Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

ETI Big Merge

Download as pdf or txt
Download as pdf or txt
You are on page 1of 755

lOMoARcPSD|14293917

478241290 ETI MCQ docx - mcq

Computer Engineering (Government Polytechnic, Nagpur)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

1. A certain Professor at the Stanford University coined the word 'artificial intelligence' in1956 at
a conference held at Dartmouth College. Can you name the Professor?
David Levy
John McCarthy
Joseph Weizenbaum
Hans Berliner
None of the above

2. ZigBee specification are based on _________


802.3
802.11
802.16
802.15.4

3. The process of collecting, organizing and collecting large sets of data called as
WSN
Cloud Computing
Big Data
None of above

4. Which instruction set architecture is used in Raspberry Pi?


X86
MSP
AVR
ARM

5. Stepper motors are _______


AC motors
DC motors
Electromagnets
None of above

6. Solenoid is a specially designed ________


Actuator
Machine
Electromagnet
none of above

7. Which machines only focus on current scenarios and react on it as per as possible best action.
A. Reactive machine
B. Limited memory

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C. Theory of mind
D. None of above

8. Embedded system is
An electronic system
A pure mechanical system
An electro-mechanical system
(A) or (C)

9. _______is the smallest microcontrollers which can be programmed to perform a large range of
tasks.
PIC microcontrollers
ARM microcontrollers
AVR microcontrollers
ASIC microcontrollers

10. MQTT is _____________ protocol.


Machine to Machine
Internet of Things
Machine to Machine and Internet of Things
Machine Things

11. XMPP is used for streaming which type of elements?


XPL
XML
XHL
MPL

12. _______ is a bi-directional, fully duplex communication model that uses a persistent
connection between client and server.
Request-Response
Publish-Subscriber
Push-Pull
Exclusive Pair

13. In Node MCU, MCU stands for ____________


Micro Control Unit
Micro Controller Unit
Macro Control Unit
Macro Controller Unit

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

14. Term "the Internet of things" was coined by_____


Edward L. Schneider
Kevin Ashton
John H.
Charles Anthony

15. ______ is a collection of wireless broadband standards (WiMax).


IEEE 802.3
IEEE 802.11
IEEE 802.16
IEEE 802.15.4

16. LR-WPANs standards from basis of specifications for high level communication protocol
such as ____
ZigBee
Allsean
Tyrell
Microsoft's Azure

17. A digital multi meter is an example of an embedded system for


Data communication
Monitoring
Control
All of these
None of these

18. The instruction set of RISC processor is


Simple and lesser in number
Complex and lesser in number
Simple and larger in number
Complex and larger in number

19. In microcontrollers, UART is acronym of


Universal Applied Receiver/Transmitter
Universal Asynchronous Rectified Transmitter
Universal Asynchronous Receiver/Transmitter
United Asynchronous Receiver/Transmitter

20. ARM stands for


Advanced RISC Machine
Advanced RISC Methodology

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Advanced Reduced Machine


Advanced Reduced Methodology

21. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above

22. Machine learning invent by _____________.


A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizenbaum
D. Arthur Samuel

23. Sensing organs as input, mechanical movement organs as output and central nervous
system(CNS) in brain as control and computing devices is known as ____of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above

24. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
_______
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these

25. ___ is not indexed process in RMDFR


Identification
Preservation
Collection
Evaluation

26. _________ stage of RMDFR corresponds to “freezing the crime scene".


Identification
Preservation
Collection
Evaluation

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

27. _________ phase of ADFM model formulates procedures and approach to use in order to
maximize the collection of untainted evidence while minimizing the impact to the victim
Identification
Preparation
Approach strategy
Preservation
None Of above

28. DFPM along with ______ groups and _____ phases are proposed by Carrier and Safford.
DFPM is named the Integrated Digital Investigation Process (IDIP).
5,15
5,17
5,20
6,17

29. Deployment phase of IDIP has ______ phases


2
3
4
5

30. Physical Crime Investigation phase of IDIP includes ______ phases.


3
4
5
6

31. _________ phase of ADFM model determines importance and probative value to the case of
the examined product
Returning Evidence
Presentation
Analysis
Readiness phase

32. What are the three general categories of computer systems that can contain digital evidence?
Desktop, laptop, server
Personal computer, Internet, mobile telephone
Hardware, software, networks
Open computer systems, communication systems, and embedded systems

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

33. Sequential step hackers use are: A. Maintaining Access. B. Reconnaissance C. Scanning. D.
Gaining Access.
B, C, D, A
B, A, C, D
A, B, C, D
D, C, B, A

34. The term cracker refers to __________


Black hat hacker.
White hat hacker.
Grey hat hacker.
None of the above.

35. The intent of ethical hacker is to discover vulnerabilities from a ___________ point of view
to better secure system.
Victims.
Attackers.
Both A & B
None of these.

36. A black hat hacker is the one who ____________


Fix identifies weakness
Steal the data
Identifies the weakness and leave message to owner
None of the above.

37. A grey hat hacker is the one who ________


Fix identifies weakness
Steal the data
Identifies the weakness and leave message to owner
None of the above

38. ____________ can create false feeling of safety


Firewall
Encryption
VPNs
All the above

39. Connecting into network through a rogue modem attached to computer behind a firewall is
an example of _________
Nontechnical attacks

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Network infrastructure attack


Operating system attack
Application and other specialized attack

40. Which permission is necessary before ethical hacking?


Written permission.
Decision maker permission
Privacy permission
Risk permission

41. Which tool is used to encrypt Email?


WebInspect
QualyGuard
PGP (pretty good privacy)
None of the above

42. _________ are part of organized crime on internet.


Criminal
Antinationalist
Hacker for hire
None of the above

43. __________ has now evolved to be one of the most popular automated tools for unethical
hacking.
Automated apps
Database software
Malware
Worms

44. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
Know the nature of the organization
Characteristics of work done in the firm
System and network
Type of broadband company used by the firm

45. In terms of digital evidence, a mobile telephone is an example of:


Open computer systems
Communication systems
Embedded computer systems
None of the above

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

46. Computers can be involved in which of the following types of crime?


Homicide and sexual assault
Computer intrusions and intellectual property theft
Civil disputes
All the above

47. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This is
an example of:
An individual characteristic
An incidental characteristic
A class characteristic
An indeterminate characteristic

48. Digital evidences must follow the requirements of the ______________


Ideal Evidence rule
Best Evidence rule
Exchange rule
All the mentioned

49. From the two given statements 1 and 2, select the correct option from: a. Original media can
be used to carry out digital investigation process. b. By default, every part of the victim’s
computer is considered as unreliable.
a and b both are true
a is true and b is false
a and b both are false
a is false and b is true

50. Email, hard drives are examples of ___________


Illustrative evidence
Electronic evidence
Documented evidence
Explainable evidence

51. Which is not procedure to establish a chain of custody?


A. Save the original materials.
B. Take photos of physical evidence.
C. Don’t take screenshots of digital evidence content.
D. Document date, time, and any other information of receipt.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

52. The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as ___________
Evidence validation
Relative evidence
Best evidence
Illustrative evidence

53. Digital evidence is only useful in a court of law.


A. True
B. False

54. TCP uses port no _____ for SMTP (Simple Mail Transfer Protocol)
24
22
25
35

55. Banners cannot be grabbed by using either plain old telnet or Netcat.
True
False

56. Windows does not support __________ Network Analyzer tool


EtherPeek
Ethereal
ettercap
dsniff

57.UNIX does not support __________ Network Analyzer tool.


EtherPeek
Ethereal
ettercap
dsniff

58. Common Wireless Threats to wireless LANS are


Rogue Access Points/Ad-Hoc Networks
Denial of Service
Configuration Problems
All of above

59. An email bomb is also known as a ___________.


chat bomb

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

communication bomb
letter bomb
network bomb

60. XSS is an attack which allows the attacker to execute the scripts on the victim's browser.
True
False

61. _________ is a UNIX-based program alerts you via e-mail if it detects changes in MAC
addresses associated with specific IP addresses on the network.
Arp watch
Ettercap
dsniff
Cain & Abel tool

62. TCP uses port no _____ for HTTP (Hypertext Transfer Protocol)
60
70
80
90

63. What is not true about a port scanner.


is a software tool that basically scans the network to see who’s there.
provide basic views of how the network is laid out.
Helps to identify unauthorized hosts or applications.
Testing of application running on host takes much time.

64. ________ is Network Testing and port Scanning tool used for the most versatile security tool
for such security checks as port scanning and firewall testing
Netcat
Nmap or NMapWin
WildPacketsEtherPeek
NetScan

65. What is the most important activity in system cracking?


Information gathering
Cracking password
Escalating privileges
Covering tracks

66. Nmap is abbreviated as Network Mapper.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

True
False

67. What port does Telnet use?


22
80
20
23

68. _______________ is used for searching of multiple hosts in order to target just one specific
open port.
Ping Sweep
Port scan
Ipconfig
Spamming

69. What is AI ?
Putting your intelligence into computer
Programming with your own intelligence
Making a machine intelligence
Putting more memory into computer

70. How many types of AI ?


5
3
2
7

71. Alexa is a example of ________ .


AI
Robotics
Both
None of the above

72. What is the primary interactive method of communication used by humans?


reading
Writing
Speaking
All of the above

73. AI Systems can be of very _________.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

High Speed
Low Speed
Moderate Speed
None of the above

74. The objective of AI research are.


Reasoning
knowledge representation
natural language processing
All of the above

75. Which one Is an Advantage of Artificial Intelligent


High Cost
High reliability
No feelings and emotions
No Original Creativity

76. Weak or Narrow AI means:


Able to perform a dedicated task with intelligence
Which could perform any intellectual task with efficiency like a human
Better than human with cognitive properties
None of the above

77. Intelligence is composed of


Learning
Problem Solving
Linguistic Intelligence
All of the above

78. Component of Artificial Intelligent is


Cognitive Abilities
Neuron Science
Sociology
All of the above

79. ______is a branch of science which deals with helping machines find solution to complex
problems in more Human-like fashion.
Artificial Intelligent
Internet of Things
Embedded System
Cyber Security

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

80. The machines only focus on current scenarios and react on its as per possible best action
Reactive Machine
Limited Memory
Theory of Mind
Self Awaeness

81. General AI means:


Able to perform a dedicated task with intelligence
Which could perform any intellectual task with efficiency like a human
Better than human with cognitive properties
None of the above

82. Which is the first AI programming language?


BASIC
FORTRAN
IPL(Inductive logic programming)
LISP

83. Increase Dependancy on machines is a ______________.


Advantage Of AI
Advantage Of Machine Learning
Dis-advantage Of AI
Dis-advantage Of Machine Learning

84. Which of the following is a goal of AI


To create expert systems
To implement human intelligence in machine
Both A & B
None of the above

85. ______ includes decision making.


