ETI Big Merge
ETI Big Merge
ETI Big Merge
1. A certain Professor at the Stanford University coined the word 'artificial intelligence' in1956 at
a conference held at Dartmouth College. Can you name the Professor?
David Levy
John McCarthy
Joseph Weizenbaum
Hans Berliner
None of the above
3. The process of collecting, organizing and collecting large sets of data called as
WSN
Cloud Computing
Big Data
None of above
7. Which machines only focus on current scenarios and react on it as per as possible best action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
8. Embedded system is
An electronic system
A pure mechanical system
An electro-mechanical system
(A) or (C)
9. _______is the smallest microcontrollers which can be programmed to perform a large range of
tasks.
PIC microcontrollers
ARM microcontrollers
AVR microcontrollers
ASIC microcontrollers
12. _______ is a bi-directional, fully duplex communication model that uses a persistent
connection between client and server.
Request-Response
Publish-Subscriber
Push-Pull
Exclusive Pair
16. LR-WPANs standards from basis of specifications for high level communication protocol
such as ____
ZigBee
Allsean
Tyrell
Microsoft's Azure
21. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
23. Sensing organs as input, mechanical movement organs as output and central nervous
system(CNS) in brain as control and computing devices is known as ____of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
24. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
_______
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
27. _________ phase of ADFM model formulates procedures and approach to use in order to
maximize the collection of untainted evidence while minimizing the impact to the victim
Identification
Preparation
Approach strategy
Preservation
None Of above
28. DFPM along with ______ groups and _____ phases are proposed by Carrier and Safford.
DFPM is named the Integrated Digital Investigation Process (IDIP).
5,15
5,17
5,20
6,17
31. _________ phase of ADFM model determines importance and probative value to the case of
the examined product
Returning Evidence
Presentation
Analysis
Readiness phase
32. What are the three general categories of computer systems that can contain digital evidence?
Desktop, laptop, server
Personal computer, Internet, mobile telephone
Hardware, software, networks
Open computer systems, communication systems, and embedded systems
33. Sequential step hackers use are: A. Maintaining Access. B. Reconnaissance C. Scanning. D.
Gaining Access.
B, C, D, A
B, A, C, D
A, B, C, D
D, C, B, A
35. The intent of ethical hacker is to discover vulnerabilities from a ___________ point of view
to better secure system.
Victims.
Attackers.
Both A & B
None of these.
39. Connecting into network through a rogue modem attached to computer behind a firewall is
an example of _________
Nontechnical attacks
43. __________ has now evolved to be one of the most popular automated tools for unethical
hacking.
Automated apps
Database software
Malware
Worms
44. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
Know the nature of the organization
Characteristics of work done in the firm
System and network
Type of broadband company used by the firm
47. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This is
an example of:
An individual characteristic
An incidental characteristic
A class characteristic
An indeterminate characteristic
49. From the two given statements 1 and 2, select the correct option from: a. Original media can
be used to carry out digital investigation process. b. By default, every part of the victim’s
computer is considered as unreliable.
a and b both are true
a is true and b is false
a and b both are false
a is false and b is true
52. The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as ___________
Evidence validation
Relative evidence
Best evidence
Illustrative evidence
54. TCP uses port no _____ for SMTP (Simple Mail Transfer Protocol)
24
22
25
35
55. Banners cannot be grabbed by using either plain old telnet or Netcat.
True
False
communication bomb
letter bomb
network bomb
60. XSS is an attack which allows the attacker to execute the scripts on the victim's browser.
True
False
61. _________ is a UNIX-based program alerts you via e-mail if it detects changes in MAC
addresses associated with specific IP addresses on the network.
Arp watch
Ettercap
dsniff
Cain & Abel tool
62. TCP uses port no _____ for HTTP (Hypertext Transfer Protocol)
60
70
80
90
64. ________ is Network Testing and port Scanning tool used for the most versatile security tool
for such security checks as port scanning and firewall testing
Netcat
Nmap or NMapWin
WildPacketsEtherPeek
NetScan
True
False
68. _______________ is used for searching of multiple hosts in order to target just one specific
open port.
Ping Sweep
Port scan
Ipconfig
Spamming
69. What is AI ?
Putting your intelligence into computer
Programming with your own intelligence
Making a machine intelligence
Putting more memory into computer
High Speed
Low Speed
Moderate Speed
None of the above
79. ______is a branch of science which deals with helping machines find solution to complex
problems in more Human-like fashion.
Artificial Intelligent
Internet of Things
Embedded System
Cyber Security
80. The machines only focus on current scenarios and react on its as per possible best action
Reactive Machine
Limited Memory
Theory of Mind
Self Awaeness
95. ___________ specifies the function that will be called when the client disconnects.
Callback
Error
Connect
Disconnect
Big Data
IoT
Cloud
102. Which of the software or a programming language used for controlling of Arduino?
Assembly Language
C language
JAVA
Any language
X86
MSP
AVR
ARM
108. How many digital pins are there on the UNO board?
14
12
16
20
109. Digital Forensics Includes Identification, recovery, ________ , validation & presentation of
facts regarding digital evidence found.
Investigation
Data
Password
Image
115. You begin any computer forensics case by creating an ____. evidence custody form
investigation plan risk assessment report investigation report B
How many Phases are present in Road Map for Digita Forensics Model 7 6 8
9 B
Digital Forensics is all of them except: Extraction of computer data Preservation of
computer data Interpretation of computer data Manipulation of computer data D
Data ____ involves changing or manipulating a file to conceal information. creep hiding
recovery integrity B
Who proposed Road Map model G. Gunsh S. Ciardhuain J. Koren G. Palmar
D
Investigator should satisfy the following points: Contribute to the society & human being
Avoid harm to others Honest & trustworthy All of the above D
Rules of Digital Forensics areCreate a copy of original data Data should not be modified Chain
of custody must be maintain All of the above D
General Ethical norm for Investigator is: Express an opinion on the guilt Engage in
illegal conductTo Respect Privacy of others. Distort or falsify education, training, credentials
C
A written report is frequently an ____ or a declaration. affidavit subpoena
deposition perjury A
IDIP stand for Integrated Digital Investigation Process Integrated Data Investigation Process
Integrated Digital Investigator Process Independant Digital Investigation Process
A
How May Digital Forensics Models are present 5 6 8 9 B
Unethical norms are Uphold any relevant evidenceDeclare confidential matter Display bias in
findings All of the above D
For forensics specialists, keeping the ____ updated and complete is crucial to supporting your
role as an expert and showing that you’re constantly enhancing your skills through training,
teaching, and experience. testimony examination plan deposition CV D
The term ____ comes from the Greek word for “hidden writing.” creep escrow
steganography hashing C
The criminological principle which states that, when anyone, or anything, enters a crime scene
he/she takes something of the scene with him/her, and leaves something of himself/herself
cracking
penetration testing
exploiting C
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________ Black Hat hackers
Hactivists
Script Kiddies
Whistle Blowers C
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber
crimes. Who are “they” referred to here? Gray Hat Hackers
Hacktivism
Hardening
Whacker C
What are the three general categories of computer Desktop, laptop, Personal computer, Hardware, software, Open computer
2 systems that can contain digital evidence? server Internet, mobile networks systems, D
telephone communication
In terms of digital evidence, a hard drive is an example Open computer Communication Embedded None of the above
3 of: systems systems computer systems A
In terms of digital evidence, a mobile telephone is an Open computer Communication Embedded None of the above
4 example of: systems systems computer systems C
In terms of digital evidence, a Smart Card is an Open computer Communication Embedded None of the above
5 example of: systems systems computer systems C
In terms of digital evidence, the Internet is an example Open computer Communication Embedded None of the above
6 of: systems systems computer systems B
Computers can be involved in which of the following Homicide and sexual Computer intrusions Civil disputes All of the above
types of crime? assault and intellectual
7 D
property theft
A logon record tells us that, at a specific time: An unknown person The owner of a The account was None of the above
logged into the specific account used to log into the
8 C
system using the logged into the system
account system
Cybertrails are advantageous because: They are not Nobody can be They are easy to Offenders who are
connected to the harmed by crime on follow. unaware of them
physical world the Internet. leave behind more
9 clues than they D
otherwise would
have.
Private networks can be a richer source of evidence They retain data for Owners of private Private networks All of the above.
than the Internet because: longer periods of networks are more contain a higher
10 time. cooperative with concentration of C
law enforcement. digital evidence.
Due to caseload and budget constraints, often Each unreported Responsibility for This approach Computer security
computer security professionals attempt to limit the incident robs incident resolution results in under- professionals
damage and close each investigation as quickly as attorneys and law frequently does not reporting of criminal develop loose
possible. Which of the following is NOT a significant enforcement reside with the activity, deflating evidence processing
personnel of an security statistics that are habits
drawback to this approach?
opportunity to learn professional, but used to allocate that can make it
11 about the basics of with management. corporate and more difficult for B
computer-related government law enforcement
crime. spending on personnel and
combating computer- attorneys to
related crime. prosecute an
offender.
The first US law to address computer crime was: Computer Fraud and Florida Computer Computer Abuse Act None of the above
17 Abuse Act (CFAA) Crime Act B
The following specializations exist in digital First responder Forensic examiner Digital investigator All of the above
18 investigations: (a.k.a. digital crime D
scene technician)
The first tool for making forensic copies of computer EnCase Expert Witness dd Safeback
19 C
storage media was:
One of the most common approaches to validating Examine the source Ask others if the Compare results of Computer forensic
20 forensic software is to: code software is reliable
multiple tools for tool testing projects C
discrepancies
An instrumentality of a crime is: An instrument used A weapon or tool Anything that plays All of the above
21 to commit a crime designed to commit a significant role in a D
a crime crime
. Contraband can include: Child pornography Devices or programs Encryption devices All of the above
for eavesdropping or applications
22 D
on communications
In the course of conducting forensic analysis, which of Critical thinking Fusion Validation All of the above
30 D
the following actions are carried out?
Having a member of the search team trained to handle Can reduce the Can serve to Can reduce the All of the above
digital evidence: number of people streamline the opportunity for
who handle the presentation of the opposing counsel to
31 D
evidence case impugn the integrity
of the evidence
An attorney asking a digital investigator to find Influencing the Due diligence Quid pro quo Voir dire
32 evidence supporting a particular line of inquiry is an examiner A
example of:
Logical reasoning Common sense Preconceived theory Investigator’s
A digital investigator pursuing a line of investigation in intuition
33 C
a case because that line of investigation proved
successful in two previous cases is an example of:
Balance of Beyond a reasonable Acquittal None of the above
A scientific truth attempts to identify roles that are probabilities doubt
34 B
universally true. Legal judgment, on the other hand,
has a standard of proof in criminal prosecutions of:
Regarding the admissibility of evidence, which of the Relevance Authenticity Best evidence Nominally
35 prejudicial D
following is not a consideration:
Uninformed consent Forcible entry Obtained without None of the above
36 According to the text, the most common mistake that authorization C
prevents evidence seized from being admitted is:
In obtaining a warrant, an investigator must convince Evidence of a crime A crime has been The owner or The evidence is
the judge on all of the following points except: is in existence committed resident of the place likely to exist at the
to be searched is place to be searched
37 C
likely to have
committed the
crime
If, while searching a computer for evidence of a Abandon the Continue with the Stop the search and Continue with the
specific crime, evidence of a new, unrelated crime is original search, and original search but obtain a warrant original search,
38 discovered, the best course of action is: pursue the new line also pursue the new that addresses the ignoring the new C
of investigation inquiry new inquiry information
The process of documenting the seizure of digital Chain of custody Field notes Interim report None of the above
39 evidence and, in particular, when that evidence A
changes hands, is known as: Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917
When assessing the reliability of digital evidence, the Whether chain of Whether there are Whether the Whether the
investigator is concerned with whether the computer custody was indications that the evidence was evidence media was
40 that generated the evidence was functioning normally, maintained actual digital properly secured in compatible with B
and: evidence was transit forensic machines
tampered with
The fact that with modern technology, a photocopy of a Best evidence rule Due diligence Quid pro quo Voir dire
41 document has become acceptable in place of the A
original is known as:
Evidence contained in a document provided to prove Inadmissible Illegally obtained Hearsay evidence Direct evidence
42 that statements made in court are true is referred to evidence evidence C
as:
Business records are considered to be an exception to: Direct evidence Inadmissible Illegally obtained Hearsay evidence
43 evidence evidence D
Which of the following is not one of the levels of Probably Maybe Almost definitely Possibly
44 B
certainty associated with a particular finding?
45 Direct evidence establishes a: Fact Assumption Error Line of inquiry A
What is one of the most complex aspects of jurisdiction Arranging to travel Determining which Finding a court that Finding a federal
when the Internet is involved? to remote locations court can enforce a is in two states court that can hear a
46 to apprehend judgment over a civil suit B
criminals defendant
In the US, to enforce a judgment over a defendant, a Subject matter and General and limited Diversity and long None of the above
47 court must have which of the following? personal jurisdiction jurisdiction arm jurisdiction A
The Miller test takes which of the following into It appeals to the It depicts sexual It lacks any All of the above
public interest conduct in a monetary value
48 account when determining if pornography is obscene? B
patently offensive
way
Which of the following rights is not explicitly Right of the people Right of personal Right of the people Right to a speedy
49 mentioned in the US Constitution? to keep and bear privacy peaceably to and public trial B
arms assemble
The definition of a <protected computer= is, according A computer that is A computer that is A computer that is All of the above.
to the CFAA: used exclusively by used non- used in state or
a financial exclusively by a foreign commerce
institution or the financial institution or communication.
50 Federal government. or the Federal D
government and the
crime affects that
use.
The legislation that made the theft of trade secrets a The Lanham Act The Economic The Child None of the above
51 Federal crime was Espionage Act Pornography B
Protection Act
Which state does not have a law prohibiting simple California Texas Washington None of the above
52 hacking – gaining unauthorized access to a computer? D
The term <computer contaminant= refers to: Excessive dust Viruses, worms, and Spam e-mails Nigerian scam e-
53 found inside the other malware mails B
computer case
In those states with legislation addressing computer Computers Computer Specialized All of the above
54 forgery, contraband in the form of <forgery devices= equipment computer software D
may include:
Compelling a suspect to reveal passwords to provide Second Amendment Fourth Amendment Fifth Amendment Seventh
55 access to encrypted media is considered to fall under Amendment C
the:
An example of a content-related crime would be: Cyberstalking Child pornography Hacking None of the above
56 B
Hacking is an example of: Computer-assisted Computer-related Computer-integrity Computer
57 C
crime crime crime malfeasance crime
Forgery is an example of: Computer assisted Computer-related Computer-integrity Computer
58 A
crime crime crime malfeasance crime
In Ireland, the Non-Fatal Offences Against the State Act Computerized Cyberbullying Nigerian scams Hacking
59 welfare fraud B
of 1997 specifically addresses:
Jurisdiction claims may be based on: Location of the Location of the Location of All of the above
60 perpetrator’s victim’s computer intermediary D
computer computers
Standard operating procedures (SOPs) are important Help individuals Ensure that the best Increase the All of the above
because they: avoid common available methods probability that two
mistakes are used forensic examiners
will reach the same
61 D
conclusions when
they examine the
evidence
The goal of an investigation is to: Convict the suspect Discover the truth Find incriminating All of the above
62 B
evidence
An investigation can be hindered by the following: Preconceived Improperly handled Offender All of the above
63 theories evidence concealment D
behavior
When you have developed a theory, what can you do to Predict, based on Perform Conclude, based on All of the above
confirm that your hypothesis is correct? your hypothesis, experiments to test your findings,
64 where artifacts results and rule out whether the D
should be located alternate evidence supports
explanations the hypothesis
Which of the following would be considered an The originating IP A scratch on the Date-time stamps of All of the above
individual characteristic? address in a glass of a flatbed files on a disk or
65 B
network packet or e- scanner or digital entries in a database
mail header camera lens
When digital photographs containing child Someone in the Someone in the Someone in the None of the above.
pornography are found on a home computer, house transferred house took the house took the
investigators can assert that: a the photographs photographs with a photographs with a
66 onto the computer digital camera and digital camera and D
from a disk or the transferred transferred them
Internet them directly onto directly onto the
the computer. computer
Forensic examination involves which of the following: Assessment, Seizure and Recovery, All of the above
experimentation, preservation harvesting, filtering,
67 fusion, correlation, organization, and C
and validation search
Forensic analysis involves the following: Assessment, Seizure and Recovery, All of the above
experimentation, preservation harvesting, filtering,
68 fusion, correlation, organization, and A
and validation search
The first step in applying the scientific method to a Form a theory on Experiment or test Make one or more Form a conclusion
digital investigation is to: what may have the available observations based based on the results
69 occurred evidence to confirm on events that of your findings C
or refute your occurred
prediction
Which of the following should the digital investigator Should the evidence Will the evidence Will there be All of the above
consider when arranging for the transportation of be physically in the copies be shared environmental
possession of the with other experts factors associated
70 evidence? D
investigator at all at other locations? with the digital
times? media?
In the Staircase Model, why is case management Case documents are Case management Case management None of the above.
shown spanning across all of the steps in the process intangible objects provides stability documents the
model? that can be held. and enables process function.
71 investigators to tie B
all relevant
information
together.
Process models have their origins in the early theories Complicated Difficult Linear Polymorphic
72 of computer forensics which defined the field in terms C
of a ______ process
Generating a plan of action and obtaining supporting Preparation Survey/identificatio Preservation Examination and
73 resources and materials falls under which step in the n analysis A
digital investigation?
