire
• D. None of the above
• Ans. C
• 34. Which magazines releases the latest hacking methods?
• A. 2600
• B. Hackin9
• C. PHRACK
• D. All the above
• Ans. D
• 35. Performing a shoulder surfing in order to check other’s password is
____________ ethical practice.
• A. a good
• B. not so good
• C. very good social engineering practice
• D. a bad
• Ans. D
• 36. ___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
• A. Automated apps
• B. Database software
• C. Malware
• D. Worms
•
• Ans. C
• 37. Leaking your company data to the outside network without prior
permission of senior authority is a crime.
• A. True
• B. False
• Ans. A
• 38. A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
• A. privacy and security
• B. rules and regulations
• C. hacking techniques
• D. ethics to talk to seniors
• Ans. A
• 39. The legal risks of ethical hacking include lawsuits due to __________ of
personal data.
• A. stealing
• B. disclosure
• C. deleting
• D. hacking
• Ans. B
• 40. Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
• A. Know the nature of the organization
• B. Characteristics of work done in the firm
• C. System and network
• D. Type of broadband company used by the firm
• Ans. D
CHAPTER NO - 06
• Ans: C
• 2. Which of the following tool is used for Network Testing and port
Scanning______
• A. NetCat
• B. SuperScan
• C. NetScan
• D. All of above
• Ans: D
• 3. Banner grabbing is used for
• A. White Hat Hacking
• B. Black Hat Hacking
• C. Grey Hat Hacking
• D. Script Kiddies
• Ans: A
• 4. An attacker can create an________attack by sending hundreds or thousands of
e-mails a with very large attachments.
• A. Connection Attack
• B. Auto responder Attack
• C. Attachment Overloading Attack
• D. All the above
• Ans: B
• 5. Which of the following tool is used for Windows for network queries from DNS
lookups to trace routes?
• A. Sam Spade
• B. SuperScan
• C. NetScan
• D. Netcat
• Ans: A
• 6. Which tool is used for ping sweeps and port scanning?
• A. Netcat
• B. SamSpade
• C. SuperScan
• D. All the above
• Ans: C
• 7. Which of the following tool is used for security checks as port scanning and
firewall testing?
• A. Netcat
• B. Nmap
• C. Data communication
• D. Netscan
• Ans: A
• 8. What is the most important activity in system cracking?
• A. Information gathering
• B. Cracking password
• C. Escalating privileges
• D. Covering tracks
• Ans: B
• 9. Which Nmap scan is does not completely open a TCP connection?
• A. SYN stealth scan
• B. TCP scan
• C. XMAS tree scan
• D. ACK scan
• Ans: A
• 10.Key loggers are form of
• A. Spyware
• B. Shoulder surfing
• C. Trojan
• D. Social engineering
• Ans: A
• 11. Nmap is abbreviated as Network Mapper.
• A. True
• B. False
• Ans: A
• 12. _________is a popular tool used for discovering network as well as security
auditing.
• A. Ettercap
• B. Metasploit
• C. Nmap
• D. Burp Suit
• Ans: C
• 13. Which of this Nmap do not check?
• A. Services different hosts are offering
• B. On what OS they are running.
• C. What kind of firewall in use?
• D. What type of antivirus in use?
• Ans: D
• 14. What is purpose of Denial of Service attacks?
• A. Exploit weakness in TCP/IP attack.
• B. To execute a trojan horse on a system.
• C. To overload a system so it is no longer operational.
• D. To shutdown services by turning them off.
• Ans: C
• 15. What are the some of the most common vulnerabilities that exist in a network
system?
• A. Changing manufacturer, or recommended settings of newly installed application.
• B. Additional unused feature on commercial software package.
• C. Utilizing open source application code.
• D. Balancing security and ease of use of system.
• Ans: B
• 16. Which of the following is not a characteristic of ethical hacker?
• A. Excellent knowledge of Windows.
• B. Understands the process of exploiting network vulnerabilities.
• C. Patience, persistence and perseverance.
• D. Has the highest level of security for the organization.
• Ans: D
• 17. Attempting to gain access to a network using an employee’s credentials is called
the _____________ mode of ethical hacking.
• A. Local networking
• B. Social engineering
• C. Physical entry
• D. Remote networking
• Ans: A
• 18. The first phase of hacking an IT system is compromise of which foundation of
security?
• A. Availability
• B. Confidentiality
• C. Integrity
• D. Authentication
• Ans: B
• 19. Why would a ping sweep be used?
• A. To identify live systems
• B. To locate live systems
• C. To identify open ports
• D. To locate firewalls
• Ans: A
•
• 20. What are the port states determined by Nmap?
• A. Active, inactive, standby
• B. Open, half-open, closed
• C. Open, filtered, unfiltered
• D. Active, closed, unused
• Ans: C
• 21. What port does Telnet use?
• A. 22
• B. 80
• C. 20
• D. 23
• Ans: D
• 22. Which of the following will allow foot printing to be conducted without
detection?
• A. PingSweep
• B. Traceroute
• C. War Dialers
• D. ARIN
• Ans: D
• 23. Performing hacking activities with the intent on gaining visibility for an unfair
situation is called ________.
• A. Cracking
• B. Analysis
• C. Hacktivism
• D. Exploitation
• Ans: C
• 24. Why would a hacker use a proxy server?
• A. To create a stronger connection with the target.
• B. To create a ghost server on the network.
• C. To obtain a remote access connection
• D. To hide malicious activity on the network
• Ans: A
• 25. Which phase of hacking performs actual attack on a network or system?
• A. Reconnaissance
• B. Maintaining Access
• C. Scanning
• D. Gaining Access
• Ans: D
• 26. Sniffing is used to perform ______________ fingerprinting.
• A. Passive stack
• B. Active stack
• C. Passive banner grabbing
• D. Scanned
• Ans: A
• 27. Services running on a system are determined by _____________.
• A. The system’s IP address
• B. The Active Directory
• C. The system’s network name
• D. The port assigned
• Ans: D
• 28. What are the types of scanning?
• A. Port, network, and services
• B. Network, vulnerability, and port
• C. Passive, active, and interactive
• D. Server, client, and network
• Ans: B
• 29. Enumeration is part of what phase of ethical hacking?
• A. Reconnaissance
• B. Maintaining Access
• C. Gaining Access
• D. Scanning
• Ans: C
• 30. ______________ framework made cracking of vulnerabilities easy like point
and click.
• A. Net
• B. Metasploit
• C. Zeus
• D. Ettercap
• Ans: B