Learning
Reasoning
Perception
Problem Solving

86. Which AI is learn by its own.


Weak AI
General AI
Super AI

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

None of the above

87. Self-driving cars are one of the best example of ________________.


Reactive Machines
Limited Memory Systems
mind AI
Self-Awarence AI

88. Who is considered to the "father" of artificial intelligence?


Fisher Ada
John McCarthy
Allen Newell
Alan Turning

89. An Embedded System is:


Embedded Processor based system
A microcontroller or microprocessor based system
Internet based system
Hardware based system

90. Devices that transforms electrical signals into physical movement


Sensors
Switches
Actuators
Display

91. Purpose of the Embedded System is:


Monitoring the performance
Data Communication
Data Collection
All of them

92. IoT Stands for ______.


Internet of Technology
Intranet of Things
Internet of things
Information of things

93. What is CISC:


Computing Instruction set complex
Complex instruction set computing

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Complementary instruction set computing


Complex instruction set Complementary

94. WSN stands for_____


Wide Sensor Network
Wireless Sensor Network
Wired Sensor Network
None of these

95. ___________ specifies the function that will be called when the client disconnects.
Callback
Error
Connect
Disconnect

96. What do we use to connect TV to RPi?


Male HDMI
Female HDMI
Male HDMI and Adapter
Female HDMI and Adapter

97. Which possibility automatically communicates with other vehicles?


Transportation and logistics
Energy and utilities
Automotive
Connected supply chain

98. How many types of arduinos do we have?


5
6
7
8

99. Which protocol is lightweight?


MQTT
HTTP
CoAP
SPI

100. _________ is uniquely identifiable embedded computing devices.


Internet

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Big Data
IoT
Cloud

101. IoT-A stands for ________


Internet of Things Address
Internet of Things Architecture
Internet of Things Area
Industrial of things Architecture

102. Which of the software or a programming language used for controlling of Arduino?
Assembly Language
C language
JAVA
Any language

103. What is the Ethernet/LAN cable used in RPi?


Cat5
Cat5e
Cat6
RJ45

104. What is the default bootloader of the Arduino UNO?


Optiboot bootloader
AIR-boot
Bare box
GAG

105. WiFi is not present in which of the following models?


Raspberry Pi3
Raspberry Pi Zero WH
Raspberry Pi Zero W
Raspberry Pi Zero

106. What is the speed of operation in Pi 3?


900MHz
1.2Ghz
1Ghz
500MCHz

107. Which instruction set architecture is used in Raspberry Pi?

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

X86
MSP
AVR
ARM

108. How many digital pins are there on the UNO board?
14
12
16
20

109. Digital Forensics Includes Identification, recovery, ________ , validation & presentation of
facts regarding digital evidence found.
Investigation
Data
Password
Image

110. PC forensics began in ______


1995
1980
1997
1984

111. Major Goal of Digital forensics process is


To duplicate original data
To preserve original evidence
Investigate by collecting, identifying, & validating digital information
All of the above

112. DFI Stands for


Data For Investigation
Disease Free Interval
Digital Forensic Investigation
Development Finance Institution

113. ____ Recovery is a fairly easy task in computer forensic analysis.


Data
Partition
Password
Image

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

114. Which one is Digital Forensic Model


RMDFR
OSI
TCP/IP
COCOMO

115. You begin any computer forensics case by creating an ____. evidence custody form
investigation plan risk assessment report investigation report B
How many Phases are present in Road Map for Digita Forensics Model 7 6 8
9 B
Digital Forensics is all of them except: Extraction of computer data Preservation of
computer data Interpretation of computer data Manipulation of computer data D
Data ____ involves changing or manipulating a file to conceal information. creep hiding
recovery integrity B
Who proposed Road Map model G. Gunsh S. Ciardhuain J. Koren G. Palmar
D
Investigator should satisfy the following points: Contribute to the society & human being
Avoid harm to others Honest & trustworthy All of the above D
Rules of Digital Forensics areCreate a copy of original data Data should not be modified Chain
of custody must be maintain All of the above D
General Ethical norm for Investigator is: Express an opinion on the guilt Engage in
illegal conductTo Respect Privacy of others. Distort or falsify education, training, credentials
C
A written report is frequently an ____ or a declaration. affidavit subpoena
deposition perjury A
IDIP stand for Integrated Digital Investigation Process Integrated Data Investigation Process
Integrated Digital Investigator Process Independant Digital Investigation Process
A
How May Digital Forensics Models are present 5 6 8 9 B
Unethical norms are Uphold any relevant evidenceDeclare confidential matter Display bias in
findings All of the above D
For forensics specialists, keeping the ____ updated and complete is crucial to supporting your
role as an expert and showing that you’re constantly enhancing your skills through training,
teaching, and experience. testimony examination plan deposition CV D
The term ____ comes from the Greek word for “hidden writing.” creep escrow
steganography hashing C

The criminological principle which states that, when anyone, or anything, enters a crime scene
he/she takes something of the scene with him/her, and leaves something of himself/herself

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

behind, is: Locard’s Exchange Principle Differential Association Theory Beccaria’s


Social Contract None of the above A
A valid definition of digital evidence is: Data stored or transmitted using a computer
Information of probative value Digital data of probative value Any digital
evidence on a computer C
. In terms of digital evidence, the Internet is an example of Open computer systems
Communication systems
Embedded computer systems
None of the above B
What is the chain of custody? A log of everyone who has entered a crime scene A list of every
item number used for marking evidence. A thorough documentation process that protects
evidence from contamination and tampering.The list of all personnel who work at a crime lab
C
Rule of evidence is Rule 108 Rule 100 Rule 93 Rule 103 D
which is not the consideration involved with Digital Forensics Document any extra scope
work with the original evidence to develop procedures Use clean collecting media
consider safety of personnel at scene B
How many forensic categories of devices are? 3 2 5 4 A
The most complete copy which includes all necessary parts of evidence,closely related to
original evidence, is called as Documented Evidnece Digital Evidence Illustrative
Evidence Best Evidence D
Digital Evidence found in which form Slack Space Recycle Bin Domain Access Logs
All of the above D
Law of Evidence is also called as Locard’s Exchange Principle Rule of Evidence
Authentication of Evidence Best Evidence Rule B
What is the Procedure to establish chain of custody?Take photos of physical evidence
Perform Hash Test Analysis Inject a bit-for-bit clone of digital Evidence content All of
the above D
The Evidences lasting long are called as Digital Evidence Best Evidence Volatile
Evidence None of the above C
Which is not true regarding Digital EvidenceIt can be time sensitive It can not be altered
It crosses juridictional borders It is Latent B
The Rule of Evidence must be Believable Alterable Compatible Renewable
A
A bag of bits, organized in sequence to represent information of Digital Evidence, is called as
Sequnece of Bits Bits of Digital Evidenve Digital stream of Bits Bits of Stream
C
Demonstrative Evidence is Documented Evidnece Illustrative Evidnece Both a and b
None of the above C

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Arrange resources as per order by relative volatality 1. Temporary File


2. Routing Table 3. Network Topology
4. Process Table 2-4-1-3 2-3-1-4 4-2-3-1 3-1-4-2 A
The proof prodiced in the form of Physical Object isIllustrative Evidnece Substantial Evidence
Documented Evidnece Physical Evidence B
Challenges in Evidence handling are Chain of Custody Authentication of Evidence
Evidence Validation All of the above D
Mobile Devices comes into category Evidence Category Authentic Category Forensic
Cateogory Digital Category C

what is the primary goal of an Ethical Hacker ? Avoiding detection

Testing security controls


Resolving security vulnerabilities
Determining return on investment for security measures C

Hacking for a cause is called ..................


Hacktivism Black-hat hacking Active hacking Activism A
What is the first phase of hacking? Scanning Attack Maintaining access
Reconnaissance D
Which of the following is a type of social engineering? Shoulder surfing User
identification System monitoring Face-to-face communication A
What is the ethics behind training how to hack a system? To hack a system without the
permission To think like hackers and know how to defend such attacks

To hack a network that is vulnerable


To corrupt software or service using malware B
Social Engineering Techniques are Phishing Exploiting Human Curiosity Intimidating
Circumtances All of the Above D
After performing ____________ the ethical hacker should never disclose client information to
other parties. hacking

cracking
penetration testing
exploiting C
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________ Black Hat hackers

White Hat Hackers


Grey Hat Hackers

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Red Hat Hackers B


The amateur or newbie in the field of hacking who don’t have many skills about coding and in-
depth working of security and hacking tools are called ________ Sponsored Hackers

Hactivists
Script Kiddies
Whistle Blowers C
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber
crimes. Who are “they” referred to here? Gray Hat Hackers

White Hat Hackers


Hactivists
Black Hat Hacker D
It Involves taking the information discovered during the reconnaissance and using it to examine
the network. Cracker Whacker Hardening Scanning D
Which Is a hacker who focuses on communication systems to steal calling card numbers, make
free phone calls, attack PBXs, and acquire access, illegally, to communication devices. Threat
Phreaker Cracker Whacker B
________ are the combination of both white as well as black hat hackers. Grey Hat hackers