The process model whose goal is to completely The Physical Model The Staircase Model The Evidence Flow The Subphase
74 describe the flow of information in a digital Model Model C
investigation is known as:
The following organizations have published guidelines US Secret Service Association of Chief US Department of All of the above
75 for handling digital crime scenes: Police Officers Justice D
When a first responder encounters technology or Seize the equipment Seek assistance Leave that Ask the suspect for
as if it were a known from a more particular piece of details on the
76 equipment that he is not familiar with, the B
recommended course of action is to: device experienced digital equipment at the equipment
investigator crime scene
When preparing a questionnaire for interviewing Passwords Encryption keys Admission of guilt Details on
individuals of the crime scene which of the following removable storage
77 C
should NOT be requested:
When entering a crime scene, the initial survey should: Include user Involve tracing Collect relevant All of the above
manuals cables data such as
78 D
passwords and
account details
Examples of data that should be immediately USB drives Digital picture System and USB bracelets
79 preserved include: frames network C
information
The crime scene preservation process includes all but Protecting against Acquiring digital Confirming system Controlling access
80 which of the following: unauthorized evidence date and time to the crime scene C
alterations
A thorough crime scene survey should include: Manuals for Removable media Mobile devices All of the above
81 software D
applications
The challenge to controlling access to a digital crime Information may be The computer may The computer case None of the above.
stored on Internet be shared. may be locked.
82 scene is that: A
servers in different
locations
In the case where digital investigators dealing with Notify personnel at Notify personnel at Utilize remote None of the above
distributed systems need to collect data from remote the remote sites to the remote sites to forensics tools to
sites, the following procedure is recommended: leave everything as shut down all acquire data from
83 is, and arrange for systems and send the remote sites’ C
travel to the remote the hard drives to RAM as well as the
locations the forensic lab hard drives
When presenting evidence on an organizational System The CEO of the The CSO (Chief Additional forensic
84 network, the digital investigator may require the administrators organization Security Officer) investigators A
assistance of:
Which of the following is not a safety consideration for Additional Protection against Proper tools for Protective gloves
a first responder? personnel to control ELF emanations disassembling and and eyewear
85 those present at the from monitors reassembling B
crime scene computer cases
Digital investigators like to preserve every potential The law Resources The interests of All of the above
86 source of digital evidence; however, they are business D
constrained by:
During the initial survey of a crime scene, why it is This simplifies Photographing To record the fact None of the above.
necessary to photograph or videotape the area and inventorying the items to be seized that a particular
items of potential interest in their current state? crime scene records their actual item was actually
condition, and found at the crime
87 precludes damage scene. C
claims when the
items are returned
to the offender.
Why is the first step to secure the physical crime scene To prevent them To prevent them To give them time To keep them from
by removing everyone from the immediate area? from contaminating from asking to fill out a personal blocking the view
evidence questions about the information survey when photographs
88 A
case before they can are being taken
be interviewed
When a piece of evidence has both a biological and a The crime scene The digital Neither; the Both the crime
digital component, who should process it first? technician, because investigator, evidence should be scene technician and
biological artifacts because processing preserved and the digital
are much more the biological transported to the investigator, in a
fragile artifacts will destroy lab for processing cooperative effort,
digital evidence assuring that the
89 D
biological evidence
is collected in a way
that does not
damage the digital
component
The process of evaluating available evidence Equivocal forensic Investigative Threshold Behavioral imprints
objectively, independent of the interpretations of analysis reconstruction assessment
90 A
others, to determine its true meaning is referred to as:
The words that an offender uses on the Internet, the Investigation Threshold Behavioral imprints Crime scene
tools that an offender uses online, and how an offender reconstruction assessment analysis
91 C
conceals his identity and criminal activity are referred
to in the text as:
Investigative reconstruction is composed of three Which of the Functional Intentional Relational
following is NOT one
92 different forms B
of those three
forms? Patil CO 52 (madeforcollegeonly@gmail.com)
Downloaded by Prathamesh
lOMoARcPSD|14293917
Creating a histogram of times to reveal periods of high Functional Intentional Relational Temporal
93 activity is an example of which form of investigative D
reconstruction?
The investigation and study of victim characteristics is Criminal profiling Behavioral imprints Victimology Crime scene
94 analysis C
known as:
Why should victimology include a thorough search of Because the Because it is well Because nearly None of the above.
the Internet for cybertrails? a Internet can known that even everyone uses the
significantly traditional criminal Internet.
95 A
increase the victims offenses are
risk documented on the
Internet.
The type of report that is a preliminary summary of SITREP Threshold Full investigative Field notes
96 Assessment report report B
findings is known as:
According to the text, the distinguishing features of a Hard evidence Fruit of the poison Caveat emptor Crime scene
crime scene as evidenced by the offender’s behavioral tree characteristics
97 D
decisions regarding the victim and the offense location
are known as:
In crimes against individuals the ______ period leading 24-hour 48- hour 60-minute 15-minute
up to the crime often contains the most important
98 A
clues regarding the relationship between the offender
and the victim
One of the most important things to establish when a Where the What operating Who or what was None of the above
99 computer is directly involved in the commission of a computer was system is in use the intended victim C
crime is: purchased or target
An example of online behavior that puts an individual Using your real Putting personal Posting photographs All of the above
at higher risk for cyberstalking is: name online information in your on a social
100 D
profile networking page
In the movie Home Alone one of the burglars would Psychotic episode Signature-oriented Modus operandi Vandalism
always turn the water on in the sinks so that the house behavior
101 would be flooded when the owners returned. In terms B
of crime scene characteristics, this is an example of:
The totality of choices an offender makes during the The criminal’s MO Crime scene Tangible evidence None of the above
102 characteristics B
commission of a crime are referred to as:
Because seemingly minor details regarding the What the offender What the offender What the offender All of the above
offender can be important, investigators should get brought to the crime took from the crime changed at the crime
103 D
into the habit of contemplating which of the following: scene scene scene
One reason digital investigators write threshold They will be They keep their They take less time They serve as field
assessments more often than full reports is because: included in a final supervisor aware of to prepare and may notes for the
report, and so, their productivity. be sufficient to close investigator.
distribute the time out an investigation.
104 for final report C
preparation over the
entire period of the
investigation
Every violent crime investigation should incorporate Investigative leads Likely suspects Previously All the above
105 digital evidence because digital evidence may reveal: unknown crimes D
How the offender approaches and obtains control of a Motives Choice of weapons Modus operandi Signature behaviors
106 victim or target is significant because it exposes the A
offender’s:
Crime scenes fall into two categories – primary and Remote Secondary Ancillary Theoretical
107 B
____
When reconstructing evidence surrounding a violent Lay out all the Work with the Construct a timeline Begin the process of
crime, it is generally helpful to: evidence so it can be crime scene of events from converting field
viewed in its technicians so that a digital evidence notes to a final
108 entirety better report C
understanding of the
crime is achieved
One reason not to put too much trust into those who There has always They are typically They are usually not They may be the
run the company’s computers is that: been an antagonism too busy to take the authorized to offenders.
between system time to answer your answer questions.
109 D
administrators and questions
law enforcement
Although crime scenes are typically photographed, it is Diagramming is a The process of The quality of None of the above.
a good idea to create diagrams of the crime scene common crime creating a diagram photographs taken
because: scene technician’s can result in a digital at the crime scene is
skill; however, it investigator noticing not known until the
110 requires continual an important item of film is developed. B
practice evidence that would
otherwise have been
missed
Given the scope and consequences of violent crimes, Collect only that Focus only on the Seek out and Focus only on the
when collecting digital evidence it is advisable to: digital evidence that primary crime preserve all offender’s digital
is clearly connected scene, as searching available digital evidence, as the
to the offense the offender’s home evidence victim’s digital
111 C
and workplace evidence is usually
requires additional of little value
authorization
When swift action is needed, law enforcement Searches of this Exigent Eminent domain Mens rea
112 personnel may be permitted to conduct searches kind are permitted circumstances A
without a warrant under:
When processing the digital crime scene in a violent A good supply of More than one Standard operating A good supply of
crime investigation it is important to have ________ to electrostatic bags reliable camera for procedures for nitrile gloves
for holding sensitive photographing the processing a digital
113 ensure that all digital evidence and findings can hold C
up under close scrutiny electronic crime scene crime scene
components
The Federal statute that has a provision allowing ECPA CCPA The Privacy Act FCRA
Internet service providers to disclose subscriber
114 A
information to law enforcement in exigent
circumstances is:
When reconstructing evidence surrounding a violent Diagram the crime Create a timeline of Create a threat None of the above
115 crime, it is generally helpful to: scene events from digital assessment report B
evidence
A thief who has programmed and released a virus to Power assertive Profit oriented Power reassurance Anger retaliatory
roam a network looking for victim passwords used for
116 B
online banking is an example of what offense
behavior?
The case of a Michigan bank robber requiring tellers to Deviant aberrant Criminal humor Crime scene Investigative
117 undress so he could photograph them is an example of: behavior characteristics reconstruction C
The assessment of the victim as they relate to the Threat assessment Signature behaviors Behavioral evidence Victimology
118 offender, the crime scene, the incident, and the methodology analysis D
criminal justice system is known as:
Computers and mobile devices are treated as _________ Temporary Immediate Remote Secondary
119 crime scenes in violent crime investigations D
During the commission of a crime, evidence is Locard’s Exchange Sutherland’s Martin’s Rule d Parkinson’s Rule of
120 transferred between the offender’s computer and the Principle General Theory of Available Space A
target This is an example of: Criminology
Intruders who have a preferred toolkit that they have Usually have little Show little initiative Are generally more Pose less of a threat
experience and are – letting the tool do experienced
121 pieced together over time, with distinctive features: C
relying on the kit the work
In the case of a computer intrusion, the target The remote crime The auxiliary crime The virtual crime The primary crime
122 scene scene scen scene D
computer is:
A computer intruder’s method of approach and attack Skill level Knowledge of the Intent All of the above
123 target D
can reveal significant amount about their:
Determining skill level can lead to: Determining the Likely hiding places Suspects Offense behaviors
124 extent of the for rootkits and C
intrusion malware
If digital investigators find an unauthorized file, they Immediately move Check for other Execute the file to Permanently delete
125 should: the file to removable suspicious files in determine its the file B
media the same directory purpose
Remote forensic solutions can be used to access live Acquire and, Image systems Conduct Image large systems
sometimes, analyze without ever having examination and across the Internet
126 systems, and include the ability to: A
memory to leave the lab analysis without the
need to image
A forensic analysis conducted on a forensic duplicate Virtual analysis Clone analysis Post-mortem Ex post facto
127 of the system in question is referred to as: analysis analysis C
Capturing all of the network traffic to and from the Allow the network Reveal the source of Seriously slow None of the above
compromised system can: administrators to the attack down the network,
participate in the affecting normal
investigation, work
128 B
establishing rapport
for later interviews
A common technique that is highly useful and can be This embodies a Temporal proximity Timeline analysis File system analysis
applied in a computer intrusion investigation is to principle known as:
129 A
simply focus on file system activities around the time
of known events
The registry key New software Time and date Trojans A list of recently run
HKLM\Software\Microsoft\Windows\Current Version entries information programs
130 C
is one of the most common locations for:
When collecting data from a compromised computer, CMOS Most volatile Magnetic Optical
131 consideration should be given to collecting the ______ B
data first.
The forensic examiner needs to be aware that the Is seldom useful Can take an Is only needed for Changes the
132 process of collecting memory: and not often called extremely long standalone systems contents of memory D
for period of time c d
A more thorough method of collecting specific volatile Examine the Collect the full Selectively collect Take screenshots
133 data from a computer is to: specific memory contents of physical contents of physical B
addresses live memory memory
Why are <non-volatile= storage locations contained in This is an old RFC No form of data An RFC is a Request None of the above.
the RFC 8227 <Order of Volatility=? and has not been storage is for Comments – and
134 updated permanent corrections are B
expected.
The first state in the United States to enact a law to Texas b Hawaii c California d New York
135 C
deal with cyberstalkers was: a
The first cyberstalking law in the US was passed in: 1985 b 1990 c 1995 d 2000
136 B
Stalkers want to exert power over their victims, Fear Anxiety Autosuggestion Peer pressure
137 A
primarily through:
A stalker’s ability to frighten and control a victim Telephone numbers Addresses Personal All of the above
138 increases with the amount of information that he can preferences D
gather, such as:
Stalkers have taken to the Internet because: The cost of an They depend They no longer have None of the above
Internet connection heavily on to go out to do their
has dropped information and the stalking
139 B
considerably Internet contains
vast amounts
An implication from studies indicating that many Part of the blame The offender is Investigators Investigators
stalkers had prior acquaintance with their victims is can be assigned to likely to be found in should pay should always check
the victim the same area as the particular attention the immediate
140 that: C
victim to acquaintances of family
the victim
An excellent set of guidelines developed specifically for The National Center The National White The Department of The National
141 victims of stalking is available from: for Victims of Crime Collar Crime Center Justice Institute of Justice A
When a cyberstalking case is stalled, it is a good idea to The victim might The information The time between None of the above
interview the victim again, because: have been that investigators the first and second
withholding have gathered might interviews has given
142 B
information during help the victim the victim time to
the first interview recall additional seek counseling
details
In determining how and why the offender selected a Knew the victim Learned about the Noticed the victim All of the above
143 specific victim, the investigator should determine victim through a in a chat room D
whether the cyberstalker: personal web page
A key aspect of developing victimology is determining Hobbies Likes and dislikes Risks Roles
144 C
victim and offender _____
When searching for evidence of cyberstalking, it is Grooming Surreptitious Initial contact Congenial
145 useful to distinguish between an offender’s harassing monitoring B
behaviors and ____________ behaviors
That part of cyberstalking where the offender is using Profiling Trolling Surreptitious None of the above.
146 monitoring C
the Internet to find a victim is known as:
When a cyberstalker chooses victims at random, he is Opportunistic Power assertive Profit-oriented None of the above
147 stalker stalker stalker A
said to be an:
The initial stage in a cyberstalking investigation is to: Search for Analyze crime scene Conduct Interview the victim
148 additional digital characteristics victimology and risk D
evidence assessments
It is extremely important for the investigator to be If the victim If the investigation The victim must be The victims
extremely cautious when dealing with a stalking case becomes offended is conducted too protected, in case frequently become
because: by the investigator’s openly, the offender the offender decides emotionally
methods, she is may stop the to escalate to attached to the
149 C
likely to go file a harassment and physical violence investigator
complaint move on to another
victim
Which of the following is NOT part of the set of Preparation Interdiction Documentation Reconstruction
150 B
forensic methodologies referenced in this book?
Preparation planning prior to processing a crime scene What computer What the systems Whether a network All of the above
151 should include: equipment to expect are used for is involved D
at the site
The forensic crime scene processing kit should include Evidence bags, tags, Forensically Compilers for Hardware write
and other items to sanitized hard developing forensic blockers
152 all of the following, EXCEPT: C
label and package drives to store tools on site
evidence acquired data
When processing the digital crime scene, one aspect of Recognizing Determining if Confirming that the Making sure there is
surveying for potential sources of digital evidence is: relevant hardware electrical wiring is operating sufficient space to
such as computers, capable of environment is set up the forensic
153 A
removable media, supporting forensic suitable for crime scene
etc machines electronic processing kit
equipment
The _____________ documentation specifies who handled Evidence inventory Chain of custody Evidence intake Preservation notes
154 the evidence, when, where, and for what purpose B
When documenting a crime scene, the computer and The more evidence This provides a It is prudent to All of the above.
surrounding area should be photographed, detailed collected, the record for what to document the same
155 sketches should be made, and copious notes should be stronger the case. look for when you evidence in several C
taken, because: return for the ways.
second visit.
In regard to preservation, in a child pornography Photographs Papers Digital cameras All of the above
156 investigation, which of the following should be D
collected?
If it is determined that some hardware should be Nearest reach Direct connectivity Independent Slice-the-pie
collected, but there is no compelling need to collect doctrine doctrine component doctrine doctrine
157 C
everything, the most sensible approach is to employ:
According to the us Federal guidelines for searching 60-80 degrees 50-90 degrees 50-90 degrees 60-80 degrees
and seizing computers, safe temperature ranges for Fahrenheit centigrade Fahrenheit centigrade
158 C
most magnetic media are:
Which of the following is NOT an artifact that will be Running processes Open network ports Data stored in System date and
159 irrevocably lost if the computer is shut down? memory time D
Which of the following is NOT one of the Place the evidential Preview the Extract just the Acquire everything
recommended approaches to preserving digital computers and evidential computer, information needed from evidential
storage media in taking appropriate from evidential computer and
160 evidence? B
secure storage for notes computers and storage media
later processing storage media
The reason UNIX <dd= is considered a de facto standard The majority of tools <dd= stands for <dd,= although a The developers of
for making bitstream copies is: for examining digital <digital data= and UNIX tool, is <dd= have made
evidence can was developed for universally able to arrangements with
161 A
interpret bitstream making forensic traverse Windows other forensic
copies copies. file systems. software companies.
Regarding the examination of a piece of digital What is it What classifications Where did it come What is its value?
evidence, which of the following is NOT one of the (identification)? distinguish it? from?
162 D
fundamental questions that need to be answered?
Which of the following issues is NOT one that a Invasive The facility in the The location, Available methods
forensic examiner faces when dealing with Windows- characteristics of standard Windows organization, and for recovering data
163 based media? the Windows environment for content of Windows from Windows B
environment mounting a hard system log files media
drive as Read-Only
Forensically acceptable alternatives to using a Linux boot floppy FIRE bootable CD- Booting into safe Hardware write
164 Windows Evidence Acquisition Boot Disk include all ROM mode blockers C
but which of the following?
The standard Windows environment supports all of FAT16 ext2 FAT32 NTFS
165 B
the following file systems EXCEPT ______
Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917
The Windows NT Event log Appevent Contains a log of Records activities Notes system None of the above
application usage that have security events such as
168 A
implications, such as shutdowns
logins
When examining the Windows registry key, the <Last The last time When a value in The current system The number of
169 Write Time= indicates:
RegEdit was run b that Registry key time allowable changes
B
was altered or has been exceeded
added
File system traces include all of the following EXCEPT: Metadata CMOS settings Swap file contents Data object date-
170 time stamps B
When a file is moved within a volume, the Last Is unchanged Changes if a file is Changes if a file is Is unchanged;
moved to different moved to the root however, the
171 Accessed Date Time: A
directory Created Date-Time
does change
Internet traces may be found in which of the following Web browser cache Instant messenger Cookies All of the above
172 cache D
categories?