Green Hat hackers


Blue Hat Hackers
Red Hat Hackers A
An Attacker get familiarize with the users of target system, is called as ? Scanning
Taligting Phishing Familiarity Exploit D
________involves following users behind as they enter restricted areas Phreaking
Scanning Taligating None of the Above C
Physical attack, Dumpster Diving are type of following attack Technical Attack Non-
Technical Attack Network Attack All of the Above B
Network Infrastructure attacks are Installing network analyser Scanning Dumpster
Diving Network Attack A
Ethical Hacking Process involves Evaluating results Selecting Tools Both a and b
None of the Above C
Ethical Hacking commandments are working ethically not crashing system respecting
privacy All of the Above D
Cracking passwords and encryption mechanism comes under Operating System Attack
Technical Attack Non-Technical Attack Network Attack A

What port number does FTP use? 21 25 23 80 A


What are the basic types of attacks ? Active Passive DoS Both a and b D

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Banner grabbing is an example of what? Active operating system fingerprinting Passive


operating system fingerprinting Footprinting Application analysis B
What is the main problem with using only ICMP queries for scanning? The port is not always
available The protocol is unreliable Systems may not respond because of a firewall
Systems may not have the service running C
What are the three types of scanning? Port, network, and vulnerability . Port,
network, and services Grey, black, and white hat Server, client, and network A
SNMP is a protocol used to manage network infrastructure devices. What is the SNMP
read/write community name used for? Viewing the configuration information
Changing the configuration information Monitoring the device for errors
Controlling the SNMP management station B
What is the process of hiding text within an image called? Steganography Encryption
Spyware Keystroke logging A
Which of the following is a passive online attack? Password guessing Network sniffing
Brute-force attack Dictionary attack B
What is the difference between a backdoor and a Trojan? A backdoor must be installed first.
A Trojan is not a way to access a system A Trojan usually provides a backdoor for a
hacker. A backdoor is provided only through a virus, not through a Trojan C
What components of a system do viruses infect? Files System sectorsDLL files All of
the Above D
What is the difference between a virus and a worm? A virus can infect the boot sector but a
worm cannot. A worm spreads by itself but a virus must attach to an e-mail A worm
spreads by itself but a virus must attach to another program A virus is written in C++ but a worm
is written in shell code C
What is sniffing? Sending corrupted data on the network to trick a system Capturing and
deciphering traffic on a network Corrupting the ARP cache on a target systemPerforming a
password-cracking attack B
Which is a method to prevent Denial of Service attacks? Static routing Traffic filtering
Firewall rules Personal firewall B
The best defense against any type of sniffing is ____________. Encryption A switched
network Port-based security A good security training program A
How does a Denial of Service attack work? Cracks passwords, causing the system to crash
Imitates a valid user Prevents a legitimate user from using a system or service
Attempts to break the authentication method C
What is the first step in a SQL injection attack? Enter arbitrary commands at a user prompt
Locate a user input field on a web page. Locate the return pointer Enter a series
of NOPs B
Malicious, unauthorized penetration into information systems Foot-printing Data-diddling
Theft of passwords Network intrusions D
A defined way to breach the security of an IT system through vulnerability. Local Exploit
ExploitAttack Threat B

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

The confirmation and reconciliation of evidence of a user's identity Identification

Authenticity Authentication Accountability C


Securing the system from other hackers or security personnel by securing their exclusive access
with back-doors, root-kits, and Trojans. Threat

Hacktivism
Hardening
Whacker C

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Chapter 4 digital evidence

Computer science (Goverment Women's Polytechnic College Kalamassery)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

Marthwada Mitra Mandal's Polytechnic


Course :- Emerging Trends in Computer and Infromation Technology
Chapter 4 -Digital Evidence

Sr.No Question A B C D Answer


A valid definition of digital evidence is: Data stored or Information of Digital data of Any digital evidence
1 transmitted using a probative value probative value on a computer C
computer

What are the three general categories of computer Desktop, laptop, Personal computer, Hardware, software, Open computer
2 systems that can contain digital evidence? server Internet, mobile networks systems, D
telephone communication
In terms of digital evidence, a hard drive is an example Open computer Communication Embedded None of the above
3 of: systems systems computer systems A

In terms of digital evidence, a mobile telephone is an Open computer Communication Embedded None of the above
4 example of: systems systems computer systems C

In terms of digital evidence, a Smart Card is an Open computer Communication Embedded None of the above
5 example of: systems systems computer systems C

In terms of digital evidence, the Internet is an example Open computer Communication Embedded None of the above
6 of: systems systems computer systems B

Computers can be involved in which of the following Homicide and sexual Computer intrusions Civil disputes All of the above
types of crime? assault and intellectual
7 D
property theft

A logon record tells us that, at a specific time: An unknown person The owner of a The account was None of the above
logged into the specific account used to log into the
8 C
system using the logged into the system
account system
Cybertrails are advantageous because: They are not Nobody can be They are easy to Offenders who are
connected to the harmed by crime on follow. unaware of them
physical world the Internet. leave behind more
9 clues than they D
otherwise would
have.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Private networks can be a richer source of evidence They retain data for Owners of private Private networks All of the above.
than the Internet because: longer periods of networks are more contain a higher
10 time. cooperative with concentration of C
law enforcement. digital evidence.

Due to caseload and budget constraints, often Each unreported Responsibility for This approach Computer security
computer security professionals attempt to limit the incident robs incident resolution results in under- professionals
damage and close each investigation as quickly as attorneys and law frequently does not reporting of criminal develop loose
possible. Which of the following is NOT a significant enforcement reside with the activity, deflating evidence processing
personnel of an security statistics that are habits
drawback to this approach?
opportunity to learn professional, but used to allocate that can make it
11 about the basics of with management. corporate and more difficult for B
computer-related government law enforcement
crime. spending on personnel and
combating computer- attorneys to
related crime. prosecute an
offender.

Locard’s Exchange Differential Beccaria’s Social None of the above


The criminological principle which states that, when Principle Association Theory Contract
12 anyone, or anything, enters a crime scene he/she takes A
something of the scene with him/her, and leaves
something of himself/herself behind, is:
The author of a series of threatening e-mails An individual An incidental A class An indeterminate
13 consistently uses <im= instead of <I’m.= This is an characteristic characteristic characteristic characteristic A
example of:
Criminal Prosecution Defense work All of the above
Personal computers and networks are often a valuable investigation
14 D
source of evidence. Those involved with _______ should
be comfortable with this technology.
An argument for including computer forensic training It provides an It provides them It teaches them None of the above.
additional with the tools to when it is time to
15 computer security specialists is: C
credential. conduct their own call in law
investigations. enforcement.
Computers can play the following roles in a crime: Target, object, and Evidence, Object, evidence, Symbol,
subject instrumentality, and tool instrumentality, and
16 B
contraband, or fruit source of evidence
of crime
Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

The first US law to address computer crime was: Computer Fraud and Florida Computer Computer Abuse Act None of the above
17 Abuse Act (CFAA) Crime Act B

The following specializations exist in digital First responder Forensic examiner Digital investigator All of the above
18 investigations: (a.k.a. digital crime D
scene technician)
The first tool for making forensic copies of computer EnCase Expert Witness dd Safeback
19 C
storage media was:
One of the most common approaches to validating Examine the source Ask others if the Compare results of Computer forensic
20 forensic software is to: code software is reliable
multiple tools for tool testing projects C
discrepancies
An instrumentality of a crime is: An instrument used A weapon or tool Anything that plays All of the above
21 to commit a crime designed to commit a significant role in a D
a crime crime
. Contraband can include: Child pornography Devices or programs Encryption devices All of the above
for eavesdropping or applications
22 D
on communications

A cloned mobile telephone is an example of: Hardware as Hardware as an Information as Information as


23 contraband or fruits instrumentality contraband or fruits evidence A
of crime of crime
Digital photographs or videos of child exploitation is Hardware as Hardware as an Information as Information as
24 an example of: contraband or fruits instrumentality evidence contraband or fruits D
of crime of crime
Stolen bank account information is an example of: Hardware as Information as Information as an Information as
25 contraband or fruits contraband or fruits instrumentality evidence B
of crime of crime
A network sniffer program is an example of: Hardware as Hardware as an Information as Information as
26 contraband or fruits instrumentality contraband or fruits evidence C
of crime of crime
Computer equipment purchased with stolen credit Hardware as Hardware as an Hardware as Information as
27 card information is an example of: contraband or fruits instrumentality evidence contraband or fruits A
of crime of crime
A printer used for counterfeiting is an example of: Hardware as Hardware as an Hardware as Information as
28 contraband or fruits instrumentality evidence contraband or fruits B
of crime of crime
Phone company records are an example of: Hardware as Information as Information as an Information as
29 contraband or fruits contraband or fruits instrumentality evidence D
of crime of crime
Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

In the course of conducting forensic analysis, which of Critical thinking Fusion Validation All of the above
30 D
the following actions are carried out?
Having a member of the search team trained to handle Can reduce the Can serve to Can reduce the All of the above
digital evidence: number of people streamline the opportunity for
who handle the presentation of the opposing counsel to
31 D
evidence case impugn the integrity
of the evidence

An attorney asking a digital investigator to find Influencing the Due diligence Quid pro quo Voir dire
32 evidence supporting a particular line of inquiry is an examiner A
example of:
Logical reasoning Common sense Preconceived theory Investigator’s
A digital investigator pursuing a line of investigation in intuition
33 C
a case because that line of investigation proved
successful in two previous cases is an example of:
Balance of Beyond a reasonable Acquittal None of the above
A scientific truth attempts to identify roles that are probabilities doubt
34 B
universally true. Legal judgment, on the other hand,
has a standard of proof in criminal prosecutions of:
Regarding the admissibility of evidence, which of the Relevance Authenticity Best evidence Nominally
35 prejudicial D
following is not a consideration:
Uninformed consent Forcible entry Obtained without None of the above
36 According to the text, the most common mistake that authorization C
prevents evidence seized from being admitted is:
In obtaining a warrant, an investigator must convince Evidence of a crime A crime has been The owner or The evidence is
the judge on all of the following points except: is in existence committed resident of the place likely to exist at the
to be searched is place to be searched
37 C
likely to have
committed the
crime
If, while searching a computer for evidence of a Abandon the Continue with the Stop the search and Continue with the
specific crime, evidence of a new, unrelated crime is original search, and original search but obtain a warrant original search,
38 discovered, the best course of action is: pursue the new line also pursue the new that addresses the ignoring the new C
of investigation inquiry new inquiry information

The process of documenting the seizure of digital Chain of custody Field notes Interim report None of the above
39 evidence and, in particular, when that evidence A
changes hands, is known as: Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

When assessing the reliability of digital evidence, the Whether chain of Whether there are Whether the Whether the
investigator is concerned with whether the computer custody was indications that the evidence was evidence media was
40 that generated the evidence was functioning normally, maintained actual digital properly secured in compatible with B
and: evidence was transit forensic machines
tampered with
The fact that with modern technology, a photocopy of a Best evidence rule Due diligence Quid pro quo Voir dire
41 document has become acceptable in place of the A
original is known as:
Evidence contained in a document provided to prove Inadmissible Illegally obtained Hearsay evidence Direct evidence
42 that statements made in court are true is referred to evidence evidence C
as:
Business records are considered to be an exception to: Direct evidence Inadmissible Illegally obtained Hearsay evidence
43 evidence evidence D
Which of the following is not one of the levels of Probably Maybe Almost definitely Possibly
44 B
certainty associated with a particular finding?
45 Direct evidence establishes a: Fact Assumption Error Line of inquiry A
What is one of the most complex aspects of jurisdiction Arranging to travel Determining which Finding a court that Finding a federal
when the Internet is involved? to remote locations court can enforce a is in two states court that can hear a
46 to apprehend judgment over a civil suit B
criminals defendant

In the US, to enforce a judgment over a defendant, a Subject matter and General and limited Diversity and long None of the above
47 court must have which of the following? personal jurisdiction jurisdiction arm jurisdiction A

The Miller test takes which of the following into It appeals to the It depicts sexual It lacks any All of the above
public interest conduct in a monetary value
48 account when determining if pornography is obscene? B
patently offensive
way
Which of the following rights is not explicitly Right of the people Right of personal Right of the people Right to a speedy
49 mentioned in the US Constitution? to keep and bear privacy peaceably to and public trial B
arms assemble

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

The definition of a <protected computer= is, according A computer that is A computer that is A computer that is All of the above.
to the CFAA: used exclusively by used non- used in state or
a financial exclusively by a foreign commerce
institution or the financial institution or communication.
50 Federal government. or the Federal D
government and the
crime affects that
use.

The legislation that made the theft of trade secrets a The Lanham Act The Economic The Child None of the above
51 Federal crime was Espionage Act Pornography B
Protection Act
Which state does not have a law prohibiting simple California Texas Washington None of the above
52 hacking – gaining unauthorized access to a computer? D

The term <computer contaminant= refers to: Excessive dust Viruses, worms, and Spam e-mails Nigerian scam e-
53 found inside the other malware mails B
computer case
In those states with legislation addressing computer Computers Computer Specialized All of the above
54 forgery, contraband in the form of <forgery devices= equipment computer software D
may include:
Compelling a suspect to reveal passwords to provide Second Amendment Fourth Amendment Fifth Amendment Seventh
55 access to encrypted media is considered to fall under Amendment C
the:
An example of a content-related crime would be: Cyberstalking Child pornography Hacking None of the above
56 B
Hacking is an example of: Computer-assisted Computer-related Computer-integrity Computer
57 C
crime crime crime malfeasance crime
Forgery is an example of: Computer assisted Computer-related Computer-integrity Computer
58 A
crime crime crime malfeasance crime
In Ireland, the Non-Fatal Offences Against the State Act Computerized Cyberbullying Nigerian scams Hacking
59 welfare fraud B
of 1997 specifically addresses:
Jurisdiction claims may be based on: Location of the Location of the Location of All of the above
60 perpetrator’s victim’s computer intermediary D
computer computers

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Standard operating procedures (SOPs) are important Help individuals Ensure that the best Increase the All of the above
because they: avoid common available methods probability that two
mistakes are used forensic examiners
will reach the same
61 D
conclusions when
they examine the
evidence

The goal of an investigation is to: Convict the suspect Discover the truth Find incriminating All of the above
62 B
evidence
An investigation can be hindered by the following: Preconceived Improperly handled Offender All of the above
63 theories evidence concealment D
behavior
When you have developed a theory, what can you do to Predict, based on Perform Conclude, based on All of the above
confirm that your hypothesis is correct? your hypothesis, experiments to test your findings,
64 where artifacts results and rule out whether the D
should be located alternate evidence supports
explanations the hypothesis
Which of the following would be considered an The originating IP A scratch on the Date-time stamps of All of the above
individual characteristic? address in a glass of a flatbed files on a disk or
65 B
network packet or e- scanner or digital entries in a database
mail header camera lens
When digital photographs containing child Someone in the Someone in the Someone in the None of the above.
pornography are found on a home computer, house transferred house took the house took the
investigators can assert that: a the photographs photographs with a photographs with a
66 onto the computer digital camera and digital camera and D
from a disk or the transferred transferred them
Internet them directly onto directly onto the
the computer. computer
Forensic examination involves which of the following: Assessment, Seizure and Recovery, All of the above
experimentation, preservation harvesting, filtering,
67 fusion, correlation, organization, and C
and validation search

Forensic analysis involves the following: Assessment, Seizure and Recovery, All of the above
experimentation, preservation harvesting, filtering,
68 fusion, correlation, organization, and A
and validation search

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

The first step in applying the scientific method to a Form a theory on Experiment or test Make one or more Form a conclusion
digital investigation is to: what may have the available observations based based on the results
69 occurred evidence to confirm on events that of your findings C
or refute your occurred
prediction
Which of the following should the digital investigator Should the evidence Will the evidence Will there be All of the above
consider when arranging for the transportation of be physically in the copies be shared environmental
possession of the with other experts factors associated
70 evidence? D
investigator at all at other locations? with the digital
times? media?

In the Staircase Model, why is case management Case documents are Case management Case management None of the above.
shown spanning across all of the steps in the process intangible objects provides stability documents the
model? that can be held. and enables process function.
71 investigators to tie B
all relevant
information
together.
Process models have their origins in the early theories Complicated Difficult Linear Polymorphic
72 of computer forensics which defined the field in terms C
of a ______ process
Generating a plan of action and obtaining supporting Preparation Survey/identificatio Preservation Examination and
73 resources and materials falls under which step in the n analysis A
digital investigation?
The process model whose goal is to completely The Physical Model The Staircase Model The Evidence Flow The Subphase
74 describe the flow of information in a digital Model Model C
investigation is known as:
The following organizations have published guidelines US Secret Service Association of Chief US Department of All of the above
75 for handling digital crime scenes: Police Officers Justice D

When a first responder encounters technology or Seize the equipment Seek assistance Leave that Ask the suspect for
as if it were a known from a more particular piece of details on the
76 equipment that he is not familiar with, the B
recommended course of action is to: device experienced digital equipment at the equipment
investigator crime scene
When preparing a questionnaire for interviewing Passwords Encryption keys Admission of guilt Details on
individuals of the crime scene which of the following removable storage
77 C
should NOT be requested:

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

When entering a crime scene, the initial survey should: Include user Involve tracing Collect relevant All of the above
manuals cables data such as
78 D
passwords and
account details
Examples of data that should be immediately USB drives Digital picture System and USB bracelets
79 preserved include: frames network C
information
The crime scene preservation process includes all but Protecting against Acquiring digital Confirming system Controlling access
80 which of the following: unauthorized evidence date and time to the crime scene C
alterations
A thorough crime scene survey should include: Manuals for Removable media Mobile devices All of the above
81 software D
applications
The challenge to controlling access to a digital crime Information may be The computer may The computer case None of the above.
stored on Internet be shared. may be locked.
82 scene is that: A
servers in different
locations
In the case where digital investigators dealing with Notify personnel at Notify personnel at Utilize remote None of the above
distributed systems need to collect data from remote the remote sites to the remote sites to forensics tools to
sites, the following procedure is recommended: leave everything as shut down all acquire data from
83 is, and arrange for systems and send the remote sites’ C
travel to the remote the hard drives to RAM as well as the
locations the forensic lab hard drives

When presenting evidence on an organizational System The CEO of the The CSO (Chief Additional forensic
84 network, the digital investigator may require the administrators organization Security Officer) investigators A
assistance of:
Which of the following is not a safety consideration for Additional Protection against Proper tools for Protective gloves
a first responder? personnel to control ELF emanations disassembling and and eyewear
85 those present at the from monitors reassembling B
crime scene computer cases

Digital investigators like to preserve every potential The law Resources The interests of All of the above
86 source of digital evidence; however, they are business D
constrained by:

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

During the initial survey of a crime scene, why it is This simplifies Photographing To record the fact None of the above.
necessary to photograph or videotape the area and inventorying the items to be seized that a particular
items of potential interest in their current state? crime scene records their actual item was actually
condition, and found at the crime
87 precludes damage scene. C
claims when the
items are returned
to the offender.