The Windows NT Event log Secevent evt: Contains a log of Records activities Notes system None of the above
application usage that have security events such as
173 B
implications, such as shutdowns
logins
Which of the following is NOT one of the methods FDDI Telecommunication WiFi access points Bluetooth piconets
174 mobile devices use to communicate? networks A
One major advantage of mobile devices from a forensic People very seldom The process for Flash memory is Manufacturers
perspective is that: delete information deleting information deleted block-by- reserve a part of
from mobile devices is much more block and mobile memory for storing
complicated than for devices generally deleted items
adding information, wait for a block to be
175 C
and users frequently full before it is
don’t delete things deleted
correctly
The reason that malware developers are beginning to Because available The malware Since the coding is Since mobile
target mobile devices is: memory is much market has become much simpler on devices are used
smaller and the very crowded and mobile devices, more and more for
operating system is developers are many new online banking and
much less looking for new programmers are making purchases,
176 D
sophisticated on avenues trying at this they have become
mobile devices, it is particular platform prime targets for
much easier to computer criminals
develop malicious
code
Software designed to monitor activities on mobile Malware b Spouseware c Trojan defense d None of the above
177 B
devices has come to be called: a
One of the dangers (from a forensic standpoint) of Connected Network service Connected Network service
mobile devices is: networks can providers may networks can enable providers may
contain provide information offenders to delete provide additional
investigatively for comparison with data remotely historical call
178 C
useful information data extracted from records
a mobile device
One of the difficulties unique to forensic processing of MD five hashes Documentation An investigator Any issues
mobile devices is: must be calculated must show must make a encountered with
for data recovered continuous calculated decision processing the
from mobile devices possession and to either prevent or device should be
179 control allow the device to documented C
receive new data
over wireless
networks
Powering down a mobile device and removing the When the battery is Doing so may The process of You now have two
battery may cause problems in that: a removed from a activate security removing the pieces of evidence,
mobile device, the measures such as battering can cause which have to be
180 information in lock codes and a capacitive documented B
memory is lost encryption discharge,
destroying the
device
Which of the following are methods for preserving Reconfigure the Place the device in Jam RF signaling in All of the above
device to prevent an RF-shielded the immediate area
181 mobile devices by isolating them from the networks? D
communication pouch
from the network
Why is it important to collect charging cables when Mobile device To reduce owner In those cases None of the above
seizing mobile devices? batteries have a complaints about where evidence
limited charge life missing cables seized is forfeit, you
span, and the device when, at some point, want to make sure
will need a charger seized devices are you have everything
182 A
to maintain the returned you need to operate
battery until the the device
device can be
processed
Which of the following is NOT one of the currently Manual operation Logical acquisition
Connecting the Physical acquisition
available methods for extracting data from mobile via user interface via communication
communication port via the
183 devices? port
directly to an output communication port C
device such as a
printer
Forensic examiners should be aware that a mobile May as well be May only indicate May require that None of the above
device with a blank or broken display: thrown away, as no that the screen is the mobile device be
data will be damaged and it may sent out to the
184 B
recovered from it still be possible to manufacturer for
extract data repairs
A peculiarity of mobile devices is the format that they ASCII Unicode GSM 7-bit Baudot
185 C
store SMS messages, which is: a
The primary reason that brute-force methods are not A four-digit PIN After three failed PIN disclosure by None of the above
represents 10,000 attempts, the SIM the offender can be
186 used when trying to access an SIM card with the PIN B
set is: possible card will become required by a court
combinations locked order
An understanding of networks helps with which of the Establishing Tracking down Understanding All of the above
continuity of offense offenders traces of online
187 following: D
activities left on a PC
When a Windows system connects to a shared folder TCP/IP SMB NetBIOS All of the above
on another Windows machine on the Internet, which
188 D
of the following protocols are used?
Hosts that connect two or more networks are called: Routers Switches Hubs All of the above
189 A
190 Which of the following are Layer 7 protocols? Ethernet HTTP TCP All of the above B
Ethernet uses which of the following technologies? CDPD CSMA/CD CDMA All of the above
191 B
192 Another name for a hub is: Switch Router Concentrator NIC C
Currently, the most widely used Internet protocols are: TCP UDP IP All of the above
193 D
The OSI reference model divides Internets into seven Transport, Session, Presentation, Data- Physical, Data-link, Data-link, Network,
layers Choose the correct order, by layer Network, link, Application, Network, Transport, Session, Application,
194 Presentation, Data- Physical, Transport, Session, Physical, Network, C
link, Application, Session, Network Presentation, Session
Physical Application
The layer that actually carries data via cables or radio Transport layer Physical layer Network layer Data-link layer
195 B
signals is the:
A hub joins hosts at the physical level whereas a switch Transport Physical Network Data-link
196 D
joins them at the _____ layer
The layer responsible for managing the delivery of Application layer Presentation layer Transport layer Session layer
197 C
data is the:
Which of the following network technologies uses a Ethernet FDDI Asynchronous 802.11
198 Transfer Mode B
fiber-optic medium?
Preservation of digital evidence can involve which of Collecting computer Making a forensic Copying the files All of the above
the following? hardware image of storage that are needed
199 D
media from storage media
A forensic image of a drive preserves which of the Memory contents File slack and System date and Screen contents
200 unallocated space time B
following?
Examination of digital evidence includes (but is not Seizure, Recovery, Experimentation, Arrest,
201 limited to) which of the following activities? preservation, and harvesting, and fusion, and interviewing, and B
Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
documentation reduction correlation trial
lOMoARcPSD|14293917
Analysis of digital evidence includes which of the Seizure, Recovery, Experimentation, Arrest,
202 following activities? preservation, and harvesting, and fusion, and interviewing, and C
documentation reduction correlation trial
Evidence can be related to its source in which of the Top, middle, bottom IP address, MD5 Production, Parent, uncle,
203 following ways? value, filename, date- segment, alteration, orphan C
time stamps location
When a website is under investigation, before Determine where Inform personnel at Conduct a None of the above
obtaining authorization to seize the systems it is the web servers are the web server reconnaissance
204 necessary to: located location that you’ll probe of the target A
be coming to seize website
the systems
Which of the following is NOT an information Scanning the Studying security Attempting to Examining e-mail
205 gathering process? system remotely audit reports bypass logon headers C
security
Unlike law enforcement, system administrators are Open unread e- Monitor network Modify system logs Divulge user
permitted to ________ on their network when it is mails traffic personal
206 information B
necessary to protect the network and the data it
contains
Although it was not designed with evidence collection EnCase FTK Wireshark CHKDSK
207 in mind, _______can still be useful for examining C
network traffic
Issues to be aware of when connecting to a computer Creating and Keeping a log of Documenting which All of the above
over a network and collecting information include: following a set of actions taken during server actually
208 standard operating the collection contains the data D
procedures process that’s being
collected
Occasionally, an intrusion detection system may False warning Failsafe DEF con False positive
trigger an alarm caused by an innocent packet that
209 D
coincidentally contains intrusion class characteristics
This type of alert is called:
Information security professionals submit samples of Bugtraq Sam Spade CNET Security Focus
log files associated with certain intrusion tools to help
210 A
others detect attacks on the mailing lists at:
Which of the following are situations where a The hard drive is The system cannot The digital All of the above
bitstream copy may not be viable? too large to copy be shut down investigator does
211 not have authority D
to copy the entire
drive
Who is authorized to conduct online undercover Anyone Computer security Journalists Law enforcement
212 investigations when child pornography is involved? professionals D
Which of the following Internet services can be used to IRC Usenet KaZaa All of the above
213 D
exchange illegal materials?
What are two of the most useful headers for From and Message- NNTP-Posting-Host Path and Subject RFC1036 and
214 ID and X-Trace RFC2980 B
determining the origination of Usenet messages?
What information should you document when Date/time of Screenshots of Download copies of All of the above
searching for evidence on the Web? search, search significant search the webpages and
215 engine and terms results calculate their MD5 D
used, address of value
pertinent results
Why is it important to hide your identity when To reduce the risk
To get yourself in To make it easier All of the above
of alerting the the mindset of for you to determine
216 conducting an online investigation? A
offender covert web the offender’s
investigating location
When it is not possible to determine the identity of the Look for unusual Search the Web Look for similar All of the above
author of a Usenet message using IP addresses in the signature and use of using distinctive Usenet messages
217 D
header, what else can you do to learn more about the language aspects of posts posted using an alias
author?
What characteristics of IRC make it attractive to IRC enables them to IRC provides them IRC gives them All of the above
criminals? exchange illegal with some level of direct, <live= access
218 materials with other anonymity to a large pool of D
criminals potential victims
Which of the following enables a user to connect to IRC Freenet psybnc bot Fserve All of the above
219 and run IRC fserves without disclosing their IP B
address?
Which of the following applications leave traces of Internet Explorer KaZaA IRC All of the above
220 D
Internet activities on a personal computer?
Which of the following tools can reconstruct TCP Tcpdump Wireshark Snoop EnCase
221 B
streams?
Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917
What peer-to-peer clients use the Fast Track network? KaZaA Grokster iMesh All of the above
222 D
Web Whacker and Httrack are examples of tools that: Search the Web Deface websites Capture websites Launch websites
223 C
Metaverseink is a: Search tool (people Newsgroup Social networking A file-sharing peer-
224 or things) for virtual aggregator meta-tool to-peer network A
worlds
Second Life is one of the better known: Research websites Archive websites Virtual worlds Web-based game
225 C
shows
Synchronous chat networks are particularly conducive Privacy Immediacy Impermanence All of the above
226 D
to criminal activity because of their
What is the maximum cable length for a 10BaseT 10 feet 100 feet 10 meters 100 meters
227 D
network?
What is the approximate theoretical maximum number 10 Mb 75 Mb 100 Mb 175 Mb
228 of bytes that can be downloaded in one minute on a B
10BaseT network?
Which of the following commands can be used to Netstat Ping Nbtstat Traceroute
229 obtain the MAC address of a remote Windows C
computer?
What is the maximum cable length for a 10 base five 100 feet 500 feet 100 m 500 m
230 D
segment?
ARP stands for: Address Resource Advanced Retrieval Address Resolution Added Resource
231 Protection Protocol Protocol Processing C
The best operating system for capturing network Microsoft OpenBSD/FreeBSD Linux Solaris
232 traffic on high-speed networks is: DOS/Windows B
Which of the following applications is used to capture Snort Wireshark Tcpdump All of the above
233 D
network traffic?
How many bytes per packet does tcpdump capture by 10 bytes 68 bytes 128 bytes 1024 bytes
234 B
default?
Which of the following tools can reconstruct TCP Tcpdump Wireshark Snoop EnCase
235 B
streams?
The transition method in which only one computer can Baseband Narrowband Broadband Sideband
236 transmit while all the others listen is known as: A
In addition to the IP address of the sender, SMTP e- The Message ID The time the The name of the All of the above
243 mail server logs contain which of the following? message was sender D
received
10
11
12
13
14
15
What is a blockchain?
A) A Currency B) A centralized ledger C) A distributed ledger on a peer to peer network D) Technology
What is a node?
A) Blockchain B) An exchange C) A type of cryptocurrency D) A computer on a Blockchain network
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
EMERGING TRENDS IN COMPUTER AND
INFORMATION TECHNOLOGY (22618)
2. What are the three general categories of computer systems that can contain digital
evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D
10. Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related
crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B
12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A
13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This
is an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A
14. Personal computers and networks are often a valuable source of evidence. Those
involved with should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above
Ans:
15. An argument for including computer forensic training computer security specialists is:
A. It provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above.
Ans: C
16. The digital evidence are used to establish a credible link between
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A
18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.
19. The evidences or proof can be obtained from the electronic source is called the
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A
25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A
30. The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31. When cases got to trial your forensics examiner play one of role.
A. 2
B. 4
C. 3
D. 5
Ans. A
A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B
A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above
Ans. C
True or False Questions
1. Digital evidence is only useful in a court of law.
A. True
B. False
Ans: B
2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A
5. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
Ans: B
6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A
10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B
11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A
12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A
15. is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B
19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A
23. exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24. Connecting into network through a rogue modem attached to computer behind a firewall is an
example of -
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B
25. comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C
32. Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B
37. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
Ans. A
38. A penetration tester must identify and keep in mind the &
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A
39. The legal risks of ethical hacking include lawsuits due to of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B
40. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)
2. Which of the following tool is used for Network Testing and port Scanning
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
6. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
12. is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D
15. What are the some of the most common vulnerabilities that exist in a network system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B
17. Attempting to gain access to a network using an employee’s credentials is called the
mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called .
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
30. framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
31. is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32. is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
39 is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
41. is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A
45. Which type of hacker represents the highest risk to your network?
A. black-hat hackers
B. grey-hat hackers
C. script kiddies
D. disgruntled employees
Ans: D
49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C
50. In computer networking, is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A
Ans:-A
52. We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest and .
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B
53. Network consist devices such as routers, firewalls, hosts that you must assess as a part of
process.
A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D
54. Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D
55. attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B
64. What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Ans:B
Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.
Q16 The Digital evidence are used to established a credible link between……….
A)Attacker and victim and the crime scene B)Attacker And information
Q17 The evidence and proof that can be obtained from the electronic source is called the…….
A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned
A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Q22 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:
Q24 Who are use their skill to identify security problem with computer network
A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Q25 To crack the password you need cracking tool such as:
A)Information
Q32 Which of the following used for the Network Testing and port scanning
Q33 The whole email server may be targeted for a complete interruption of services with these failure
like
Q34 Which is the top most directory in the server file system
A)Root Directory
A)LINUX
A)Ethereal
Q40 An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment
a. SIMD
b. STUDENT
c. SHRDLU
d. BACON
d.Playing a Game
3. Who is the “father” of artificial intelligence?
a.John McCarthy
b. Fisher Ada
c. Allen Newell
d.Alan Turning
4.Which of the following is a proposed means of testing the intelligence of the machine?
a.Turing Test
b.Turning Test
c.Tuning Test
d.None
a.Control System
b.Associative Memory
c.Primary Memory
d.Secondary Memory
a. seven
b. Two
c.three player
d. Multiplayer
a. Validity
b.Satisfiability
c. Logical equivalence
d.All of these
8.Single inference rule also called…
a. Resolution
b. Reference
c.Reference
d.None of these
9.Factoring means…
2. What are the three general categories of computer systems that can contain digital
evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
10. Private networks can be a richer source of evidence than the Internet because:
a. They retain data for longer periods of time.
b. Owners of private networks are more cooperative with law enforcement.
c. Private networks contain a higher concentration of digital evidence.
d. All of the above.
Question 1. Which of the following statements best describes a white-hat hacker?
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Answer 1. Option A.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer 2. Option C..
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer 3. Option D.
Question 4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
Answer 4. Option D
Question 5. The security, functionality, and ease of use triangle illustrates which
concept?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer 6. Option A.
Question 7. What are the three phases of a security evaluation plan? (Choose
three answers.)
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer 8. Option B.
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer 9. Option B.
Question 10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Answer 10. Option A.
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
Answer: b
2. Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
Answer: c
3. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber
crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
Answer: d
4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
Answer: a
5. The amateur or newbie in the field of hacking who don’t have many skills about coding and
in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer: c
7. Criminal minded individuals who work for terrorist organizations and steal information of
nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
Answer: c
8. One who disclose information to public of a company, organization, firm, government and
private agency and he/she is the member or employee of that organization; such individuals are
termed as ___________
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
Answer: d
9. These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
Answer: b
10. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
Answer: a
a. Logical reasoning
b. Common sense
c. Preconceived theory
d. Investigator’s intuition
4. A scientific truth attempts to identify roles that are universally true. Legal judgment, on
The other hand, has a standard of proof in criminal prosecutions of:
a. Balance of probabilities
b. Beyond a reasonable doubt
c. Acquittal
d. None of the above
a. Relevance
b. Authenticity
c. Best evidence
d. Nominally prejudicial
6. According to the text, the most common mistake that prevents evidence seized from
Being admitted is:
a. Uninformed consen
b. Forcible entry
c. Obtained without authorization
d. None of the above
7. In obtaining a warrant, an investigator must convince the judge on all of the following
Points except:
8. If, while searching a computer for evidence of a specific crime, evidence of a new,
Unrelated crime is discovered, the best course of action is:
a. Abandon the original search, and pursue the new line of investigation
b. Continue with the original search but also pursue the new inquiry
c. Stop the search and obtain a warrant that addresses the new inquiry
d. Continue with the original search, ignoring the new information
9. The process of documenting the seizure of digital evidence and, in particular, when that
Evidence changes hands, is known as:
a. Chain of custody
b. Field notes
c. Interim report
d. None of the above
10. Evidence contained in a document provided to prove that statements made in court are
True is referred to as:
a. Inadmissible evidence
b. Illegally obtained evidence
c. Hearsay evidence
d. Direct evidence
Chapter 5 Basics of Ethical hacking
1. What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
Answer: a
3. ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
Answer: a
7. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d
8. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
Answer: a
9. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c
10. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Chapter 5 Basics of Ethical hacking
1. What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
Answer: a
3. ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
Answer: a
7. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d
8. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
Answer: a
9. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c
10. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Chapter 6 Types of hackers
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Answer. Option A.
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer. Option C.
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer. Option D.
Question 4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
Answer. Option D.
Question 5. The security, functionality, and ease of use triangle illustrates which
concept?
Question 6. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer. Option A.
Question 7. What are the three phases of a security evaluation plan? (Choose
three answers.)
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer. Option B.
Question 9. Which federal law is most commonly used to prosecute hackers?
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer. Option B.
Question 10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Answer. Option A.
Ans:D
Ans: A
3. Who proposed Road Map for Digital Forensic Research (RMDFR)
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____ question based
on available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document
opens and the application automatically runs); spread via email
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989
Ans: B
A.1960's
B.1970's
C.1980's
D.1990's
Ans: C
10. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
10 MCQs from Each Chapter of Emerging Trend in Computer Science
----------------------------------------------------------------------------------------------
Ans: C
(A) PROLOG
(B) Java
(C) LISP
(D) Perl
Ans: D
3. What is state space?
Ans: D
Ans: C
Ans: A
6.A heuristic is a way of trying
(B) To search and measure how far a node in a search tree seems to be
from a goal
(C) To compare two nodes in a search tree to see if one is better than
the other
Ans: D
7. A* algorithm is based on
Ans: C
Ans: B
Ans: A
10. Which is not a property of representation of knowledge?
Ans: A
Chapter-2 Internet of Things
----------------------------------------------------------------------------------------------
D. None of these
Ans: D
4. Which of the following is not an example of a “small-scale
embedded system”?
A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C
D. All of these
Ans: D
D. All of these
Ans: B
Ans: B
----------------------------------------------------------------------------------------------
5. In the past, the method for expressing an opinion has been to frame
a ____ question based on available factual evidence.
(A) Hypothetical
(B) Nested
(C) Challenging
(D) Contradictory
Ans: A
6. More subtle because you are not aware that you are running these
macros
7. There are three c's in computer forensics. Which is one of the three?
(A) Control
(B) Chance
(C) Chains
(D) Core
Ans: A
----------------------------------------------------------------------------------------------
Ans: C
evidence?
Ans: D
3. In terms of digital evidence, a hard drive is an example of:
B. Communication systems
Ans: A
B. Communication systems
Ans: C
B. Communication systems
Ans: C
6. In terms of digital evidence, the Internet is an example of:
B. Communication systems
Ans: B
C. Civil disputes
Ans: D
Ans: C
9. Cyber trails are advantageous because:
D. Offenders who are unaware of them leave behind more clues than
they otherwise
would have.
Ans: D
Ans: C
Chapter 5 Basics of Hacking (CO5)
----------------------------------------------------------------------------------------------
C. Encryption.
D. None of these.
Ans. B
A. Scanner
B. Decoder
C. Proxy
D. All of these.
Ans. D
A. Strengths.
B. Weakness.
C. A &B
D. None of these.
Ans. B
4. Ethical hacking will allow to____ all the massive security breaches.
A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B
A. Maintaining Access.
B. Reconnaissance
C. Scanning.
D. Gaining Access.
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. ______ is the art of exploiting the human elements to gain access to
the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
Ans. A
Ans. B
Ans. A
9. Who described a dissertation on fundamentals of hacker’s attitude?
A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman.
Ans. B
A. Decade.
B. Year.
C. Century
D. Era.
Ans. C
Chapter-6 Types of Hacking (CO6)
-----------------------------------------------------------------------------------------------
Ans: C
2. Which of the following tool is used for Network Testing and port
Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
D. Script Kiddies
Ans: A
4. An attacker can create an________attack by sending hundreds or
thousands of e-mails a with
A. Connection Attack
Ans: B
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
A. Netcat
B. SamSpade
C. SuperScan
Ans: C
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks
Ans: B
9. Which Nmap scan is does not completely open a TCP connection?
B. TCP scan
D. ACK scan
Ans: A
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
Ans: A
MCQ EMERGING TRENDS
Chapter 1: - artificial inteligence
1) is a branch of science which deals with helping machine find solution to complex to
problem in a more human like a fashion.
(a) Artificial intelligence
(b) Internet of think
(c) Embided system
(d) Cyber security
2) Is a message that consist relavat meaning , implication , or input for decision and or
action.
(a) Data
(b) Information
(c) Knowledge
(d) Intelligence
3) The goal is for the software to use what is it is was learned in one area to solve
problem in other area.
(a) Machine learning
(b) Deep learning
(c) Neural network
(d) All of above
4) the consist of computer program that mimic the way the human brain process
information.
(a) Machine learning
(b) Deep learning
(c) Neural learning
(d) All of this
5) A heuristic is a rule of thumb-------
(a) Strategy
(b) Trick
(c) Simplification
(d) All of above
7) Is branch of science that deals with programming the system in such that they
automatically learn with experience
(a) Machine learning
(b) Deep earning
(c) Neural learning
(d) All of above
9) The characteristic of the computer system cable of thinking, reasoning and learning is
know as
(a) Machine intelligence
(b) Human intelligence
(c) Artificial intelligence
(d) Virtual intelligence
7. By clicking which key the PubNub will display public, subscribe, and secret
keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
8. The messageChannel class declares the _________ class attribute that defines
the key string.
a) command_key
b) command-key
c) commandkey
d) Key_command
10. _________ and _________ saves the publish and subscribe keys that we have
generated with the PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe
7) The evidences of proof that can be obtained from the electricity source is
called the
(a) Digital evidence
(b) Demonstrative evidence
(c) Explainable evidence
(d) Substantial evidence
5) What are the three general categories of computer system that can
contain digital evidence
(a) Desktop ,laptop ,server
(b) Personal computer
(c) Hardware, software
(d) Open computer system
3). ___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
4). Leaking your company data to the outside network without prior permission of
senior authority is a crime.
a) True
b) False
5). _____________ is the technique used in business organizations and firms to protect
IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach .
7). Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
8). An ethical hacker must ensure that proprietary information of the firm does
not get leaked.
a) True
b) False
9). After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
10). __________ is the branch of cyber security that deals with morality and
provides different theories and a principle regarding the view-points about what
is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
6) what type of ethical hack test access to the physical infra structure
(a) internal network
(b) remote network
(c) external network
(d) physical network
7) the security functinallity and ease of use triangle illustrated which concept
(a) a security increase, functionality and ease of use increase
(b) a security decrease, functionality and ease of use increase
(c) a security increase, functionality and ease of use decrease
(d) security does not affect functionality and ease of use
10) when a hackers attempt to attack a host via the internet is the know as
what type of attack
(a) remote attack
(b) local access
(c) internal attack
(d) physical access
Unit3. basics of digital forensics
1. What is Digital Forensic?
b. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
c. A process where we develop and test hypotheses that answer questions about digital
events
a. Authenticity
b. Comparison
c. Proving
d. Enhancement
4. Which of the following represents the step of scientific method?
I- Develop hypothesis based on evidence
II- Calculate hash value of evidence
III- Test the hypothesis to look for additional evidence
IV-make an imaging of the original evidence
a. I and IV
b. I and II
c. II, III and IV
d. All of above
5. What is the Primary Objectives of Digital Forensic for Business and Industry?
a. Availability of service
b. Prosecution
c. Continuity of operation
d. Security
6. Which of the following hold the highest value of evidence in the court?
a. Documentary
b. Demonstrative
c. Testimonial
d. Real
10. When you give ____ testimony, you present this evidence and explain what it is and how it
was obtained.
a. technical/scientific
b. expert
c. lay witness
d. deposition
Unit-4 Digital Evidences
1. A valid definition of digital evidence is:
a. Data stored or transmitted using a computer
b. Information of probative value
c. Digital data of probative value
d. Any digital evidence on a computer
2. What are the three general categories of computer systems that can contain digital evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
3. In terms of digital evidence, a hard drive is an example of:
a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above
a) MIT
b) Stanford University
c) California
d) Bell’s Lab
9. In which year, hacking became a practical crime and a matter of concern in the field of
technology?
a) 1971
b) 1973
c) 1970
d) 1974
10. When a hacker attempts to attack a host via the Internet it is known as what type of
attack?
a. Local access
b. Remote attack
c. Internal attack
d. Physical access
11. Which tool can be used to perform a DNS zone transfer on Windows?
a. DNSlookup
b. nslookup
c. whois
d. ipconfig
Unit-6 Types of Hacking
1. Why would a hacker use a proxy server?
a. To create a stronger connection with the target.
b. To create a ghost server on the network.
c. To obtain a remote access connection.
d. To hide malicious activity on the network.
2. A security audit performed on the internal network of an organization by the network
administration is also known as ___________.
a. Grey-box testing
b. Black-box testing
c. White-box testing
d. Active testing E. Passive testing
3. Which are the four regional Internet registries?
a. APNIC, PICNIC, NANIC, RIPE NCC
b. APNIC, MOSTNIC, ARIN, RIPE NCC
c. APNIC, PICNIC, NANIC, ARIN
d. APNIC, LACNIC, ARIN, RIPE NCC
4. Attempting to gain access to a network using an employee’s credentials is called the _____________
mode of ethical hacking.
a. Local networking
b. Social engineering
c. Physical entry
d. Remote networking
5. What tool can be used to perform SNMP enumeration?
a. DNSlookup
b. Whois
c. Nslookup
d. IP Network Browser
a. LDAP
b. TCP
c. SQL
d. HTTP
a. ICANN
b. ARIN
c. APNIC
d. DNS
MCQ Chapter 01
3) Which among this, is an AI created by IBM partner with Fluid PVT. Used specially for
‘Data Analysis?’
a) EVE AI
b) Watson
c) Siri
d) Novel AI
Ans: b) Watson
Ans: b) Languages of AI
5) The given illustrative diagram is related to which topic?
a) Machine Learning
b) Neural Network Processing
c) Reasoning
d) Deep learning
Ans: a) Machine Learning
8) These machines can use stored data for a limited time period only.
a) Reactive Machine
b) Self-Awareness
c) Limited machine
d) Theory of mind
Ans: c) Limited machine
MCQ Chapter 03
Digital Forensics is a series of steps to _________ and _________ electronic data through
________ method.
MCQ Chapter 04
Ans: a. It states that multiple copies of electronic files may be a part of the “original” or equivalent
to the “original.”
4. According to Locard’s Exchange Principle, contact between two items will result in an
_________.
a. War
b. Love
c. Exchange
d. Failure
Ans: c. Exchange
5. Which of the following is used to portray data more specifically and is helpful in determining
the background of digital evidence?
a. Data
b. Metadata
c. Cookies
d. History
Ans: b. Metadata
8. You must have both ____ and ____ to validate your evidence.
a. Proof and victim
b. Power and skill
c. Power and proof
d. Proof and skill
Ans: b. power and skill
2. A hacker who gains access to system with a view to fix the identified weaknesses is known as
a. White hat hackers
b. Grey hath hackers
c. Red hat hackers
d. Hacktivist
Ans: a. white hat hackers
a. Police
b. Victim
c. Thief
d. Hacker
Ans: c. Thief
5. Which type of hackers are invited by the software vendors to find the security flaws in their
system?
a. White hat hackers
b. Black hat hackers
c. Grey hat hackers
d. Blue hat hackers
Ans: d. Blue hat hackers
7. A non-skilled person who gains access to computer system using already made tools are
known as?
a. Grey hat hackers
b. Hacktivist
c. Script kiddies
d. Phreakers
Ans: c. Script kiddies
8. Identifying weakness in computer system or network to exploit its weaknesses to gain access
is known as
a. Cracking
b. Cybersecurity
c. Hacking
d. Threatening
Ans: c. Hacking
MCQ Chapter 06
1. Which of the following is not a network testing and port scanning tool?
a. Nmap
b. SuperScan
c. John the ripper
d. NetCat
Ans: c. John the Rippers
2. Select the most appropriate option for the below two statements.
6. Which attack allows the attacker to execute the scripts on the victim’s browser?
a. SSL attack
b. Cookie attack
c. Banner grabbing
d. XSS attack
Ans: d. XSS attack
8. As an ethical hacker, you should scan all ________ UDP and TCP port on each network host
that’s found by your scanner.
a. 65535
b. 65353
c. 65333
d. 65555
Ans: a. 65535
9. Which of the following are the foundation of all the technical security issues in your
information systems?
a. Network Infrastructure vulnerabilities
b. Information vulnerabilities
c. System Infrastructure vulnerabilities
d. Network Information vulnerabilities
Ans: a. Network infrastructure vulnerabilities
10. Which attack is an HTTP attack which allows attackers to access restricted directories and
execute commands outside the web servers root directory?
a. XSS attack
b. Path Traversal attack
c. MITM attack
d. SQL Injection attack
Ans: b. Path traversal Attack
a. a sensor
d.a network
2. Which command is used to test network connectivity and provide a response to each packet
received by the remote host?
a.test
b.tracer
c.ping
d.connect
3. What type of device could allow a refrigerator to place a replacement order for an item contained
within it?
a.digital network
b.generator
c.smart phone
d.sensor
4. True or False?
Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or
PC.
a.true
b.false
6. What is comprised of millions of smart devices and sensors connected to the internet?
a.the fog
d.the cloud
a.artificial intelligence
b.Packet Tracer
c.internet
d.PAN
8. True or False?
The Internet of Things will connect inanimate objects to the network with intelligent sensors.
a.true
b.false
9. Which type of network is used to connect a company located in one area of a city to another
location in a city far away?
a.LAN
b.PAN
c.MAN
d.WAN
10. Which type of computing is located at the edge of a business or corporate network and that allows
data from sensors to be preprocessed?
a.internet
b.fog
c.wireless
d.WAN
SIMD
STUDENT
SHRDLU
BACON
And:- SHRDLU
Education
Defense
Energy
Justice
And:- Defense.
John McCarthy
Fisher Ada
Allen Newell
Alan Turning
5. KEE is a product of
IntelliCorpn
Teknowledge
Texas Instruments
Tech knowledge
Ans:- IntelliCorpn .
Analogical reasoning
Bitonic reasoning
Non-monotonic reasoning
Monotonic reas
Ans:- Weak AI is the study of mental faculties through the use of mental models
implemented on a computer.
mobile
open loop
intelligent
non-servo
Ans:- intelligent .
9. One of the leading American robotics centers is the Robotics Institute located
at
RAND
MIT
CMU
SRI
And:- CMU
10. What is the name of the computer program that contains the distilled
knowledge of an expert?
setq
add
set
eva
Ans:- setq
13. Which is not the commonly used programming language for AI?
PROLOG
LISP
Perl
Java script
And:- Perl
14. Which is not a property of representation of knowledge?
Inferential Adequacy
Representational Adequacy
Representational Verification
Inferential Efficiency
1. When cases go to trial, you as a forensics examiner can play one of ____ roles.
a. 2 c. 4
b. 3 d.5
Ans:- 2
2. When you give ____ testimony, you present this evidence and explain what it is and how it
was obtained.
b. expert d. deposition
And:- technical/scientific.
3. Validate your tools and verify your evidence with ____ to ensure its integrity
4. For forensics specialists, keeping the ____ updated and complete is crucial to supporting
your role as an expert and showing that you’re constantly enhancing your skills through
training, teaching, and experience.
b. CV d. deposition
Ans:- CV
5. If your CV is more than ____ months old, you probably need to update it to reflect new
cases and additional training.
a. 2 c. 4
b. 3 d. 5
Ans:- 3
6. __ is a written list of objections to certain testimony or exhibits.
a. Defendant c. Plaintiff
b. rebuttal d. venireman
Ans:- strikes
8. ____ from both plaintiff and defense is an optional phase of the trial. Generally, it’s allowed
to cover an issue raised during cross-examination
Ans:- Rebuttal
9. If a microphone is present during your testimony, place it ____ to eight inches from you.
a. 3 c. 5
b. 4 d. 6
Ans:- 6
10. Jurors typically average just over ____ years of education and an eighth-grade reading
level. a. 9 c. 11
b. 10 d. 12
Ans:- 12
4. Digital Evidences
2. What are the three general categories of computer systems that can contain digital
evidence?
b. Communication systems
b. Communication systems
b. Communication systems
b. Communication systems
c. Civil disputes
d. Offenders who are unaware of them leave behind more clues than they otherwise would
have.
10. Private networks can be a richer source of evidence than the Internet because:
5. Basic of Hacking
AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above
3. what is the primary goal of an Ethical Hacker ?
Avoiding detection
Testing security controls
Resolving security vulnerabilities
Determining return on investment for security measures
Maintaining access
Gaining access
Reconnaissance
Scanning
Black-hat hackers
Grey-hat hackers
Script kiddies
Disgruntled employees
Hacktivism
Black-hat hacking
Active hacking
Activism
7. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
Local access
Remote attack
Internal attack
Physical access
8. Which are the four regional Internet registries?
A. Security professional
D. Malicious hacker
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
7. What are the three phases of a security evaluation plan? (Choose
three answers.)
B. Preparation
C. Conclusion
D. Final
E. Reconnaissance
F. Design Security
G. Vulnerability Assessment
Answer :- A, B, C.
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
9. Which federal law is most commonly used to prosecute hackers?
A. Title 12
B. Title 18
C. Title 20
D. Title 2
10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
MCQ’S
1. IOCE is …………………..?
a. Organization on computer evidence
b. Organization on communication evidence
c. Organization on country education
d. Organization on crime evidence
Ans : a)Organization on computer evidence
MCQ’S
a. Routing Table
b. Main memory
c. Log files
d. Cached Data
Ans : c) Log files
6. Investigation means :
a. Collection of information
b. A procedure to find the Digital Evidence
c. Searching over internet
d. Hacking computer systems
Ans : b) A procedure to find the Digital Evidence
7. The evidence or proof that can be obtained from the electronic source is called the ………
a. Digital evidence
b. Demonstrative evidence
c. Explainable evidence
d. Substantial evidence
Ans : a) Digital evidence
MCQ’S
1. What is hacking ?
a. Identifying weakness in computer system or networks
b. Refers to act of locating vulnerabilities
c. A security to your personal data
d. Protocols of corrupting data
Ans : a) Identifying weakness in computer system or networks
7. Which IEEE standards specify the technologies for wireless LANs 802.11
a. IEEE 802.11
b. IEEE 802.10
c. IEEE 279.6
d. IEEE 275.4
Ans : a) 802.11
Watson
Ans: b) Languages of AI
Ans: b) Three
7) The term “Strong” or “Super” AI comes under which ‘type’ of AI?
a) Type-1
b) Type-2
c) None of the above
d) All of the above
Ans: a) Type-1
8) These machines can use stored data for a limited time period only.
a) Reactive Machine
b) Self-Awareness
c) Limited machine
d) Theory of mind Ans: c)
Limited machine
Ans: d) Four
CHAPTER 2: Internet of Things
1) Raspbian is:
a) Assembler
b) Language
c) Compiler
d) OS
Ans:- d. OS
a) SigFox
b) WiFi
c) NB-oT
d) LoRa
Ans:- b. WiFi
3) Computer programs that mimic the way the human brain processes information is called as:-
a) Machine learning
b) Deep learning
c) Neural networks
Ans:- c. Neural
networks
4) is a branch of Science which deals with the helping machine find
solutions to complex problems in a more human like fashion
a. Artificial Intelligence
b. Internet Od Things
c. Embedded system
d. cyber Security
a. RSVP
b.TCP
c. DCCP
d. UDP
Ans:- d. UDP
a) Bluetooth
b) UART
c) WiFi
d) HTTP
Ans:- d. HTTP
8) IoT stands for:-
a) Internet of Technology
b) Intranet of Things
c) Internet of Things
d) Information of Things
Ans:- c. Internet of
Things
d) None of these
a. Connectivity
b. Self-configuring
c. Endpoint Management
d. Artificial Intelligence
Ans:- b. Self-configuring
CHAPTER 3: Basics of Digital Forensics
11. Which of the following sciences pay vital role in criminal justice systems ?
a. Digital Forensics
b. Forensic Science
c. PC Forensics
d. INTERPOL Forensic
Ans : b) Forensic Science
18. Who proposed the UML Modelling of Digital Forensic Process Model
a. Kohn, Eloff and Oliver
b. Response Team
c. Only (a)
d. None of the above
Ans : a) Kohn, Eloff and Oliver
13. How many steps are there the legality of ethical hacking ?
a. 5
b. 2
c. 7
d. 6
Ans : a) 5
17. Which IEEE standards specify the technologies for wireless LANs 802.11
a. IEEE 802.11
b. IEEE 802.10
c. IEEE 279.6
d. IEEE 275.4
Ans : a) 802.11
18. LINUX is an
a. Application
b. Software
c. Toolkit
d. Operating System
Ans : d) Operating System
Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.