Why is the first step to secure the physical crime scene To prevent them To prevent them To give them time To keep them from
by removing everyone from the immediate area? from contaminating from asking to fill out a personal blocking the view
evidence questions about the information survey when photographs
88 A
case before they can are being taken
be interviewed

When a piece of evidence has both a biological and a The crime scene The digital Neither; the Both the crime
digital component, who should process it first? technician, because investigator, evidence should be scene technician and
biological artifacts because processing preserved and the digital
are much more the biological transported to the investigator, in a
fragile artifacts will destroy lab for processing cooperative effort,
digital evidence assuring that the
89 D
biological evidence
is collected in a way
that does not
damage the digital
component

The process of evaluating available evidence Equivocal forensic Investigative Threshold Behavioral imprints
objectively, independent of the interpretations of analysis reconstruction assessment
90 A
others, to determine its true meaning is referred to as:

The words that an offender uses on the Internet, the Investigation Threshold Behavioral imprints Crime scene
tools that an offender uses online, and how an offender reconstruction assessment analysis
91 C
conceals his identity and criminal activity are referred
to in the text as:
Investigative reconstruction is composed of three Which of the Functional Intentional Relational
following is NOT one
92 different forms B
of those three
forms? Patil CO 52 (madeforcollegeonly@gmail.com)
Downloaded by Prathamesh
lOMoARcPSD|14293917

Creating a histogram of times to reveal periods of high Functional Intentional Relational Temporal
93 activity is an example of which form of investigative D
reconstruction?
The investigation and study of victim characteristics is Criminal profiling Behavioral imprints Victimology Crime scene
94 analysis C
known as:
Why should victimology include a thorough search of Because the Because it is well Because nearly None of the above.
the Internet for cybertrails? a Internet can known that even everyone uses the
significantly traditional criminal Internet.
95 A
increase the victims offenses are
risk documented on the
Internet.
The type of report that is a preliminary summary of SITREP Threshold Full investigative Field notes
96 Assessment report report B
findings is known as:
According to the text, the distinguishing features of a Hard evidence Fruit of the poison Caveat emptor Crime scene
crime scene as evidenced by the offender’s behavioral tree characteristics
97 D
decisions regarding the victim and the offense location
are known as:
In crimes against individuals the ______ period leading 24-hour 48- hour 60-minute 15-minute
up to the crime often contains the most important
98 A
clues regarding the relationship between the offender
and the victim
One of the most important things to establish when a Where the What operating Who or what was None of the above
99 computer is directly involved in the commission of a computer was system is in use the intended victim C
crime is: purchased or target
An example of online behavior that puts an individual Using your real Putting personal Posting photographs All of the above
at higher risk for cyberstalking is: name online information in your on a social
100 D
profile networking page

In the movie Home Alone one of the burglars would Psychotic episode Signature-oriented Modus operandi Vandalism
always turn the water on in the sinks so that the house behavior
101 would be flooded when the owners returned. In terms B
of crime scene characteristics, this is an example of:

The totality of choices an offender makes during the The criminal’s MO Crime scene Tangible evidence None of the above
102 characteristics B
commission of a crime are referred to as:

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Because seemingly minor details regarding the What the offender What the offender What the offender All of the above
offender can be important, investigators should get brought to the crime took from the crime changed at the crime
103 D
into the habit of contemplating which of the following: scene scene scene

One reason digital investigators write threshold They will be They keep their They take less time They serve as field
assessments more often than full reports is because: included in a final supervisor aware of to prepare and may notes for the
report, and so, their productivity. be sufficient to close investigator.
distribute the time out an investigation.
104 for final report C
preparation over the
entire period of the
investigation

Every violent crime investigation should incorporate Investigative leads Likely suspects Previously All the above
105 digital evidence because digital evidence may reveal: unknown crimes D

How the offender approaches and obtains control of a Motives Choice of weapons Modus operandi Signature behaviors
106 victim or target is significant because it exposes the A
offender’s:
Crime scenes fall into two categories – primary and Remote Secondary Ancillary Theoretical
107 B
____
When reconstructing evidence surrounding a violent Lay out all the Work with the Construct a timeline Begin the process of
crime, it is generally helpful to: evidence so it can be crime scene of events from converting field
viewed in its technicians so that a digital evidence notes to a final
108 entirety better report C
understanding of the
crime is achieved

One reason not to put too much trust into those who There has always They are typically They are usually not They may be the
run the company’s computers is that: been an antagonism too busy to take the authorized to offenders.
between system time to answer your answer questions.
109 D
administrators and questions
law enforcement

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Although crime scenes are typically photographed, it is Diagramming is a The process of The quality of None of the above.
a good idea to create diagrams of the crime scene common crime creating a diagram photographs taken
because: scene technician’s can result in a digital at the crime scene is
skill; however, it investigator noticing not known until the
110 requires continual an important item of film is developed. B
practice evidence that would
otherwise have been
missed

Given the scope and consequences of violent crimes, Collect only that Focus only on the Seek out and Focus only on the
when collecting digital evidence it is advisable to: digital evidence that primary crime preserve all offender’s digital
is clearly connected scene, as searching available digital evidence, as the
to the offense the offender’s home evidence victim’s digital
111 C
and workplace evidence is usually
requires additional of little value
authorization

When swift action is needed, law enforcement Searches of this Exigent Eminent domain Mens rea
112 personnel may be permitted to conduct searches kind are permitted circumstances A
without a warrant under:
When processing the digital crime scene in a violent A good supply of More than one Standard operating A good supply of
crime investigation it is important to have ________ to electrostatic bags reliable camera for procedures for nitrile gloves
for holding sensitive photographing the processing a digital
113 ensure that all digital evidence and findings can hold C
up under close scrutiny electronic crime scene crime scene
components

The Federal statute that has a provision allowing ECPA CCPA The Privacy Act FCRA
Internet service providers to disclose subscriber
114 A
information to law enforcement in exigent
circumstances is:
When reconstructing evidence surrounding a violent Diagram the crime Create a timeline of Create a threat None of the above
115 crime, it is generally helpful to: scene events from digital assessment report B
evidence
A thief who has programmed and released a virus to Power assertive Profit oriented Power reassurance Anger retaliatory
roam a network looking for victim passwords used for
116 B
online banking is an example of what offense
behavior?

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

The case of a Michigan bank robber requiring tellers to Deviant aberrant Criminal humor Crime scene Investigative
117 undress so he could photograph them is an example of: behavior characteristics reconstruction C

The assessment of the victim as they relate to the Threat assessment Signature behaviors Behavioral evidence Victimology
118 offender, the crime scene, the incident, and the methodology analysis D
criminal justice system is known as:
Computers and mobile devices are treated as _________ Temporary Immediate Remote Secondary
119 crime scenes in violent crime investigations D

During the commission of a crime, evidence is Locard’s Exchange Sutherland’s Martin’s Rule d Parkinson’s Rule of
120 transferred between the offender’s computer and the Principle General Theory of Available Space A
target This is an example of: Criminology
Intruders who have a preferred toolkit that they have Usually have little Show little initiative Are generally more Pose less of a threat
experience and are – letting the tool do experienced
121 pieced together over time, with distinctive features: C
relying on the kit the work

In the case of a computer intrusion, the target The remote crime The auxiliary crime The virtual crime The primary crime
122 scene scene scen scene D
computer is:
A computer intruder’s method of approach and attack Skill level Knowledge of the Intent All of the above
123 target D
can reveal significant amount about their:
Determining skill level can lead to: Determining the Likely hiding places Suspects Offense behaviors
124 extent of the for rootkits and C
intrusion malware
If digital investigators find an unauthorized file, they Immediately move Check for other Execute the file to Permanently delete
125 should: the file to removable suspicious files in determine its the file B
media the same directory purpose
Remote forensic solutions can be used to access live Acquire and, Image systems Conduct Image large systems
sometimes, analyze without ever having examination and across the Internet
126 systems, and include the ability to: A
memory to leave the lab analysis without the
need to image
A forensic analysis conducted on a forensic duplicate Virtual analysis Clone analysis Post-mortem Ex post facto
127 of the system in question is referred to as: analysis analysis C

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Capturing all of the network traffic to and from the Allow the network Reveal the source of Seriously slow None of the above
compromised system can: administrators to the attack down the network,
participate in the affecting normal
investigation, work
128 B
establishing rapport
for later interviews

A common technique that is highly useful and can be This embodies a Temporal proximity Timeline analysis File system analysis
applied in a computer intrusion investigation is to principle known as:
129 A
simply focus on file system activities around the time
of known events
The registry key New software Time and date Trojans A list of recently run
HKLM\Software\Microsoft\Windows\Current Version entries information programs
130 C
is one of the most common locations for:

When collecting data from a compromised computer, CMOS Most volatile Magnetic Optical
131 consideration should be given to collecting the ______ B
data first.
The forensic examiner needs to be aware that the Is seldom useful Can take an Is only needed for Changes the
132 process of collecting memory: and not often called extremely long standalone systems contents of memory D
for period of time c d
A more thorough method of collecting specific volatile Examine the Collect the full Selectively collect Take screenshots
133 data from a computer is to: specific memory contents of physical contents of physical B
addresses live memory memory
Why are <non-volatile= storage locations contained in This is an old RFC No form of data An RFC is a Request None of the above.
the RFC 8227 <Order of Volatility=? and has not been storage is for Comments – and
134 updated permanent corrections are B
expected.

The first state in the United States to enact a law to Texas b Hawaii c California d New York
135 C
deal with cyberstalkers was: a
The first cyberstalking law in the US was passed in: 1985 b 1990 c 1995 d 2000
136 B
Stalkers want to exert power over their victims, Fear Anxiety Autosuggestion Peer pressure
137 A
primarily through:

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A stalker’s ability to frighten and control a victim Telephone numbers Addresses Personal All of the above
138 increases with the amount of information that he can preferences D
gather, such as:
Stalkers have taken to the Internet because: The cost of an They depend They no longer have None of the above
Internet connection heavily on to go out to do their
has dropped information and the stalking
139 B
considerably Internet contains
vast amounts

An implication from studies indicating that many Part of the blame The offender is Investigators Investigators
stalkers had prior acquaintance with their victims is can be assigned to likely to be found in should pay should always check
the victim the same area as the particular attention the immediate
140 that: C
victim to acquaintances of family
the victim

An excellent set of guidelines developed specifically for The National Center The National White The Department of The National
141 victims of stalking is available from: for Victims of Crime Collar Crime Center Justice Institute of Justice A