Q12 In Computer intrusions the attacker will be leave multiple traces of there presence in:
Q16 The Digital evidence are used to established a credible link between……….
A)Attacker and victim and the crime scene B)Attacker And information
Q17 The evidence and proof that can be obtained from the electronic source is called the…….
A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned
A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None
Q22 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:
Q24 Who are use their skill to identify security problem with computer network
A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Q25 To crack the password you need cracking tool such as:
A)Information
Q32 Which of the following used for the Network Testing and port scanning
Q33 The whole email server may be targeted for a complete interruption of services with these failure
like
Q34 Which is the top most directory in the server file system
A)Root Directory
Q35 Which list is used in the authorization process
A)LINUX
A)Ethereal
Q40 An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
5. When a hacker attempts to attack a host via the Internet it is known as what
type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user
A. It increases security.
B. It makes security harder to enforce.
C. It removes the employee’s responsibility to make judgments.
D. It decreases security.
Chapter No 3 : Basics Of Digital Forensic
C. A process where we develop and test hypotheses that answer questions about
digital events
A. True
B. False
A. Authenticity
B. Comparison
C. Proving
D. Enhancement
4. Which of the following represents the step of scientific methodI- Develop hypothesis
based on evidenceII- Calculate hash value of evidenceIII- Test the hypothesis to look for
additional evidence IV-make an imaging of the original evidence
A. All above
B. I and III
C. II and IV
A. Availability of service
B. Continuity of operation
C. Prosecution
D. Security
6. Which of the following hold the highest value of evidence in the court?
A. Documentary
B. Demonstrative
C. Testimonial
D. Real
a.Defendant
c.Plaintiff
d.Motion in limine
9. Attorneys can now submit documents electronically in many courts; the standard format
in federal courts is ____.
d. Postscript (PS)
10. A(n) ____is a document that lets you know what questions to expect when you are
testifying.
a.written report
b.affidavit
c.examination plan
d.subpoena
evidence?
b. Communication systems
b. Communication systems
b. Communication systems
b. Communication systems
c. Civil disputes
d. Offenders who are unaware of them leave behind more clues than they otherwise
would have.
10. Private networks can be a richer source of evidence than the Internet because:
3. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
7. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
8. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False
9. After performing ____________ the ethical hacker should never disclose client information
to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
10. __________ is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
4. What are the three general categories of computer systems that can contain digital
evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
1. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
Ans: A
B. ELIZA
Ans: C
B. Logic model
C. Computational model
D. None of above
Ans: C
5. Communication between man and machine is related with ______
A. LISP B.
ELIZA
C. All of above D.
None of above
Ans: B
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D
7. The concept derived from ________ level are propositional logic, tautology,
predicate calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
9. The ____ level contains constituents at the third level which are knowledge based
system, heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A
11. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP B.
ELIZA C.
PROLOG D.
NLP
Ans: A
Chapter-2 Internet of Things
A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D
B. False
Ans: A
B. Internet of Things
Ans: C
Ans: A
5. MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
B. XML
C. XHL
D. MPL
Ans: B
Ans: A
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
9. What does HTTP do?
D. Enables network resources and reduces perception of latency and Allows multiple
concurrent exchange.
Ans: D
Ans: A
Chapter-3 Basics of Digital Forensics
E. None of above
Ans: D
Ans: B
Ans: D
4. What is called as the process of creation a duplicate of digital media for purpose
of examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
5. Which term refers for modifying a computer in a way which was not originally intended
to view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
6. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called?
A.Robotis
C.ComputerForenss
D.Animation
Ans: C
7. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B.Steganogrhy. C.
Liveanalysis
D. Hashing.
And: B
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
C. .iso
D. .asm
Ans: D
Chapter-4 DIGITAL EVIDENCE
9. Private networks can be a richer source of evidence than the Internet because:
a. They retain data for longer periods of time.
b. Owners of private networks are more cooperative with law enforcement.
c. Private networks contain a higher concentration of digital evidence.
d. All of the above
10. Digital evidence can be duplicated exactly without any changes to the original data.
a. True
b. False
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
2. What is the first phase of hacking?
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
3. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
5. Hacking for a cause is called __________________
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
A. Title 12
B. Title 18
C. Title 20
D. Title 2
A. 21
B. 25
C. 23
D. 80
9. What is the primary goal of an Ethical Hacker?
a. Avoiding Detection
b. Determining return on investment (ROI) for security measure
c. Resolving security vulnerabilities
d. Testing Security Controls
10. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to
crack a system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
2. Which is the legal form of hacking based on which jobs are provided in IT industries
and firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
3. They are nefarious hackers, and their main motive is to gain financial profit by doing
cyber crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
5. The amateur or newbie in the field of hacking who don’t have many skills about
coding and in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
6. Criminal minded individuals who work for terrorist organizations and steal
information of nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
7. These types of hackers are the most skilled hackers in the hackers’ community. Who
are “they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
8. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
9. Governments hired some highly skilled hackers. These types of hackers are termed
as _______
a) Special Hackers
b) Government Hackers
c) Cyber Intelligence Agents
d) Nation / State sponsored hackers
10. __________ security consultants uses database security monitoring & scanning
tools to maintain security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
ETI 22618 Question Bank
66. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer
D. None of the above.
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
70. What is size of the IPv6 Address?
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Ans: C
71. MQTT stands for _____________
A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
View Answer
Answer: a
Explanation: Industrial Internet of Things (IIoT) is the subset of IoT that associates itself with connected manufacturing
operations to design and craft products and services.
2. IIoT is sophisticated.
a) True
b) False
View Answer
Answer: b
Explanation: Using IIoT, the previous labor intensive, time consuming technique can be substituted with vibrant,
sophisticated, and automated mechanisms.
3. What does design provide?
a) Technology
b) Ecosystem
d) Digital revolution
View Answer
Answer: c
Explanation: Design not only provides the framework for how technology works and how it’s used but also places it in a
broader context that includes the total ecosystem with which it interacts and the possibility of unintended consequences.
4. Which possibility ensures load balancing and peak levelling of energy consumption?
c) Automotive
View Answer
Answer: b
Explanation: Energy and utilities: A network of smart grids, smart meters and devices continuously communicate with each
other to ensure load balancing and peak levelling of energy consumption, down to the device level.
5. Which possibility automatically communicates with other vehicles?
c) Automotive
View Answer
Answer: c
Explanation: Automotive: Within the automotive space, the connected car concept is a game changer. New models
continuously generate data when in operation.
6. Which possibility connects the production line to suppliers?
c) Automotive
View Answer
Answer: d
Explanation: Connected supply chain: By connecting the production line to suppliers, all stakeholders can understand
interdependencies, the flow of material and process cycle times.
7. Which possibility provides inter connectivity between shop floor and top floor?
View Answer
Answer: c
Explanation: Plant control flow operation: The IoT data network provides inter connectivity between shop floor and top floor,
which enables the automation of specific process and reduces the human intervention required to address issues.
8. Which possibility is the highest contributor to cost overhead for manufacturing facilities?
View Answer
Answer: d
Explanation: Energy management and resource optimization: Energy is among the highest contributor to cost overhead for
manufacturing facilities.
a) Edward L. Schneider
b) Kevin Ashton
c) John H.
d) Charles Anthony
2. The huge numbers of devices connected to the Internet of Things have to communicate
a) Bot to Bot(B2B)
b) Machine to Machine(M2M)
c) InterCloud
d) Skynet
a) General device
b) Information
c) IoT devices
d) Object
a) Internet of Things
b) Network Interconnection
c) Object Determination
d) None of these
5. _____________ is a computing concept that describes the idea of everyday physical objects
b) MQTT
c) COAP
d) SPI
a) Artificial Intelligence
b) Machine Learning
c) Internet of Things
d) None of above
a) Process
b) People
c) Security
d) Things
d) None of above
a) Smart Watch
b) ATM
c) Radio
d) Video Game
b) Satellite
c) Cable
d) Broadband
11. _____________ refers to establish a proper connection between all the things of IOT.
a) Connectivity
b) Analyzing
c) Sensing
d) Active Engagement
12. IOT devices which have unique identities and can perform _____________
a) Remote sensing
b) Actuating
c) Monitoring capabilities
a) Cloud-based servers/storage.
b) I/O interfaces.
c) Internet connectivity.
a) Wearable sensors.
b) Smart watches.
c) LED lights.
a) Sense
c) Both a and b
d) None of above
a) Standard
b) Non-standard
c) Both
d) None
17. _____________ layer protocols determine how the data is physically sent over the network’s
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
18 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
19. ___ layer perform the host addressing and packet routing.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
20. _________layer is responsible for error free, end to end delivery of data from source host to
destination host.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
21. The _______ protocols that focus on process to process connections using ports
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
d) None of above
23. ______________ is a collection of wired Ethernet standard for the link layer.
a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4
a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4
a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4
a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4
27. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
a) Zigbee
b) Allsean
c) Tyrell
d) Microsoft's Azure
a) 2G
b) 3G
c) 4G
) None of above
a) 2G
b) 3G
c) 4G
d) None of above
30 ______include LTE.
a) 2G
b) 3G
c) 4G
d) None of above
31. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
b) Coaxial cable
a) 10 Gbit/s.
b) 1 Gbit/s
d) 250 Kb/s
33. _______________ is useful for time-sensitive application that have very small data units to
a) TCP
b) UDP
c) Transport layer
35. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
a) HTTP
b) COAP
c) WebSocket
d) MQTT
37. Which one out of these is not a data link layer technology?
a) Bluetooth
b) UART
c) Wi-Fi
d) HTTP
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
Collect data
Manage data
security
store data
40.Through which network does Open IoT manage registration, deployment of sensors?
LSM
HTTP
X-GSN
GSN
Explanation: C) Open IoT manages registration, deployment of sensors through X-GSN.
Identify among the following which is not a fundamental component of IoT system.
User interface
Sensors
Transformers
Connectivity and data processing
Among the following layers, identify the one which is used for wireless connection in IoT devices.
Datalink layer
Transport layer
Network layer
Application layer
Explanation: A) Data link layer is used for wireless connection in IoT devices.
Ans:D
Ans: A
A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989
Ans: B
A.1960's
B.1970's
C.1980's
D.1990's
Ans: C
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
Ans: B
A. Accessing the system's directories viewing mode and navigating through the various systems
Ans: D
D. The investigator must maintain strict confidentiality, discussing the results of an investigation
Ans: B
A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out of physical or
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
Ans: C
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
B. A copy is made onto forensically sterile media. New media should always be used if
available.
D. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation
C. Review phase.
D. Deployment phase.
Ans: B
phase?
C. Review phase.
D. Deployment phase.
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
C. Review phase.
D. Deployment phase
Ans: C
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B
26. Which model of Investigation proposed by Carrier and Safford?
Ans: B
Ans. D
A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
D. All of above
E. None of above
Ans: D
D. All of above
E. None of above
Ans: D
D. To honor confidentially.
Ans: B
33. Which of following is a not unethical norm for Digital Forensics Investigation?
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and analysis
on user input.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: A
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
D. Deleting files.
Ans: C
ETI Questions-
1) The science and engineering of making intelligent machines, especially intelligent
computer programs are known as
a) Machine learning
b) Artificial Intelligence
c)Deep Learning
d) Neural Network
2) Which AI system not store memories or past experiences for future actions
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above
a) Logic
b) Cognition
c) Function
d) All of the above
a) Deep Learning
b) Neural Network
c) Machine Learning
d) None of the Above
6) Weak AI is
b) a set of computer programs that produce output that would be considered to reflect
a. Fisher Ada
b. John McCarthy
c. Allen Newell
d. Alan Turning
11) Which of the following is not the commonly used programming language for Artificial
Intelligence?
a) Perl
b) Java
c) PROLOG
d) LISP
14) Which of the following machine requires input from the humans but can interpret the
outputs themselves?
a) Actuators
b) Sensor
c) Agents
d) AI system
a. Data visualization
b. Data Analytics
c. Data mapping
d. Data storytelling
16) Chomsky's linguistic computational theory generated a model for syntactic analysis
through
a. regular grammar
b. regular expression
c. regular word
d. none
17) Which AI should understand human emotions, people, and beliefs and be able to
interact socially like humans.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of the above
18) Ability to think, puzzle, make judgments, plan, learn, communication by its own is
known as___ AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of the above
19) Strong AI is__________
a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a
computer
d) All of the above
20) In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
a) Marvin Minsky
b) Alain Colmerauer
c) John McCarthy
d) None of above
21) The conference that launched the AI revolution in 1956 was held at:
a) Dartmouth
b) Harvard
c) New York
d) Stanford
a. Targeted audience
b. General audience
c. Specific audience
24) A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device
which drastically limits the search for solutions in large problem spaces.
a) Heuristic
b) Critical
c) Value based
d) Analytical
25) What of the following is considered to be a pivotal event in the history of AI.
a) 1949, Donald O, The organization of Behaviour.
b) 1950, Computing Machinery and Intelligence.
c) 1956, Dartmouth University Conference Organized by John McCarthy.
d) 1961, Computer and Computer Sense.
28) Which of the following is used to capture data from the physical world in IoT devices?
a) Sensors
b) Actuators
c) Microprocessors
d) Microcontrollers
31) Which of the following protocol is used to link all the devices in the IoT?
a) HTTP
b) UDP
c) Network
d) TCP/IP
32) Which of the following is false about the MANET IoT network?
a) It is a self-configuring network
b) It has a low data rate
c) It does not have any encryption
d) Power is readily available for complex security
33) Internet domain name and hostname are translated into IP address by
35) Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a. ALOHA
b. CSMA/CA
c. CDMA
d. none of the mentioned
a) Mobile phone
b) Television
c) Smart Speaker
d) Smart Meters
a) User communication
b) System transfer
d) Create connection
a) IP
b) HTTP
c) MQTT
d) CoAP
39) Which of the following devices is used to measure the gases or liquid?
a) Optical Sensor
b) Gas Sensor
c) Smoke Sensor
d) Pressure sensor
a) Micro-wire or plus
b) Microwire
c) Data SPI
d) Queued SPI
41) Which of the following devices is used to measure the gases or liquid?
a) Optical Sensor
b) Gas Sensor
c) Smoke Sensor
d) Pressure sensor
b) Human sensor
d)Follow sensor
43) The address of the original IEEE 802 MAC comes from ___________.
a. Http
b. Ethernet address
c. IP address
d. MAC address
44) The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of
himself/herself behind, is:
a). Locard’s Exchange Principle
b) Differential Association Theory
c) Beccaria’s Social Contract
d) None of the above
47) Which programming language is used by Arduino IDE IoT software for writing codes?
a) Python
b) Java
c) C/C++
d) JavaScript
48) The autonomous ________ based IoT platforms are used for internal management of the
corresponding enterprise.
a) eGovermnent related
b) Enterprise-based
c) Company based
d) Business oriented platform
49) The IoT platforms are mainly divided into how many types
a) 3 types
b) 5 types
c) 4 types
d) 2 types
2) Which AI system not store memories or past experiences for future actions
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above
a) Logic
b) Cognition
c) Function
d) All of the above
a) Deep Learning
b) Neural Network
c) Machine Learning
d) None of the Above
6) Weak AI is
b) a set of computer programs that produce output that would be considered to reflect
a. Fisher Ada
b. John McCarthy
c. Allen Newell
d. Alan Turning
11) Which of the following is not the commonly used programming language for Artificial
Intelligence?
a) Perl
b) Java
c) PROLOG
d) LISP
14) Which of the following machine requires input from the humans but can interpret the
outputs themselves?
a) Actuators
b) Sensor
c) Agents
d) AI system
a. Data visualization
b. Data Analytics
c. Data mapping
d. Data storytelling
16) Chomsky's linguistic computational theory generated a model for syntactic analysis
through
a. regular grammar
b. regular expression
c. regular word
d. none
17) Which AI should understand human emotions, people, and beliefs and be able to
interact socially like humans.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of the above
18) Ability to think, puzzle, make judgments, plan, learn, communication by its own is
known as___ AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of the above
19) Strong AI is__________
a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a
computer
d) All of the above
20) In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
a) Marvin Minsky
b) Alain Colmerauer
c) John McCarthy
d) None of above
21) The conference that launched the AI revolution in 1956 was held at:
a) Dartmouth
b) Harvard
c) New York
d) Stanford
a. Targeted audience
b. General audience
c. Specific audience
24) A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device
which drastically limits the search for solutions in large problem spaces.
a) Heuristic
b) Critical
c) Value based
d) Analytical
25) What of the following is considered to be a pivotal event in the history of AI.
a) 1949, Donald O, The organization of Behaviour.
b) 1950, Computing Machinery and Intelligence.
c) 1956, Dartmouth University Conference Organized by John McCarthy.
d) 1961, Computer and Computer Sense.