When a cyberstalking case is stalled, it is a good idea to The victim might The information The time between None of the above
interview the victim again, because: have been that investigators the first and second
withholding have gathered might interviews has given
142 B
information during help the victim the victim time to
the first interview recall additional seek counseling
details
In determining how and why the offender selected a Knew the victim Learned about the Noticed the victim All of the above
143 specific victim, the investigator should determine victim through a in a chat room D
whether the cyberstalker: personal web page
A key aspect of developing victimology is determining Hobbies Likes and dislikes Risks Roles
144 C
victim and offender _____
When searching for evidence of cyberstalking, it is Grooming Surreptitious Initial contact Congenial
145 useful to distinguish between an offender’s harassing monitoring B
behaviors and ____________ behaviors
That part of cyberstalking where the offender is using Profiling Trolling Surreptitious None of the above.
146 monitoring C
the Internet to find a victim is known as:
When a cyberstalker chooses victims at random, he is Opportunistic Power assertive Profit-oriented None of the above
147 stalker stalker stalker A
said to be an:

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

The initial stage in a cyberstalking investigation is to: Search for Analyze crime scene Conduct Interview the victim
148 additional digital characteristics victimology and risk D
evidence assessments
It is extremely important for the investigator to be If the victim If the investigation The victim must be The victims
extremely cautious when dealing with a stalking case becomes offended is conducted too protected, in case frequently become
because: by the investigator’s openly, the offender the offender decides emotionally
methods, she is may stop the to escalate to attached to the
149 C
likely to go file a harassment and physical violence investigator
complaint move on to another
victim

Which of the following is NOT part of the set of Preparation Interdiction Documentation Reconstruction
150 B
forensic methodologies referenced in this book?
Preparation planning prior to processing a crime scene What computer What the systems Whether a network All of the above
151 should include: equipment to expect are used for is involved D
at the site
The forensic crime scene processing kit should include Evidence bags, tags, Forensically Compilers for Hardware write
and other items to sanitized hard developing forensic blockers
152 all of the following, EXCEPT: C
label and package drives to store tools on site
evidence acquired data
When processing the digital crime scene, one aspect of Recognizing Determining if Confirming that the Making sure there is
surveying for potential sources of digital evidence is: relevant hardware electrical wiring is operating sufficient space to
such as computers, capable of environment is set up the forensic
153 A
removable media, supporting forensic suitable for crime scene
etc machines electronic processing kit
equipment
The _____________ documentation specifies who handled Evidence inventory Chain of custody Evidence intake Preservation notes
154 the evidence, when, where, and for what purpose B

When documenting a crime scene, the computer and The more evidence This provides a It is prudent to All of the above.
surrounding area should be photographed, detailed collected, the record for what to document the same
155 sketches should be made, and copious notes should be stronger the case. look for when you evidence in several C
taken, because: return for the ways.
second visit.
In regard to preservation, in a child pornography Photographs Papers Digital cameras All of the above
156 investigation, which of the following should be D
collected?

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

If it is determined that some hardware should be Nearest reach Direct connectivity Independent Slice-the-pie
collected, but there is no compelling need to collect doctrine doctrine component doctrine doctrine
157 C
everything, the most sensible approach is to employ:

According to the us Federal guidelines for searching 60-80 degrees 50-90 degrees 50-90 degrees 60-80 degrees
and seizing computers, safe temperature ranges for Fahrenheit centigrade Fahrenheit centigrade
158 C
most magnetic media are:

Which of the following is NOT an artifact that will be Running processes Open network ports Data stored in System date and
159 irrevocably lost if the computer is shut down? memory time D

Which of the following is NOT one of the Place the evidential Preview the Extract just the Acquire everything
recommended approaches to preserving digital computers and evidential computer, information needed from evidential
storage media in taking appropriate from evidential computer and
160 evidence? B
secure storage for notes computers and storage media
later processing storage media

The reason UNIX <dd= is considered a de facto standard The majority of tools <dd= stands for <dd,= although a The developers of
for making bitstream copies is: for examining digital <digital data= and UNIX tool, is <dd= have made
evidence can was developed for universally able to arrangements with
161 A
interpret bitstream making forensic traverse Windows other forensic
copies copies. file systems. software companies.

Regarding the examination of a piece of digital What is it What classifications Where did it come What is its value?
evidence, which of the following is NOT one of the (identification)? distinguish it? from?
162 D
fundamental questions that need to be answered?

Which of the following issues is NOT one that a Invasive The facility in the The location, Available methods
forensic examiner faces when dealing with Windows- characteristics of standard Windows organization, and for recovering data
163 based media? the Windows environment for content of Windows from Windows B
environment mounting a hard system log files media
drive as Read-Only
Forensically acceptable alternatives to using a Linux boot floppy FIRE bootable CD- Booting into safe Hardware write
164 Windows Evidence Acquisition Boot Disk include all ROM mode blockers C
but which of the following?
The standard Windows environment supports all of FAT16 ext2 FAT32 NTFS
165 B
the following file systems EXCEPT ______
Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

Before evidentiary media is <acquired,= forensic Hash Preview Validate Analyze


166 examiners often ________ the media to make sure it B
contains data relevant to the investigation
Log files are used by the forensic examiner to __________ Associate system Verify the integrity Confirm login Determine if a
events with specific of the file system c passwords d specific individual is
167 A
user accounts b the guilty party

The Windows NT Event log Appevent Contains a log of Records activities Notes system None of the above
application usage that have security events such as
168 A
implications, such as shutdowns
logins
When examining the Windows registry key, the <Last The last time When a value in The current system The number of
169 Write Time= indicates:
RegEdit was run b that Registry key time allowable changes
B
was altered or has been exceeded
added
File system traces include all of the following EXCEPT: Metadata CMOS settings Swap file contents Data object date-
170 time stamps B
When a file is moved within a volume, the Last Is unchanged Changes if a file is Changes if a file is Is unchanged;
moved to different moved to the root however, the
171 Accessed Date Time: A
directory Created Date-Time
does change
Internet traces may be found in which of the following Web browser cache Instant messenger Cookies All of the above
172 cache D
categories?
The Windows NT Event log Secevent evt: Contains a log of Records activities Notes system None of the above
application usage that have security events such as
173 B
implications, such as shutdowns
logins
Which of the following is NOT one of the methods FDDI Telecommunication WiFi access points Bluetooth piconets
174 mobile devices use to communicate? networks A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

One major advantage of mobile devices from a forensic People very seldom The process for Flash memory is Manufacturers
perspective is that: delete information deleting information deleted block-by- reserve a part of
from mobile devices is much more block and mobile memory for storing
complicated than for devices generally deleted items
adding information, wait for a block to be
175 C
and users frequently full before it is
don’t delete things deleted
correctly

The reason that malware developers are beginning to Because available The malware Since the coding is Since mobile
target mobile devices is: memory is much market has become much simpler on devices are used
smaller and the very crowded and mobile devices, more and more for
operating system is developers are many new online banking and
much less looking for new programmers are making purchases,
176 D
sophisticated on avenues trying at this they have become
mobile devices, it is particular platform prime targets for
much easier to computer criminals
develop malicious
code
Software designed to monitor activities on mobile Malware b Spouseware c Trojan defense d None of the above
177 B
devices has come to be called: a
One of the dangers (from a forensic standpoint) of Connected Network service Connected Network service
mobile devices is: networks can providers may networks can enable providers may
contain provide information offenders to delete provide additional
investigatively for comparison with data remotely historical call
178 C
useful information data extracted from records
a mobile device

One of the difficulties unique to forensic processing of MD five hashes Documentation An investigator Any issues
mobile devices is: must be calculated must show must make a encountered with
for data recovered continuous calculated decision processing the
from mobile devices possession and to either prevent or device should be
179 control allow the device to documented C
receive new data
over wireless
networks

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Powering down a mobile device and removing the When the battery is Doing so may The process of You now have two
battery may cause problems in that: a removed from a activate security removing the pieces of evidence,
mobile device, the measures such as battering can cause which have to be
180 information in lock codes and a capacitive documented B
memory is lost encryption discharge,
destroying the
device
Which of the following are methods for preserving Reconfigure the Place the device in Jam RF signaling in All of the above
device to prevent an RF-shielded the immediate area
181 mobile devices by isolating them from the networks? D
communication pouch
from the network
Why is it important to collect charging cables when Mobile device To reduce owner In those cases None of the above
seizing mobile devices? batteries have a complaints about where evidence
limited charge life missing cables seized is forfeit, you
span, and the device when, at some point, want to make sure
will need a charger seized devices are you have everything
182 A
to maintain the returned you need to operate
battery until the the device
device can be
processed

Which of the following is NOT one of the currently Manual operation Logical acquisition
Connecting the Physical acquisition
available methods for extracting data from mobile via user interface via communication
communication port via the
183 devices? port
directly to an output communication port C
device such as a
printer
Forensic examiners should be aware that a mobile May as well be May only indicate May require that None of the above
device with a blank or broken display: thrown away, as no that the screen is the mobile device be
data will be damaged and it may sent out to the
184 B
recovered from it still be possible to manufacturer for
extract data repairs

A peculiarity of mobile devices is the format that they ASCII Unicode GSM 7-bit Baudot
185 C
store SMS messages, which is: a
The primary reason that brute-force methods are not A four-digit PIN After three failed PIN disclosure by None of the above
represents 10,000 attempts, the SIM the offender can be
186 used when trying to access an SIM card with the PIN B
set is: possible card will become required by a court
combinations locked order

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

An understanding of networks helps with which of the Establishing Tracking down Understanding All of the above
continuity of offense offenders traces of online
187 following: D
activities left on a PC

When a Windows system connects to a shared folder TCP/IP SMB NetBIOS All of the above
on another Windows machine on the Internet, which
188 D
of the following protocols are used?