28) Which of the following is used to capture data from the physical world in IoT devices?
a) Sensors
b) Actuators
c) Microprocessors
d) Microcontrollers
31) Which of the following protocol is used to link all the devices in the IoT?
a) HTTP
b) UDP
c) Network
d) TCP/IP
32) Which of the following is false about the MANET IoT network?
a) It is a self-configuring network
b) It has a low data rate
c) It does not have any encryption
d) Power is readily available for complex security
33) Internet domain name and hostname are translated into IP address by
35) Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a. ALOHA
b. CSMA/CA
c. CDMA
d. none of the mentioned
a) Mobile phone
b) Television
c) Smart Speaker
d) Smart Meters
a) User communication
b) System transfer
d) Create connection
a) IP
b) HTTP
c) MQTT
d) CoAP
39) Which of the following devices is used to measure the gases or liquid?
a) Optical Sensor
b) Gas Sensor
c) Smoke Sensor
d) Pressure sensor
a) Micro-wire or plus
b) Microwire
c) Data SPI
d) Queued SPI
41) Which of the following devices is used to measure the gases or liquid?
a) Optical Sensor
b) Gas Sensor
c) Smoke Sensor
d) Pressure sensor
b) Human sensor
d)Follow sensor
43) The address of the original IEEE 802 MAC comes from ___________.
a. Http
b. Ethernet address
c. IP address
d. MAC address
44) The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of
himself/herself behind, is:
a). Locard’s Exchange Principle
b) Differential Association Theory
c) Beccaria’s Social Contract
d) None of the above
47) Which programming language is used by Arduino IDE IoT software for writing codes?
a) Python
b) Java
c) C/C++
d) JavaScript
48) The autonomous ________ based IoT platforms are used for internal management of the
corresponding enterprise.
a) eGovermnent related
b) Enterprise-based
c) Company based
d) Business oriented platform
49) The IoT platforms are mainly divided into how many types
a) 3 types
b) 5 types
c) 4 types
d) 2 types
2) A _____ is a simple network scanning technique used for determining which range of IP
address map to live hosts.
a) Scan sweep
b) Ping sweep
c) Scan ping
d) Host ping
9) __ is a tool that allows you to look into a network and analyze data across the wire for
network optimization, security and troubleshooting purposes.
a) SuperScan
b) Network Analyzer
c) Netcat
d) Nmap
11) _______is a UNIX -based program alerts you via email if it detects changes in MAC
addresses associated with specific IP addresses on the network.
a) ARP spoofing
b) ARP Poisoning
c) ARP Watch
d) MAC address spoofing
12) Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
14) ___software stores encrypted WEP keys in the Windows Registry even for multiple
networks
a) NetStumbler
b) Orinoco Client Manager
c) AiroPeek
d) None
16) Which of the following tool is used for Network Testing and Port Scanning?
a) NetCat
b) SuperScan
c) NetScan
d) All of the above
21) __ can grab information from routers and other network hosts, such as a wireless access
point or managed Ethernet switch
a) Netcat
b) Netscan
c) Telnet
d) Superscan
6.2 MCQ’S
Q1.Which program acts as an interface between the software and the computer hardware.
a. Operating System.
b. Microsoft.
c. Linux.
d. Unix.
Q9. Http Response Splitting, Directory Traversal and XSS includes which operating system.
a. Linux.
b. UNIX.
c. Windows.
d. None of the above.
Q10. Which of the following are windows vulnerabilities.
a. Microsoft platform for their networking needs.
b. The windows operating system for networking usage.
c. Web servers and database servers on the windows platform.
d. All of the above.
Q11. In windows platform what are the many organizations run critical servers.
a. Both c and d.
b. None of the below.
c. Web servers.
d. Database servers.
Q12. When windows and other Microsoft software are attacked especially by.
a. A widespread Internet-based worm or virus hundreds of thousands of organization.
b. Millions of computers are affected.
c. Both a and b.
d. None of the above.
Q13. Leakage of confidential information, including files being copied and credit card numbers
being stolen are leading.
a. Many well-known attacks against windows.
b. Microsoft Windows.
c. Linus
d. Both b and c
Q14.what are the Many well-known attacks against windows can lead to.
a. Passwords being cracked and used to carry out other attacks.
b. Systems taken completely offline by DoS attacks.
c. Credit card numbers being stolen and many more things.
d. All of the above.
Q15. Systems taken completely offline by which attacks.
a. Memory Corruption.
b. DoS attacks.
c. XSS attacks.
d. Sql Injection.
Q16. When insecure windows-based systems are attacked by which of the following.
a. Leakage of confidential information.
b. Passwords being cracked.
c. Entire databases being corrupted or deleted.
d. None of the above.
Q 18. ____________ is the cyclic practice for identifying & classifying and then solving the
vulnerabilities in a system.
a. Bug protection
b. Bug bounty
c. Vulnerability measurement
d. Vulnerability management
Q 21. Remote exploits is that type of exploits acts over any network to exploit on security
vulnerability.
a. True
b. False
Q 23. Which is the most popular OS that hackers are attacking most.
a. windows
b. Microsoft windows.
c. Linux.
d. all of these.
Q 25. What is the purpose for many organizations installing Linux for their web servers and e-
mail servers in expectations of.
a. Saving money.
b. For some reasons.
c. None of the above.
d. Both a and b.
6.3.1 Applications Hacking
2) Why messaging software both at the client and server level is vulnerable?
a. Network administrators forget about securing these systems.
b. Believe that antivirus software is all that’s needed to keep trouble away.
c. Ignore the existing security vulnerabilities.
d. All of the above
6) Which tool determines e-mail server version information based on how the server
responds to malformed SMTP requests?
a. Ethereal
b. Dsniff
c. Smtpscan
d. Ettercap
7) ________ is a famous technological medium for the spread of malware, facing problems
of spam and phishing attacks.
a. Cloud
b. Pen drive
c. Website
d. Email
1.__________is a security vulnerability that allows an attacker to alter backend SQL statements
by manipulating the user supplied data.
a. SQL Injection
b. Cross site Scripting
c. both a & b
d. None of above
3. XSS vulnerabilities target scripts embedded in a page that are executed on the _______
a. Client Side
b. Server Side
c. Both a & b
d. None of Above
6.________type of hackers attack web site that store valuable information like credit card and
Social Security numbers.
a. Script Kiddies
b. Criminal Hackers
c. Ethical Hacker.
d. None of Above
2. Which type of data keeping longer than necessary increases the impact of a security breach?
4.__________ attacks cyber criminals often target the database that is where the money is.
a) Cyber crime
b) Denial of service
c) Security
d) None of the above
7.________security estimates that 83 percent of all wed sites are vulnerable to at least one form
of attack.
a) Black Hat
b) Script kiddies
c) White Hat
d) All of the above
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
lOMoARcPSD|14293917
cwipedia.in
Question Bank (I scheme)
1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of
problem solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
30. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the
natural language A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
Ans: C
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: D
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human. A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
Ans: A
A. Narrow AI
B. General AI
C. Super AI
D. None of above
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans. A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
Ans: A
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
Ans: A
67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____. A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Ans: D
3. Which of the following is not true about embedded systems?
A. Built around specialized hardware
B. Always contain an operating system
C. Execution behavior may be deterministic
D. All of these
E. None of these
Ans: E
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
C. CPU
D. CPLD
Ans: C
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
Ans: - A
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
D. None of above
Ans: C
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network. A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
A. Zigbee
B. 6LoWPAN
C. CoAP
D. All of the above
Ans: C
66. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer D. None of the above.
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
D. MQ Telemetry Transport
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
C. Connection services
D. Congestion control
Ans: A
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server. A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
Ans: C
Ans:C
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud. A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
Ans.A
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation? A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
D. Enormous Scale
Ans: D
123. ________ in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B
Ans: C
A. Standard
B. Non-standard
C. Both
D. None Ans: B
137. ___ is an open source electronic platform based on easy to used hardware and software. A.
Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
B. PH
C. IC
D. None of aboved
Ans:A
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989 Ans:
B
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as: A.
Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
20. To collect and analyze the digital evidence that was obtained from the physical investigation
phase, is the goal of which phase? A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B
D. Deployment phase.
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
24. ___________is well established science where various contribution have been made A.
Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
33. Which of following is a not unethical norm for Digital Forensics Investigation? A.
Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others. Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography. C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information? A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics? A.
Acquisition.
B. Steganography. C.
Live analysis
D. Hashing.
And: B
B. Data carving
C. Meta data D. Data Spoofing.
Ans: A
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
Happy Learning!
www.cwipedia.in
TRENDS
MCQ'S
FROM THE TOPPERS OF MSBTE
UR ENGINEERING
FRIEND
Preface
All the questions in the book are very important for the upcoming MSBTE summer
2020 exam. All care has been taken to make students comfortable in understanding the
basic concepts of the subject.
The most important part of this kit is, we are not only providing the books but the
exams too at three different levels (basic, intermediate & advanced). The students only
need to study the book and co-operate us till exam.
We wish to express our profound thanks to all those who helped in making this book
realty. Much needed moral support and encouragement is provided on numerous
occasions by our whole family. We wish to thank the entire team of Apni University
who has taken immense pain to get this book in time with this quality.
Any suggestion for the improvement of the books will be acknowledged and well
appreciated.
Question
a) JOHN McCARTHY
b) JOSE McCARTHY
c) Nicklaus Wirth
d) None of the above
Question
a) MACHINE LEARNING
b) DEEP LEARNING
c) ARTIFICAL INTELLIGENT
d) NONE OF THE ABOVE
Question
a) DEEP LEARNING
b) NEURAL NETWORK
c) MACHINE LEARNING
d) NONE OF THE ABOVE
Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Question
a) DEEP LEARNING
b) NEURAL NETWORK
c) MACHINE LEARNING
d) NONE OF THE ABOVE
Question
a) DEEP LEARNING
b) NEURAL NETWORK
c) MACHINE LEARNING
d) NONE OF THE ABOVE
Question
Question
a) TRUE
b) FALSE
Question
a) 1
b) 2
c) 3
d) 4
Question
a) TRUE
b) FALSE
Question
AI APPROACHES ARE?
a) THINKK WELL
b) ACT WELL
c) THINK LIKE HUMANS
d) ALL THE ABOVE
Question
a) TRUE
b) FALSE
Question
a) CONGINITE SCIENCE
b) BEHAVIORIST APPROACH
c) A&B
d) NONE OF THE ABOVE
Question
a) HEURISTIC TECHNIQUE
b) GPS
c) CONGINITE SCIENCE
d) NONE OF THE ABOVE
Question
a) HEURISTIC
b) CONGINITIVE
c) BEHAVIORIST
d) NONE OF THE ABOVE
Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
WHICH APPROACH IS USE IN ACT LIKE HUMAN?
a) HEURISTIC
b) CONGINITIVE
c) BEHAVIORIST
d) NONE OF THE ABOVE
Question
Question
a) THINL WELL
b) ACT WELL
c) THINK LIKE HUMAN
d) ACT LIKE HUMAN
Question
a) THINK WELL
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
b) ACT WELL
c) ACT LIKE HUMAN
d) THINK LIKE HUMAN
Question
a) HARVARD
b) MIIT
c) MIT
d) NONE OF THE ABOVE
Question
a) 1964-1966
b) 1964-1965
c) 1965-1966
d) 1966-97
Question
a) LOGIC
b) CONGINITION
c) FUNCTION
d) ALL OF THE ABOVE
a) 1
b) 4
c) 3
d) 2
Question
a) 19
b) 12
c) 13
d) 10
Question
a) LOGIC
b) INDUCTION
c) PROPOSTION
d) TAUTOLOGY
Question
a) CONHINITION
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
b) INDUCTION
c) PROPOSTION
d) TAUTOLOGY
Question
a) FUNCTIONAL
b) INDUCTION
c) PROPOSTION
d) TAUTOLOGY
Question
a) KNOWLEDGE
b) REASONING
c) INDUCTION
d) SEARCH
Question
a) KNOWLEDGE
b) REASONING
c) PROPOSITION
d) SEARCH
a) KNOWLEDGE
b) REASONING
c) TAUTOLOGY
d) SEARCH
Question
a) KNOWLEDGE
b) REASONING
c) SEARCH
d) MODEL LOGIC
Question
a) TEMPORAL
b) KNOWLEDGE
c) REASONING
d) SEARCH
Question
a) KNOWLEDGE
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
b) REASONING
c) SEARCH
d) LEARNING
Question
a) ADAPTATION
b) KNOWLEDGE
c) REASONING
d) SEARCH
Question
a) KNOWLEDGE
b) REASONING
c) SEARCH
d) SELF ORGANIZATION
Question
a) KNOWLEDGE
b) REASONING
c) SEARCH
d) MEMORY
Question
a) KNOWLEDGE
b) PERCEPTION
c) SEARCH
d) REASONING
Question
a) TRUE
b) FALSE
Question
a) INDUCTION
b) KNOWLEDGE BASED SYSTEM
c) KNOWLEDGE
d) PROPOSITION
Question
a) INDUCTION
b) KNOWLEDGE BASED SYSTEM
c) PROPOSITON
d) REASONING
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Question
Question
a) SEARCH
b) KNOWLEDGE BASED SYSTEM
c) PROPOSITON
d) SPEECH PROCESSING
Question
a) INDUCTION
b) KNOWLEDGE BASED SYSTEM
c) BELIEF
d) PROPOSITION
Question
a) INDUCTION
b) KNOWLEDGE BASED SYSTEM
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
c) PROPOSITON
d) INTENTION
Question
a) INDUCTION
b) UTTERANCE
c) PROPOSITON
d) KNOWLEDGE BASED SYSTEM
Question
Question
Question
a) BELIEF
b) DESIRE
c) INTENTION
d) HEURISTIC SEARCH
Question
a) INDUCTION
b) TAUTOLOGY
c) THEOREM PROVING
d) NONE OF THESE
Question
a) UTTERANCE
b) MULTI AGENT SYSTEM
c) MEMORY
d) PERCEPTION
Question
a) CO-OPERATION
b) KNOWLEDGE
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
c) SEARCH
d) NONE OF THESE
Question
a) BELIEF
b) DESIRE
c) INTENTION
d) CO-ORDINATION
Question
a) INDUCTION
b) TAUTOLOGY
c) AI PROGRAMMING
d) NONE OF THESE
Question
a) UTTERANCE
b) VISION
c) MEMORY
d) PERCEPTION
Question
a) BELIEF
b) DESIRE
c) INTENTION
d) NATURAL LANGUAGE
Question
a) BELIEF
b) DESIRE
c) INTENTION
d) SPEECH PROGRAMMING
Question
Question
a) LOGIC
b) COGNITION
c) FUNCTIONAL
d) NONE OF THESE
Question
Machine can perform any task better than human with cognitive properties isknown
as AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Question
Ability to think, puzzle, make judgments, plan, learn, communication by its own is
known as AI.
A. Narrow AI
B. General AI
C. Super AI
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
D. None of above
Question
A. NarrowAI
B. General AI
C. Super AI
D. None of above
Question
Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Question
B. Limited memory
C. Theory of mind
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
D. None of above
Question
Question
Question
Question
Which AI should understand the human emotions, people, and beliefs and be able to
interact socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Question
Question
Question
B. LISP
C. Perl
D. Javascript
Question
is a branch of science that deals with programming the systems in such away
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Question
Classifying email as a spam, labeling web pages based on their content, voice
recognitionare the example of .
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Question
B. Unsupervised learning
C. Machinelearning
D. Deeplearning
Question
C. Deep learning
D. Robotics
Question
Question
is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
D. Cyber Security
Computer programs that mimic the way the human brain processes information is
called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Question
B. Critical
C. Value based
D. Analytical
Question
B. Critical
C. Value based
D. Analytical
Question
F. Logic model
G. Computational model
H. None of above
Question
J. ELIZA
K. All ofabove
L. None ofabove
Question
N. Steve Russell
O. Alain Colmerauer
P. Joseph Weizenbaum
B. Logic level
C. Functional level
D. All of above
Question
B. Tautology
C. Predicate calculus
D. Temporal logic
Question
The level contains constituents at the third level which are knowledge based
system, heuristic search, automatic theorem proving, multi-agentsystem.
A. Cognitionlevel
B. Grosslevel
C. Functionallevel
D. All ofabove
Question
is used for AI because it supports the implementation of software that computes with
symbols verywell.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Question
Question
B. Computationlogic
C. Cognitionlogic
D. All ofabove
Question
Question
B. Special purpose
Question
Embedded system is
A. An electronic system
C. An electro-mechanical system
D. (A) or(C)
D. All of these
E. None of these
Question
B. Simplecalculator
C. Cell phone
D. Electronic toycar
Question
C. Calculator
D. Radio navigationsystem
Question
B. Minuteman-II
C. AutoneticsD-17
Question
B. Data processing
C. Data communication
D. All of these
Question
B. Digital camera
C. Music player
D. All of these
E. None of these
Question
operations
D. All of the above
B. Monitoring
C. Control
D. All of these
Question
D. None of these
Question
Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Which of the following is true about CISC processors?
A. The instruction set is non-orthogonal
D. All of these
Question
C. CPU
D. CPLD
Question
B. low power
Question
A. Electronics
B. Home
C. Telecommunication
D. All of the above
Question
A. Data collection
B. Data communication
C. Data processing
D. All the above
Question
A. Timers
B. Interrupt
C. Sensor
D. All of the above
Question
A. Timers
B. Interrupt
C. A-D convertor
D. All of the above
Question
A. Timers
B. Interrupt
C. Processor and ASIC
D. All of the above
Question
A. Timers
B. Interrupt
C. D-A Convertor
D. All of the above
Question
A. Timers
B. Interrupt
C. Memory
Question
Question
B. Von Neumannarchitecture
C. None of thementioned
D. All of thementioned
Question
B. Von Neumannarchitecture
C. None of thementioned
D. All of thementioned
Question
B. Von Neumannarchitecture
C. None of thementioned
D. All of thementioned
Question
B. Pipe-ling
C. Complexarchitecture
D. All of thementioned
Question
B. VonNeumann
C. Both ofthem
D. None ofthese
Question
B. Wi-Fi
C. Bluetooth
D. EEE1394
. Question
ARM standsfor
A. Advanced RISCMachine
B. Advanced RISCMethodology
C. Advanced ReducedMachine
D. Advanced ReducedMethodology
Question
A. Process signal
C. Both a&b
D. None of these
Question
A. True
B. False
Question
B. AVR
D. ASIC
Question
.AVRstandsfor .