Hosts that connect two or more networks are called: Routers Switches Hubs All of the above
189 A
190 Which of the following are Layer 7 protocols? Ethernet HTTP TCP All of the above B
Ethernet uses which of the following technologies? CDPD CSMA/CD CDMA All of the above
191 B
192 Another name for a hub is: Switch Router Concentrator NIC C
Currently, the most widely used Internet protocols are: TCP UDP IP All of the above
193 D
The OSI reference model divides Internets into seven Transport, Session, Presentation, Data- Physical, Data-link, Data-link, Network,
layers Choose the correct order, by layer Network, link, Application, Network, Transport, Session, Application,
194 Presentation, Data- Physical, Transport, Session, Physical, Network, C
link, Application, Session, Network Presentation, Session
Physical Application
The layer that actually carries data via cables or radio Transport layer Physical layer Network layer Data-link layer
195 B
signals is the:
A hub joins hosts at the physical level whereas a switch Transport Physical Network Data-link
196 D
joins them at the _____ layer
The layer responsible for managing the delivery of Application layer Presentation layer Transport layer Session layer
197 C
data is the:
Which of the following network technologies uses a Ethernet FDDI Asynchronous 802.11
198 Transfer Mode B
fiber-optic medium?
Preservation of digital evidence can involve which of Collecting computer Making a forensic Copying the files All of the above
the following? hardware image of storage that are needed
199 D
media from storage media

A forensic image of a drive preserves which of the Memory contents File slack and System date and Screen contents
200 unallocated space time B
following?
Examination of digital evidence includes (but is not Seizure, Recovery, Experimentation, Arrest,
201 limited to) which of the following activities? preservation, and harvesting, and fusion, and interviewing, and B
Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
documentation reduction correlation trial
lOMoARcPSD|14293917

Analysis of digital evidence includes which of the Seizure, Recovery, Experimentation, Arrest,
202 following activities? preservation, and harvesting, and fusion, and interviewing, and C
documentation reduction correlation trial
Evidence can be related to its source in which of the Top, middle, bottom IP address, MD5 Production, Parent, uncle,
203 following ways? value, filename, date- segment, alteration, orphan C
time stamps location
When a website is under investigation, before Determine where Inform personnel at Conduct a None of the above
obtaining authorization to seize the systems it is the web servers are the web server reconnaissance
204 necessary to: located location that you’ll probe of the target A
be coming to seize website
the systems
Which of the following is NOT an information Scanning the Studying security Attempting to Examining e-mail
205 gathering process? system remotely audit reports bypass logon headers C
security
Unlike law enforcement, system administrators are Open unread e- Monitor network Modify system logs Divulge user
permitted to ________ on their network when it is mails traffic personal
206 information B
necessary to protect the network and the data it
contains
Although it was not designed with evidence collection EnCase FTK Wireshark CHKDSK
207 in mind, _______can still be useful for examining C
network traffic
Issues to be aware of when connecting to a computer Creating and Keeping a log of Documenting which All of the above
over a network and collecting information include: following a set of actions taken during server actually
208 standard operating the collection contains the data D
procedures process that’s being
collected
Occasionally, an intrusion detection system may False warning Failsafe DEF con False positive
trigger an alarm caused by an innocent packet that
209 D
coincidentally contains intrusion class characteristics
This type of alert is called:
Information security professionals submit samples of Bugtraq Sam Spade CNET Security Focus
log files associated with certain intrusion tools to help
210 A
others detect attacks on the mailing lists at:

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Which of the following are situations where a The hard drive is The system cannot The digital All of the above
bitstream copy may not be viable? too large to copy be shut down investigator does
211 not have authority D
to copy the entire
drive
Who is authorized to conduct online undercover Anyone Computer security Journalists Law enforcement
212 investigations when child pornography is involved? professionals D

Which of the following Internet services can be used to IRC Usenet KaZaa All of the above
213 D
exchange illegal materials?
What are two of the most useful headers for From and Message- NNTP-Posting-Host Path and Subject RFC1036 and
214 ID and X-Trace RFC2980 B
determining the origination of Usenet messages?
What information should you document when Date/time of Screenshots of Download copies of All of the above
searching for evidence on the Web? search, search significant search the webpages and
215 engine and terms results calculate their MD5 D
used, address of value
pertinent results
Why is it important to hide your identity when To reduce the risk
To get yourself in To make it easier All of the above
of alerting the the mindset of for you to determine
216 conducting an online investigation? A
offender covert web the offender’s
investigating location
When it is not possible to determine the identity of the Look for unusual Search the Web Look for similar All of the above
author of a Usenet message using IP addresses in the signature and use of using distinctive Usenet messages
217 D
header, what else can you do to learn more about the language aspects of posts posted using an alias
author?
What characteristics of IRC make it attractive to IRC enables them to IRC provides them IRC gives them All of the above
criminals? exchange illegal with some level of direct, <live= access
218 materials with other anonymity to a large pool of D
criminals potential victims

Which of the following enables a user to connect to IRC Freenet psybnc bot Fserve All of the above
219 and run IRC fserves without disclosing their IP B
address?
Which of the following applications leave traces of Internet Explorer KaZaA IRC All of the above
220 D
Internet activities on a personal computer?
Which of the following tools can reconstruct TCP Tcpdump Wireshark Snoop EnCase
221 B
streams?
Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

What peer-to-peer clients use the Fast Track network? KaZaA Grokster iMesh All of the above
222 D
Web Whacker and Httrack are examples of tools that: Search the Web Deface websites Capture websites Launch websites
223 C
Metaverseink is a: Search tool (people Newsgroup Social networking A file-sharing peer-
224 or things) for virtual aggregator meta-tool to-peer network A
worlds
Second Life is one of the better known: Research websites Archive websites Virtual worlds Web-based game
225 C
shows
Synchronous chat networks are particularly conducive Privacy Immediacy Impermanence All of the above
226 D
to criminal activity because of their
What is the maximum cable length for a 10BaseT 10 feet 100 feet 10 meters 100 meters
227 D
network?
What is the approximate theoretical maximum number 10 Mb 75 Mb 100 Mb 175 Mb
228 of bytes that can be downloaded in one minute on a B
10BaseT network?
Which of the following commands can be used to Netstat Ping Nbtstat Traceroute
229 obtain the MAC address of a remote Windows C
computer?
What is the maximum cable length for a 10 base five 100 feet 500 feet 100 m 500 m
230 D
segment?
ARP stands for: Address Resource Advanced Retrieval Address Resolution Added Resource
231 Protection Protocol Protocol Processing C

The best operating system for capturing network Microsoft OpenBSD/FreeBSD Linux Solaris
232 traffic on high-speed networks is: DOS/Windows B

Which of the following applications is used to capture Snort Wireshark Tcpdump All of the above
233 D
network traffic?
How many bytes per packet does tcpdump capture by 10 bytes 68 bytes 128 bytes 1024 bytes
234 B
default?
Which of the following tools can reconstruct TCP Tcpdump Wireshark Snoop EnCase
235 B
streams?
The transition method in which only one computer can Baseband Narrowband Broadband Sideband
236 transmit while all the others listen is known as: A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Although ARP is part of TCP/IP, it is generally Physical Data-link Network Transport


237 B
considered a part of the ______ layer
The form of ARP that ATM uses to discover MAC ARPATM ATMARP MACATM ATMMAC
238 B
addresses is known as:
TCP is an abbreviation for: Transit Transportation Cost Transport Control Time
239 Communication Product Protocol Communication C
Protocol Protocol
What system is used to convert IP addresses to their TCP/IP DNS ARP Routing
240 B
associated names?
241 What protocol does the <ping= command use? TCP IP ICMP All of the above C
Which of the following logs record the IP addresses of Wtmp Xferlog Syslog Access log
242 computers accessing an FTP server? a B

In addition to the IP address of the sender, SMTP e- The Message ID The time the The name of the All of the above
243 mail server logs contain which of the following? message was sender D
received

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Marthwada Mitra Mandal's Polytechnic


Program: Computer Engineering
No. of
Sr. No. Extar curricular Activity Contact Person Date Program
students
1

10

11

12

13

14

15

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


Which tool is used to encrypt Email?
A. WebInspect
B. QualyGuard
C. PGP (pretty good privacy)
D. None of the above.

A grey hat hacker is the one who_______


A. Fix identifies weakness
B. Steal the data
C. Identifies the weakness and leave message to owner
D. None of the above

5G was introduced in which year?


A) July 2015 B) July 2016 C) July 2017 D) July 2018

The G in 5G stands for?


A) Gigabit B) Gigahertz C) Good to Go D) Generation

What is a blockchain?
A) A Currency B) A centralized ledger C) A distributed ledger on a peer to peer network D) Technology

Where do you store your cryptocurrency?


A) Pocket B) Wallet C) Exchange D) Bank account

What does P2P stand for?


A) Peer to Peer B) Product to Product C) Password to Password D) Private to Public

What is a node?
A) Blockchain B) An exchange C) A type of cryptocurrency D) A computer on a Blockchain network

Who created Bitcoin?


A) Elon Musk B) Warren Buffett C) Satoshi Nakamoto D) Mark Zuckerberg

Who is the first ethical hacker in the world?


A) Rene Carmille B) Henri Dentz C) Charles Platon D) Marcel Deslaurens

.FAT stands for in Ethical Hacking?


A) Forensic Analysis Tool B) Format Allocation Test
C) File Allocation Transfer D) File Allocation Tables

__________is any action that might compromise cyber-security.


A) Threat B) Attack C) Exploit D) Vulnerability

IoT is an advanced automation and analytics system which deals with?


A) electronic B) cloud messaging C) sensor, networking D) All of the above

The bit length of the IPV4 is ______


A) 16 bits B) 32 bits C) 64 bits D) 128 bits
Computer forensics also known as?
A) digital forensic science B) computer crime
C) computer forensic science D) computer forensics investigations
Which of the following IoT networks has a very short range?
A) SigFox B) LPWAN C) Short Network D) Short-range Wireless Network
CCFP stands for?
A) Cyber Certified Forensics Professional
B) Certified Cyber Forensics Professional
C) Certified Cyber Forensics Program
D) Certified Cyber Forensics Product

Which of the following is true about IoT?


A) IoT has greater transparency, control, and performance.
B) The term Things in the Internet of Things refers to anything and everything in day to day life
C) Both (A) and (B)
D) None of the above

Global Sensor Network is built for _______


A) Reducing cost and time for development
B) Reducing cost and increasing time for development
C) Increasing cost and decreasing time for development
D) Increasing cost and increasing time for development

A blockchain is a type of?


A) Database B)View C)Table D)Object

What does a block in a Blockchain have?