A. Advanced VirtualRISC.
C. Both A &B
D. None of theabove
. Question
B. Double executioncycle.
C. Both A&B
D. None of theabove.
Question
B. KevinAshton
C. John H.
D. Charles Anthony
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Question
B. Information
C. IoT devices
D. Object
Question
B. Network Interconnection
C. Object Determination
D. None of these
B. MQTT
C. COAP
D. SPI
Question
B. Machine Learning
C. Internet of Things
D. None of above
Question
B. People
C. Security
D. Things
D. None of above
Question
B. ATM
C. Radio
D. Videogame
Question
is used by IOT
A. Radio information technology
B. Satellite
C. Cable
D. Broadband
B. MQTT
C. NFC
D. None of above
Question
B. Analyzing
C. Sensing
D. Active Engagement
Question
B. Actuating
C. Monitoring capabilities
B. I/Interfaces.
C. Internet connectivity.
Question
B. Smart watches.
C. LED lights.
Question
B. IEEE802.11
C. IEEE802.16
D. IEEE 802.15.4
Question
B. IEEE802.11
C. IEEE802.16
D. IEEE 802.15.4
Question
B. IEEE802.11
C. IEEE802.16
D. IEEE 802.15.4
Question
B. IEEE802.11
C. IEEE802.16
D. IEEE 802.15.4
Question
B. Allsean
C. Tyrell
D. Microsoft’s Azure
Question
B. 3G
C. 4G
D. None of above
Question
B. 3G
C. 4G
D. None of above
Question
C. Network layer
D. Link layer
Question
B. Transport layer
C. Network layer
D. Link layer
Question
B. Transport layer
C. Application layer
D. Link layer
Question
The protocols define how the applications interface with the lower layer protocol to
send the data over the network.
A. Application layer
C. Network layer
D. Link layer
Question
LOWPAN standsfor
A. 6 LOW Personal Area Network
D. None of above
Question
A. True
B. False
Question
B. Coaxial cable
D. None of theabove
Question
B. 1 Gbit/s
C. 1 Mb/s to up to 6.75Gb/s
D. 250 Kb/s
Question
B. 6LoWPAN
C. CoAP
is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer
Question
B. COAP
C. Web Socket
D. MQTT
Question
B. MAN
C. WAN
D. WLAN
Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Question
B. 64bits
C. 128bits
D. 256bits
Question
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Question
B. False
Question
MQTT is protocol.
A. Machine to Machine
B. Internet of Things
D. Machine Things
Question
B. HTTP
C. CoAP
D. SPI
Question
MQTT is:
A. Based on client-server architecture
B. XML
C. XHL
D. MPL
Question
B. Email
C. Message
D. Data
Question
XMPPuses architecture.
A. Decentralized client-server
B. Centralized client-server
C. Message
D. Public/subscriber
Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
What does HTTP do?
A. Enables network resources and reduces perception of latency
Question
HTTP expands?
A. Hyper Text Transfer Protocol
Question
CoAP is specialized in
A. Internet applications
B. Device applications
C. Wireless applications
D. Wired applications
Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Question
B. Packets
C. Bytes
D. Bits
Question
B. Error control
C. Connection services
D. Congestion control
Question
B. Session protocols
C. Transport protocols
D. Network protocols
Question
B. Transport layer
C. Session layer
D. Network layer
Question
B. Repetition codes
Question
B. Byte streams
C. Bits stream
Question
B. packets
C. Bytes
D. bits
Question
B. Bridges
C. Switches
Question
B. Switches
C. Packets
D. Bridges
Question
B. HTTP
C. CoAP
D. MQTT
Question
Question
Question
B. Publish-Subscriber
C. Push-Pull
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
D. Exclusive Pair
Question
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Question
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair
Question
REST is acronymfor
A. Representational State Transfer
Question
D. None of these
Question
B. Anywhere access
C. Higher utilization
B. False
Question
B. Female HDMI
B. Platform as a Survey
C. People as a Service
D. Platform as a Survey
Question
B. Service
C. Platform
Question
B. CaaS
C. PaaS
b) workspace
c) workload
Question
B. IaaS
C. CaaS
Question
B. CaaS
C. PaaS
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
B. AllSean
C. Tyrell
D. Z-Wave
Question
Question
B. Cloud Computing
C. Big Data
D. None of above
Question
B. Cloud Computing
C. BigData
D. None of above
Question
B. False
Question
B. MSP
C. AVR
D. ARM
Question
B. False
Question
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Question
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Question
B. Connectivity
C. DynamicNature
D. EnormousScale
Question
The number of devices that need to be managed and that communicate with each other
will be much larger.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Question
B. Heterogeneity
C. Security
D. Connectivity
Question
B. Actuators
C. Switches
D. Display
Question
B. Communication model
C. REST APIs
Question
B. Communication model
C. REST APIs
Question
B. False
Question
B. 6
C. 5
D. 4
Question
B. Level 4
C. Level 1
D. Level 6
Question
A. Level 2
B. Level 4
C. Level 1
Question
A. Level 2
B. Level 4
C. Level 1
D. Level 3
Question
B. Level 4
C. Level 1
D. Level 3
Question
A. Level 2
B. Level 6
C. Level 5
D. Level 3
Question
B. Level 6
C. Level 5
D. Level 3
Question
B. Preservation of computerdata.
Question
IDIP standsfor
A. Integrated Digital Investigation Process.
Question
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Question
Question
In the past, the method for expressing an opinion has been to frame a question based
on available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Question
C. Derivative works
D. computer-specific crime
Question
court
B. The application of computer science and investigative procedures for a legal
digital events
D. Use of science or technology in the investigation and establishment of
Question
Question
case.
D. The investigator must maintain strict confidentiality, discussing the results of an
Question
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Question
In phase investigator transfers the relevant data from a venue out of physical
or administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Question
In phase investigator transfers the relevant data from a venue out of physical
or administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
E. Presentation phase
Question
C. Manipulation of computerdata.
Question
A set of instruction compiled into a program that perform a particular task is known
as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Question
To collect and analyze the digital evidence that was obtained from the physical
investigation phase, is the goal of which phase?
A. Physical crime investigation
C. Review phase.
D. Deployment phase.
Question
C. Reviewphase.
D. Deployment phase.
Question
Which phase entails a review of the whole investigation and identifies area of
improvement?
A. Physical crime investigation
C. Review phase.
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
D. Deployment phase
Question
B. Korn
C. MichaelAnderson
D. S.Ciardhuain.
Question
B. Crime
C. Cybercrime
D. Evidence
Question
F. Stephenson
G. MichaelAnderson
H. S.Ciardhuain
Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Which model of Investigation proposed by Carrier ands afford?
A. Extended Model of Cybercrime Investigation (EMCI)
B. Integrated Digital Investigation Process(IDIP)
C. Road Map for Digital Forensic Research(RMDFR)
D. Abstract Digital Forensic Model (ADFM)
Question
Question
Question
Question
Question
B. Steganography.
C. Liveanalysis
D. Hashing.
Question
Which term refers for modifying a computer in a way which was not originally
intended to view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Question
The ability to recover and read deleted or damaged files from a criminal’s
computer isan example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D. EMMC
chip
Question
Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Question
Which of this is not a computer crime?
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Question
Which file is used to store the user entered password?
B. Data carving
C. Metadata
D. Data Spoofing.
Question
Searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
Question
What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Question
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Question
A. Internal network
B. Remote network
C. External network
D. Physical access
Question
The security, functionality, and ease of use triangle illustrate which concept?
Question
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
What are the three phases of a security evaluation plan? (Choose three
answers.)
Question
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
.
Question
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Question
When a hacker attempts to attack a host via the Internet it is known as what
type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Question
A. Whois search
B. Traceroute
C. Ping sweep
D. Host scanning
. Question
Which of the following tools are used for foot printing? (Choose 3 answers.)
A. Whois
B. Sam Spade
C. NMAP
D. SuperScan
E. Nslookup
Question
A. Scanning
B. Enumeration
Question
Question
Question
A. Shoulder surfing
B. User identification
C. System monitoring
D. Face-to-face communication
Question
A. A user who holds open the front door of an office for a potential hacker
B. Calling a help desk and convincing them to reset a password for a user
Question
Question
Question
Using pop-up windows to get a user to give out information is which type of
A. Human-based
B. Computer-based
C. Nontechnical
D. Coercive
Question
A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user
Question
A. It increases security.
B. It makes security harder to enforce.
C. It removes the employee’s responsibility to make judgments.
D. It decreases security.
Faking a website for the purpose of getting a user’s password and username is
which type of social engineering attack?
A. Human-based
B. Computer-based
C. Web-based
D. User-based
Question
A. Human-based
B. Computer-based
C. Physical access
D. Paper-based
Question
A. 21
B. 25
C. 23
D. 80
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question
A. 443
B. 80
C. 53
D. 21
Question
Question
Question
Question
What is the main problem with using only ICMP queries for scanning?
Question
Question
A. SYN-SYN ACK-ACK
B. SYN-ACK-FIN
C. SYN-SYNACK-ACK
D. SYN-PSH-ACK
Question
A. Full Open
B. Syn scan
C. XMAS
D. TCP connect
Question
What is the proper command to perform and NMAP SYN scan every 5
minutes?
Question
In order to prevent a hacker from using SMB session hijacking, which TCP
and UDP ports would you block at the firewall?
Question
Question
Question
Why would the network security team be concerned about ports 135–139
being open on a system?
Question
Which step comes after enumerating users in the CEH hacking cycle?
A. Crack password
B. Escalate privileges
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
C. Scanning
D. Covering tracks
Question
What is enumeration?
Question
A. UsertoSID
B. Userenum
C. SID2User
D. Getacct
Question
A. nslookup
Question
Question
Question
Question
What is a rootkit?
Question
A. To prevent another person from using the programs they have installed on
a target system
B. To prevent detection or discovery
C. To prevent hacking attempts
D. To keep other hackers from using their tools
Question
Question
What are two methods used to hide files? (Choose all that apply.)
Question
A. 30 days
B. 20 days
C. 1 day
D. 7 days
What type of password attack would be most successful against the password
T63k#s23A?
A. Dictionary
B. Hybrid
C. Password guessing
D. Brute force
Question
A. Password guessing
B. Network sniffing
C. Brute-force attack
D. Dictionary attack
Question
Why is it necessary to clear the event log after using the auditpol command to
turn off logging?
Question
Question
What is a wrapper?
A. A Trojan system
B. A program used to combine a Trojan and legitimate software into a single
executable
C. A program used to combine a Trojan and a backdoor into a single
executable
D. A way of accessing a Trojan system
Question
Question
A. 12345
B. 71
C. 7777
D. 666
Question
A. Scan the hard drive on network connection, and educate users not to install
unknown software.
B. Implement a network firewall.
C. Implement personal firewall software.
D. Educate systems administrators about the risks of using systems without
firewalls.
E. Scan the hard drive on startup.
Question
Question
Question
Question
Question
Question
Question
A. Stealth virus
B. Polymorphic virus
C. Multipartite virus
D. Armored virus
Question
A. Melissa
B. Slammer
C. Sobig
D. Blaster
Question
A. Sobig
B. SQL Blaster
C. SQL Slammer
D. Melissa
Question
A. Hidden
B. Tunneled
C. Encrypted
D. Stealth
A. Scanning
B. Integrity checking
C. Virus signature comparison
D. Firewall rules
E. IDS anomaly detection
F. Sniffing
Question
A. Files
B. System sectors
C. Memory
D. CPU
E. DLL files
Question
A. True
B. False
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question
A virus that can cause multiple infections is know as what type of virus?
A. Multipartite
B. Stealth
C. Camouflage
D. Multi-infection
Question
Question
What is sniffing?
Question
A. Routers
B. Gateways
C. Hubs
D. Switches
Question
A. Port-based security
B. WinTCPkill
C. Ethereal
D. MAC-based security
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question
What is dsniff?
Question
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Question
What is snort?
A. Shared
B. Unencrypted
C. Open
D. Promiscuous
Question
A. Encryption
B. A switched network
C. Port-based security
D. A good security training program
Question
For what type of traffic can winsniffer capture passwords? (Choose all that
apply.)
A. POP3
B. SMTP
Question
A. Static routing
B. Traffic filtering
C. Firewall rules
D. Personal firewall
Question
What is a zombie?
Question
A. TCP
Question
A. Intrusion
B. Attack
C. DoS
D. Finding a target system
Question
A. Ping of Death
B. Trinoo
C. Targa
D. TFN2K
Question
Question
Question
A. Sending packets that, when reassembled, are too large for the system to
understand
B. Sending very large packets that cause a buffer overflow
C. Sending packets very quickly to fill up the receiving buffer
D. Sending TCP packet with the fragment offset out of bounds
Question
Question
A. Juggernaut
B. T-Sight
C. IP Watcher
D. TTYWatcher
Question
A. Passwords
B. Credit card numbers
C. Confidential data
D. Authentication information
Question
A. Session ID
B. Session number
C. Sequence number
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
D. Source IP address
Question
A. Juggernaut
B. Hunt
C. TTYWatcher
D. TCP Reset Utility
Question
Question
Question
Question
Question
Question
Which of the following are types of HTTP web authentication? (Choose all
that apply.)
A. Digest
B. Basic
C. Windows
D. Kerberos
Question
A. Login finder
B. Authentication server
C. Biometric authentication
D. Token
Question
Question
A. Brute force
B. Hybrid
C. Dictionary
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
D. Zero day exploit
Question
A. Authentication logging
B. Kerberos
C. SSL
D. Active Directory
Question
A. Always accessible
B. Does not require much hacking ability
C. Difficult to exploit
D. Simple to exploit
Question
A. Internet program
Question
Question
A. Form tampering
B. Command injection
C. Buffer overflow
D. Web form attack
Question
A. Buffer overflow
B. Heap-based overflow
C. Stack-based overflow
D. SQL injection
Question
A. Bypassing an IDS
B. Overwriting the return pointer
C. Advancing the return pointer
D. Bypassing a firewall
Question
A. Heap overflow
B. Stack overflow
C. Heap
D. Stack
Question
Question
A. INSERT
B. GET
C. SET
D. SELECT
Question
A. No Operation
B. Network Operation Protocol
C. No Once Prompt
D. Network Operation
Question
A hacker needs to be familiar with the memory address space and techniques
of buffer overflows
in order to launch a buffer overflow attack.
A. True
B. False
Question
Why are many programs vulnerable to SQL injection and buffer overflow
attacks?
A. The programs are written quickly and use poor programming techniques.
B. These are inherent flaws in any program.
C. The users have not applied the correct service packs.
D. The programmers are using the wrong programming language.
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question
Question
Question
Which of the following security solutions uses the same key for both
encryption and authentication?
A. WPA
B. WPA2
C. WEP
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
D. 802.11i
Question
Question
Question
A. AES
B. TKIP
Question
A. Passphrase only
B. 802.1x/EAP/RADIUS
C. Passphrase or 802.1x/EAP/RADIUS
D. AES
Question
A. WPA2
B. WPA
C. TKIP
D. AES
Question
Question
A device that sends deauth frames is performing which type of attack against
the WLAN?
A. Denial of Service
B. Cracking
C. Sniffing
D. MAC spoofing
Question
A. WEP cracking
B. Rogue access point
C. Eavesdropping
D. MAC spoofing
Question
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 7
Question
Question
Question
Question
What type of attack can be performed once a hacker has physical access?
Question
What GCC command is used to compile a C++ file called source into an
executable file called game ?
Question
What is the command to deny all users access from the network?
Question
Question
A. DoS
B. Trojan
C. Spam virus
D. Rootkit
Question
Question
A. ISO
B. CD
C. LIN
D. CDFS
Question
Question
A system that performs attack recognition and alerting for a network is what?
A. HIDS
B. NIDS
C. Anomaly detection HIDS
D. Signature-based NIDS
Question
A. Honeyd
B. Nessus
C. Covert_TCP
D. 007 shell
E. TCP to IP hide
Question
Question
A. Honeypot
B. Firewall
C. Honeytrap
D. IDS
Question
A. ADMutate
B. Script mutate
C. Snort
D. Specter
Question
Question
A. 80
B. 443
C. 23
D. 21
Question
Question
A. NIDS
B. Sniffer, HIDS, and traffic-logging tool
C. Sniffer and HIDS
D. NIDS and sniffer
Question
What are the ways in which an IDS is able to detect intrusion attempts?
(Choose all that apply.)
A. Signature detection
B. Anomaly detection
C. Traffic identification
D. Protocol analysis
Question
A. 1
B. 2
C. 3
D. 4
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question
A. 1
B. 2
C. 3
D. 4
Question
A. 512
B. 256
C. 128
D. 64
Question
A. SHA
B. MD5
C. RC4
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
D. RC6
Question
A. SHA
B. MD5
C. RC4
D. RC6
Question
A. RC4
B. RC5
C. Blowfish
D. MD5
Question
What is cryptography?
Question
A. Transposition
B. Subtraction
C. Substitution
D. Transrelation
Question
Data encrypted with the server’s public key can be decrypted with which key?
Question
Which type of encryption is the fastest to use for large amounts of data?
Question
Question
A. White-hat assessments
B. Vulnerability assessments
C. Penetration testing
D. Security audits
E. Black-hat assessments
Question
Question
Which type of audit tests the security implementation and access controls in
an organization?
A. A firewall test
B. A penetration test
C. An asset audit
D. A systems audit
Question
Question
A. Password crackers
B. Port scanning tools
C. Vulnerability scanning tools
D. Web testing tools
E. Database assessment tools
F. None of the above
Question
A. Directory mapping
B. Competitive intelligence gathering
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
C. Asset classification
D. Acquiring the target
E. Product/service offerings
F. Executing, implanting, and retracting
G. Social engineering
Question
Once the target has been acquired, what is the next step for a company that
wants to confirm the vulnerability was exploited? (Choose all that apply.)
Question
A. True
B. False
Thank You
Website : www.apniuniversity.in
______ Exploits that involves manipulating people and user even your self
are the greatest vulnerability within any computer
A) Nontechnical attacks
B) Network infrastructure attack
C) Operating system attack
D) Application and other specialized attack
ANSWER: A
______ is the art of exploiting the human elements to gain access to the
authorized user.
A) Social Engineering.
B) IT Engineering.
C) Ethical Hacking.
D) None of the above.
ANSWER: A
_______ is a person who find and exploits the weakness in computer system.
A) Victim
B) Hacker
C) Developer
D) None of the above.
ANSWER: B
___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
A) Automated apps
B) Database software
C) Malware
D) Worms
ANSWER: C
A) Nmap
B) LC4
C) ToneLOC
D) Nessus
ANSWER: B
A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
A) privacy and security
B) rules and regulations
C) hacking techniques
D) ethics to talk to seniors
ANSWER: A
Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
A) Know the nature of the organization
B) Characteristics of work done in the firm
C) System and network
D) Type of broadband company used by the firm
ANSWER: D
C) Red teaming.
D) All of the above.
ANSWER: D
Ethical hacking will allow to____ all the massive security breaches.
A) Remove.
B) Measure.
C) Reject.
D) None of these.
ANSWER: B
ANSWER: C
ANSWER: B
A) Whisker
B) Super scan
C) Nikto
D) Kismet
ANSWER: A
____ attack, which can take down your Internet connection or your entire
network.
A) MAC
B) DOS
C) IDS
D) None of above
ANSWER: B
B) Web vulnerabilities
C) Wireless network vulnerabilities
D) Network infrastructure vulnerabilities
ANSWER: D
_____ is used for searching of multiple hosts in order to target just one
specific open port.
A) Ping Sweep
B) Port scan
C) Ipconfig
D) Spamming
ANSWER: A
B) SuperScan
C) Burp Suit
D) EtterPeak
ANSWER: D
B) Metasploit
C) Zeus
D) Ettercap
ANSWER: B
C) Detection of service
D) None of above
ANSWER: B
D) None of above
ANSWER: A
Network consist devices such as routers, firewalls, hosts that you must
assess as a part of ______ process.
A) Prackers
B) Black hat hacking
C) Grey hat hacking process
D) Ethical hacking process.
ANSWER: D
D) Exploitation
ANSWER: C
What are the some of the most common vulnerabilities that exist in a
network system?
A) Changing manufacturer, or recommended settings of newly installed
application.
B) Additional unused feature on commercial software package.
C) Utilizing open source application code.
D) Balancing security and ease of use of system.
ANSWER: B
D) 23
ANSWER: D
ANSWER: D
Which of the following tool is used for Network Testing and port
Scanning______
A) NetCat
B) SuperScan
C) NetScan
D) All of above
ANSWER: D
Which of the following tool is used for security checks as port scanning and
firewall testing?
A) Netcat
B) Nmap
C) Data communication
D) Netscan
ANSWER: A
Which of the following tool is used for Windows for network queries from
DNS lookups to trace routes?
A) Sam Spade
B) SuperScan
C) NetScan
D) Netcat
ANSWER: A
D) ARIN
ANSWER: D
a) Cognition
b) logic
c) interface
d) computation
a) Netsparker
b) burpsuite
c) Angry IP Scanner
d) GFI LanGuard
a) sniffelet
b) PromiscDetect
d) All of above
a) GFI LanGuard
b) Probely
c) Burpsuite
d) Angry IP Scanner
5] Which of the following hold the highest value of evidence in the court?
a) Documentary
b) Demonstrative
c) Testimonial
d) Real
a) Networking administration
c) both a and b
d) None of above
a) Reconnaissance
b) Scanning
c) Compiling
d) Maintaining access
a) Sam spade
b) Superscan
c) both a and b
d) none
9] Foot-printing Is
d)
a) Investigation
b) Scanning
c) Tracing
d) Intelligent
11] Hosting Obscene Profiles and Creating Fake Profile comes under section of law ___
12] The evidence or proof that is obtained from the electronic source is called as __
a) digital evidence
b) Explainable evidence
c) demonstrative evidence
d) substantial evidence
13] ___ norm should not satisfy by Investigator
a) Admissible
b) Complete
c) Authentic
15] Hash test analysis on digital evidence ensures that the data obtained from bit-by-bit copy
a) not corrupt
b) not correct
c) admissible
d) reliable
b) Communication systems
18] In forensic investigation, in which format the computer and data would be, during the acquisition of
the media
a) protected
b) protected
c) partially protected
d) hidden
b) connection attack
c) DoS
d) Autoresponder Attack
1] An examiner needs to get to the ___ immediately and extract that evidence before it is lost
a) Disk
b) Network Topology
a) Artificial Intelligence
b) Deep Learning
c) Neural Network
d) Supervised Learning
3] In ___ the goal is for the software to use what it has learned in one area to solve problems in other
areas
a) Deep learning
b) Machine learning
c) Neural Network
d) Artificial Intelligence
4] ___ is defined as symbols that represent properties of objects events and their environment
a) Data
b) Information
c) Knowledge
d) Intelligence
5] ____ can recognize the shapes of the letters and convert it into editable text
7] ____ allow bi-directional, full duplex communication between clients and servers
b) Websocket APIs
c) Both a and b
8] The application data, typically in files, is encoded by the ___ protocol and encapsulated in the ___
protocol which provides connection or transaction oriented communication over the network
a) Readiness
c) Review
d) Deployment
a) Substantial Evidence
b) Illustrative evidence
c) Electronic evidence
d) Documented evidence
1] The difference between machine and human intelligence is that the human ___ compare to machine
a) breath / sleep
c) walk / talk
d) eat / drink
2] ___ is the process of collecting, organizing and analyzing large sets of data to discover patterns and
other useful information
a) WSN
b) Cloud computing
3] In EMCI Model,___ is impacted by information from within and outside the organization that will
affect the investigation
a) Planning
b) Awareness
c) Authorization
d) Transport
a) Recovery
b) investigation
c) validation
a) Internet of Things
b) Embedded System
c) Intranet of Things
d) Microprocessor
6] ____ is most commonly used for clustering similar input into logical groups
a) Unsupervised Learning
b) Supervised learning
c) Deep Learning
a) Reasoning
b) Knowledge
c) Computation
d) Vision
8] ___ systems are suitable for solutions where data are involved is big, however, the
primary analysis requirement is not computationally intensive and can be done locally itself
a) IOT Level 1
b) IOT Level 2
c) IOT Level 3
d) IOT Level 4
9] Computer programs that mimic the way human brain processes information is called ___
a) Computer Networks
b) Circuits Network
c) Neural Network
d) Human Network
a) Telnet
b) Net Cat
c) CleanllsLog
d) both a and b
a) Servo Motor
b) Linear Actuator
c) Induction Motor
d) Stepper Motor
a) Recovery
b) investigation
c) validation
a) Level-1
b) Level-2
c) Level-3
d) Level-4
14] ___ provides the users the ability to develop and deploy application in the cloud using the
development tools, application programming interfaces (APIs), software libraries and services provided
by the cloud service provider
a) IaaS
b) PaaS
c) SaaS
b) Self-Configuring
c) Endpoint Management
a) Data
b) Information
c) Knowledge
d) Intelligence
17] ___ can recognize the shapes of the letters and convert it into editable text
18] Most commonly used units for ___ measurement are relative humidity (RH), dew/frost point (D/F
PT) and parts per million (PPM)
a) Temperature
b) Humidity
c) motion
19] ___ is a program that simulated a psychotherapist interacting with a patient and
a) MAYA
b) ALEXA
c) MALISKA
d) ELIZA
20] BMP180 is a popular digital ___ sensor for use in mobile phones, PDAs, GPS navigation
a) Pressure
b) Gas
c) Smoke
d) Image
c) Both a and b
23] ____ensures reliable transmission of packets in- order and also provides error detection capability
so that duplicate packets can be discarded and lost packets are retransmitted
a) UDP
b) TCP
c) HTTP
d) CoAP
24] In UMDFPM, ___ phase is not there in this Model
a) Examine
b) Hypothesis
c) Analysis
d) Report
25] In EMCI Model,___ is the phase where nature of investigation has been identified
a) Awareness
b) Authorization
c) Planning
d) Collection
26] In IDIP model, The goal of ___ phase is to collect and analyze the digital evidence
a) Hypothesis
b) Deployment
d) Review
27] An information which has a positive impact on the action occurred, such as the information
a) Irrelevant Evidence
b) Relevant Evidence
c) Cannot say
29] Digital evidences are used to establish a credible link between ___
d) None of these
d)
32] When assessing the reliability of digital evidence, the investigator is concerned with whether the
b) Whether there are indications that the actual digital evidence was tampered with
33] Which of the following is likely to have highest knowledge about system vulnerabilities?
a) Gray Hat
b) White Hat
c) Malicious Users
d) Script kiddies
a) Reconnaissance
b) Scanning
c) Compiling
d) Maintaining access
c) Exchange Rule
a) Nmap scan
b) Tmap scan
c) Smtp scan
d) None
37] Workstations have ton of security vulnerabilities like weak passwords to unpatched security holes
a) Default Workstations
b) Vulnerable workstations
c) Physical Workstations
d) None
38] Which of the following port no. is vulnerable to hacked HTTPs using TCP protocol
a) 441
b) 442
c) 443
d) 444
a) IEEE 802.15.4
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.16
42] Some Arduino Board include ___ used for loading programs from the personal computer
a) USB
b) HDMI
c) RJ45
d) None of these
43] ____ is an actuator that creates motion in a straight line, in contrast to the circular motion of a
a) Relay
b) Solenoid
c) Linear Actuator
d) None of these
44] The authentication, authorization, message and content integrity, and data security are functions of
___functional block
a) service
b) Management
c) Security
d) Application
a) Request-Response
b) Publish Subscribe
c) Push-Pull
d) Exclusive Pair
46] The ARM architecture uses a ___ architecture which support separate data and
a) Harvard
b) Von Neumann
c) Control ROM
d) Hardwired
47] ___analyzes the training data and produces an inferred function, which
48] Coordinator acts as a gateway that connect the ___ to the internet
a) WSN
b) Sensors
c) Actuator
d) TCP
a) Artificial Intelligence
b) Deep Learning
c) Neural Network
d) Supervised Learning
50] ___allow bi-directional, full duplex communication between clients and servers
b) Websocket APIs
c) Both a and b
topics to which subscribers (e.g., devices that want to consume data) can subscribe
a) request-response
b) publish-subscribe
c) push-pull
d) Exclusive pair
a) Malicious attacks
b) Eavesdropping
c) Interference
a) Heuristic Processing
b) Cognitive science
c) Relative Symbolism
d) Pattern Matching
a) Application Layer
b) Transport Layer
c) Network Layer
d) Link Layer
b) simple integer
c) simple symbol
d) simple string
a) Router
b) Firewall
c) Generic Host
d) sNone
Power Consumption of ASIC is ___
a) High
b) Low
c) Zero
a) System vulnerabilities
b) hacking processes
c) password cracking
An ethical hacker is a security professional who applies their hacking skills for ___ purposes on behalf of
the owners of information systems
a) Destructive
b) Defensive
c) Attacking
d) Analyzing
1] Hackers use resources as
b) registered website
d) None of these
a) human learning
b) machine learning
c) source learning
d) None of these
3] to determine what evidence to collect first,you should access evidences in ___ order of volatility
a) increasing
b) decreasing
c) any
d) None of these
4] Which of the following is not a best practice for minimizing security risk
6] WebSocket APIs network traffic and latency as there is no overhead for connection setup and
termination requests for each message
a) reduce
b) increase
c) both a and b
a) 802.09 protocol
b) 802.01 protocol
c) 802.11 protocol
d) 802.10 protocol
8] A ___ is a device that alters the physicalquantity as it can cause a mechanical componentto move
after getting some input from the sensor
a) sensors
b) actuators
c) both a and b
a) key
b) password
c) evidence
10] In EMCI Model,____ Is the phase during which crime is reported to some authority
a) awareness
b) planning
c) storage
d) collection
11] When assessing security and responding to
a) increasing
b) Decreasing
c) any
13] _____ data is a data that is lost if the power is switched off.
a) Non-volatile
b) Volatile
c) primary
d) secondary
14] An EMCI model follows ___ as every activity occurs in sequence
a) agile model
b) spiral model
c) waterfall model
d) none of these
a) Weakness of a system
c) both a and b
d) none of these
d) All of these
c) Exchange Rule
d) All of these
18] Use of Ping sweep is
d) Locate firewall
a) Security researchers
b) Hacktivists
c) Cyber Terrorists
d) all of these
d) all of above
a) DeMiliterized Zone
b) DeMail Zone
c) DoMain Zone
d) none
22] Devices that transforms electrical signals into
physical movements
a) Sensors
b) Actuators
c) Switches
d) display
a) Asset to be protected
c) Support by Organization
a) RCA
b) Audio out
c) USB
d) HDMI
a) 18
b) 19
c) 20
d) 21
26] Forest Fire Detection is an example of
a) IOT level 5
b) IOT level 6
c) IOT level 2
d) IOT level 1
a) Gaining ainformation
b) User identification
c) System monitoring
d) Shoulder surfing
29] ____ is one with very little knowledge about hacking but uses free tools and internet to
a) Ex Employee
b) Script Kiddies
c) Malicious users
d) Gray hat
30] Web server provide ___ as security mechanism
a) ACL
b) Root directory
c) both a and b
d) none
a) Ether peek
b) Ettercap
c) net cat
d) Nmap
32] TCP is the most widely used __ protocol,that is used by web browsers (along with HTTP,
HTTPS application layer protocols), email programs (SMTP application layer protocol) and
a) Application Layer
b) Transport Layer
c) Network Layer
d) Link Layer
33] one of the example of hackers on basis of their work and mind set is ___
b) supporting security
d) none of these
34] IEEE 802.11 is a collection of wireless local area network (WLAN) communication standards,
a) Link layer
b) application layer
c) transport layer
d) network layer
c) sniffing networks
d) all of these
36] Computer programs that mimic the way human brain processes information is called __
a) computer networks
b) circuits network
c) neural network
d) human network
37] Apache Mahout is used for training __
b) self-organizing maps
c) hierarchical clustering
a) active hacking
b) hacktivism
c) activism
a) email bomb
b) banner
c) both a and b
d) none
41] A proof that is introduced in the form of physical object is referred as __
a) Electronic evidence
b) Documented evidence
c) substantial evidence
d) Explainable evidence
42] one of the example of hackers on basis of their work and mind set is ___
b) supporting security
d) none of these
a) Demonstrative evidence
b) Explainable Evidence
c) Substantial evidence
d) Documented Evidence
a) Router
b) Firewall
c) Generic Host
d) None
46] Which is not the type of tool that is used by the Ethical hackers?
a) Nmap
b) .net Framework
c) Superscan
d) ToneLoc
47] The message transfer capability can be set up on connections, either using handshakes such as __ or
without handshakes/acknowledgements such as __
a) TCP,UDP
b) UDP,TCP
c) HTTP,CoAP
d) CoAP,HTTP
a) protected
b) non protected
c) partially protected
d) hidden
50] Which was the first FBI Regional computer Laboratory was recognized in 2000?
a) Multimedia Laboratory
b) Programming laboratory
c) Forensic Laboratory
d) Software Laboratory
51] In ———— multiple large messages can quickly fill the total storage capacity of an email server
a) storage overload
b) Bandwidth blocking
c) a and b
d) none
c) Exchange Rule
cloud based
a) IOT Level 1
b) IOT Level 2
c) IOT Level 3
d) IOT Level 4
a) Gaining a information
b) User identification
c) System monitoring
d) Shoulder surfing
55] ____ and ___ supports methods such as GET, PUT, POST, and DELETE
a) HTTP,CoAP
b) Websocket, MQTT
c) XMPP,AMQP
a) Demonstrative evidence
b) Explainable Evidence
c) Substantial evidence
d) Documented Evidence
57] The ARM micro-controller architecture is ___
d) Hardwired Architecture
a) Ether peek
b) Ettercap
c) net cat
d) Nmap
59] ZigBee is one of the most popular wireless technologies used by ___
a) WSN
b) MANET
c) Both a and b
a) Algorithms
b) Programs
c) Code
d) Testing
61] one of the example of hackers on basis of their work and mind set is __
b) supporting security
d) none of these
a) Pre-Attack
b) Attack
c) Post-attack
d) Reconnaissance
a) Ethernet
b) Wifi
c) WiMax
d) LR-WPAN
64] In ___ system system has multiple nodes that perform local analysis. Data is stored in the cloud
a) IOT Level 3
b) IOT Level 4
c) IOT Level 5
d) IOT Level 6
65] To access the security of the system one must understand ___ of the hacker
a) Nature
b) Hobbies
c) Mindset
d) None of these
66] Do not store old sensitive or otherwise non public files on your web server is countermeasure for
b) XSS
c) SQL injection
d) All of above
a) 250kb/s
b) 1.5 Mb/s
c) 100 Mbit/s
d) 1 Gbit/s
a) 8
b) 32
c) 64
d) 10
69] IBMs Watson supercomputer comes under
a) General AI
b) Super AI
c) Narrow AI
70] The most difficult task for an evidence handler is to substantiate the ___ at the judicial proceedings
a) Copied Evidences
b) Persistent Evidence
c) Collected Evidence
d) Lost Evidences
71] The amateur in the field of hacking who don't have many skills about coding and in-depth working of
a) sponsored Hackers
b) Whistle Blowers
c) Hactivists
d) Script Kiddies
72] _____ sensors are used in smartphones, vehicles, aircrafts and other applications to detect
orientation of an object, shake, tap, tilt, motion, positioning, shock or vibration
a) IR
b) Accelerometer
c) Image
d) Proximity
73] loT level which is used for Forest Fire Detection
a) Level 3
b) Level 4
c) Level 5
d) Level 6
74] An loT device can collect various types of data from the on-board or attached sensors, such as
a) Temperature
b) Humidity
c) Motion
d) All of Above
a) Gaining ainformation
b) User identification
c) System monitoring
d) Shoulder surfing
a) LC4
b) pwdump
d) SuperScan
77] A couple of considerations are involved when dealing with digital evidence check, the incorrect
considerations involved
a) 802.09 protocol
b) 802.01 protocol
c) 802.11 protocol
d) 802.10 protocol