A)Header & Transaction B)Bitcoins & Input
C) Transactions & Bitcoins D)Header & Digital ledger

What is the full form of IaaS?


A) Infrastructure as a Service. B) Internet as a Service.
C) Internet as a Software. D) Infrastructure as a software.

Malicious attacker often think like?


A. Thieves
B. Kidnapper
C. Both A & B
D. None of the above
Question Bank (I scheme)

Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence

1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B

2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A

3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A

4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A

5. What of the following is considered to be a pivotal event in the history of AI.


A. 1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
Ans: C
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B

7. The field that investigates the mechanics of human intelligence is:


A. History
B. cognitive science
C. psychology
D. sociology
E. None of the above
Ans: B

8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A

9. The first AI programming language was called:


A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above
Ans: C

10. What is Artificial intelligence?


A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Putting more memory into Computer
Ans: C

11. Who is a father of AI?


A. Alain Colmerauer
B. John McCarthy
C. Nicklaus Wirth
D. Seymour Papert
Ans: B

12. Artificial Intelligence has its expansion in the following application.


A. Planning and Scheduling
B. Game Playing
C. Robotics
D. All of the above
Ans: D

13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C

14. The first AI programming language was called:


A. BASIC
B. FORTRAN
C. IPL
D. LISP
Ans: C

15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C

16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A

18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C

20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

21. ______ do not guarantee optimal/any solutions


A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

22. Cognitive science related with _____


A. Act like human
B. ELIZA
C. Think like human
D. None of above
Ans: C

23. _____ Model should reflect how results were obtained.


A. Design model
B. Logic model
C. Computational model
D. None of above
Ans: C

24. Communication between man and machine is related with ______


A. LISP
B. ELIZA
C. All of above
D. None of above
Ans: B

25. ELIZA created by _____


A. John McCarthy
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B

27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C

28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B

29. PROLOG, LISP, NLP are the language of ____


A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A

30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A

31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A

32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D

33. The core components are constituents of AI are derived from


A. Concept of logic
B. Cognition
C. Computation
D. All of above
Ans: D

34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A

35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B

36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A

37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B

38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C

39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A

40. Human to Machine is _____ and Machine to Machine is ______.


A. Process, Process
B. Process, Program
C. Program, Hardware
D. Program, Program
Ans: C

41. Weak AI is also known as ____


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

42. _____ AI is able to perform dedicated task.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

43. Narrow AI is performs multiple task at a time.


A. True
B. False
Ans: B

44. Weak AI is____________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: C

45. Strong AI is__________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: A

46. Artificial intelligence is___________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: D

47. Apple siri is a good example of ______ AI.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

48. IBM Watson supercomputer comes under ____ AI.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

55. ____ AI is hypothetical concept of AI.


A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

58. IBM’s deep blue system is example of ___.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

59. Google Alpha Go is example of ____.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B

61. Self-driving car is example of ____.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B [Car stores recent speed of nearby cars, distance of others car, speed limit, other
information to navigate the road]

62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C

63. Which machines will be smarter than human mind?


A. Reactive machine
B. Limited memory
C. Theory of mind
D. Self-Awareness
Ans: D

64. _________machines will have their own consciousness and sentiments


A. Reactive machine
B. Theory of mind
C. Self-Awareness
D. Both B & C
Ans: C

65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C

66. What is Machine learning?


A. The autonomous acquisition of knowledge through the use of computer programs
B. The autonomous acquisition of knowledge through the use of manual programs
C. The selective acquisition of knowledge through the use of computer programs
D. The selective acquisition of knowledge through the use of manual programs
Ans: A
67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A

68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A

69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B

70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B

71. Machine learning invent by _____.


A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizenbaum
D. Arthur Samuel
Ans: D

Chapter-2 Internet of Things

1. Embedded systems are_____


A. General purpose
B. Special purpose
Ans: B

2. Embedded system is______


A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Ans: D
3. Which of the following is not true about embedded systems?
A. Built around specialized hardware
B. Always contain an operating system
C. Execution behavior may be deterministic
D. All of these
E. None of these
Ans: E

4. Which of the following is not an example of a “small-scale embedded system”?


A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C

5. The first recognized modern embedded system is


A. Apple computer
B. Apollo Guidance Computer (AGC)
C. Calculator
D. Radio navigation system
Ans: B

6. The first mass produced embedded system is


A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Ans: C

7. Which of the following is an (are) an intended purpose(s) of embedded systems?


A. Data collection
B. Data processing
C. Data communication
D. All of these
E. None of these
Ans: D

8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B

11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D

12. The instruction set of RISC processor is


A. Simple and lesser in number
B. Complex and lesser in number
C. Simple and larger in number
D. Complex and larger in number
Ans: A

13. Which of the following is true about CISC processors?


A. The instruction set is non-orthogonal
B. The number of general purpose registers is limited
C. Instructions are like macros in c language
D. Variable length instructions
E. All of these
F. None of these
Ans: E

14. Main processor chip in computers is_______


A. ASIC
B. ASSP
C. CPU
D. CPLD
Ans: C

15. Processors used in many microcontroller products need to be______


A. high power
B. low power
C. low interrupt response
D. low code density
Ans: B

16. In microcontrollers, UART is acronym of_____


A. Universal Applied Receiver/Transmitter
B. Universal Asynchronous Rectified Transmitter
C. Universal Asynchronous Receiver/Transmitter
D. United Asynchronous Receiver/Transmitter
Ans: C
17. Which architecture is followed by general purpose microprocessors?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: B

18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

20. Harvard architecture allows:


A. Separate program and data memory
B. Pipe-ling
C. Complex architecture
D. All of the mentioned
Ans: D

21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A

22. Which of the following is an example for wireless communication interface?


A. RS-232C
B. Wi-Fi
C. Bluetooth
D. EEE1394
E. Both (B) and (C)
Ans: E

23. ARM stands for _________


A. Advanced RISC Machine
B. Advanced RISC Methodology
C. Advanced Reduced Machine
D. Advanced Reduced Methodology
Ans: A
24. What is the processor used by ARM7?
A. 8-bit CISC
B. 8-bit RISC
C. 32-bit CISC
D. 32-bit RISC
Ans: D

25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A

26. ARM processors where basically designed for _______


A. Main frame systems
B. Distributed systems
C. Mobile systems
D. Super computers
Ans: C

27. ASIC chip is


A. Simple in design.
B. Manufacturing time is less.
C. It is faster.
D. Both A&C.
Ans: C

28. ASIC stands for


A. Application-System Integrated Circuits
B. Application-Specific Integrated Circuits
C. Application-System Internal Circuits
D. Application-Specific Internal Circuits
Ans: B

29. In microcontrollers, I2C stands for


A. Inter-Integrated Clock
B. Initial-Integrated Clock
C. Intel-Integrated Circuit
D. Inter-Integrated Circuit
Ans: D

30. ______________ is the smallest microcontrollers which can be programmed to perform a


large range of tasks.
A. PIC microcontrollers
B. ARM microcontrollers
C. AVR microcontrollers
D. ASIC microcontrollers
Ans: - A
31. _______________ was developed in the year 1996 by ATMEL Corporation
A. PIC
B. AVR
C. ARM
D. ASIC
Ans: - B

32. AVR stands for_____________________.


A. Advanced Virtual RISC.
B. Alf-Egil Bogen and Vegard Wollan RISC
C. Both A & B
D. None of the above
Ans: - C

33. AVR microcontroller executes most of the instruction in _________________.


A. Single execution cycle.
B. Double execution cycle.
C. Both A& B
D. None of the above.
Ans: - A

34. Term "the Internet of things" was coined by


A. Edward L. Schneider
B. Kevin Ashton
C. John H.
D. Charles Anthony
Ans: B

35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B

36. What does “Things” in IoT refers to?


A. General device
B. Information
C. IoT devices
D. Object
Ans: C

37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A

39 _____ devices may support a number of interoperable communication protocols and


communicate with other device and also with infrastructure.
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. None of above
Ans: C

40. Which one is not element of IOT?


A. Process
B. People
C. Security
D. Things
Ans:C

41. IIOT stands for


A. Information Internet of Things
B. Industrial Internet of Things
C. Inovative Internet of Things
D. None of above
Ans:B

42. Name of the IOT device which is first recognized?


A. Smart Watch
B. ATM
C. Radio
D. Video Game
Ans: B

43. _____ is used by IOT


A. Radio information technology
B. Satellite
C. Cable
D. Broadband
Ans:A

44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A

46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D

47. The sensed data communicated ___________________.


A. Cloud-based servers/storage.
B. I/O interfaces.
C. Internet connectivity.
D. None of the above
Ans: - A

48. IOT devices are various types, for instance______________.


A. Wearable sensors.
B. Smart watches.
C. LED lights.
D. All of the above
Ans: - D

49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A

50.______ is a collection of WLAN communication standards.


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:B

51. ____ is a collection of wireless broadband standards (WiMax).


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:C
52 ___ is a collection of standards for LR-WPANs.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:D

53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A

54. ______ includes GSM and CDMA.


A. 2G
B. 3G
C. 4G
D. None of above
Ans:A

55. ______include UMTS and CDMA2000.


A. 2G
B. 3G
C. 4G
D. None of above
Ans:B

56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C

57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C

60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B

61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A

62. 6LOWPAN stands for


A. 6 LOW Personal Area Network
B. IPv6 LOW Personal Area Network
C. IPv6 over Low power wireless personal area network
D. None of above
Ans:C

63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B

64. IEEE 802.11 standards provide data rates ______________


A. 10 Gbit/s.
B. 1 Gbit/s
C. 1 Mb/s to up to 6.75 Gb/s
D. 250 Kb/s
Ans: - C

65. ________ of the following is a protocol related to IOT


A. Zigbee
B. 6LoWPAN
C. CoAP
D. All of the above
Ans: C
66. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer
D. None of the above.
Ans: - B

67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A

68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A

69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D

70. What is size of the IPv6 Address?


A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Ans: C

71. MQTT stands for _____________


A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D

72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C

74. Which protocol is lightweight?


A. MQTT
B. HTTP
C. CoAP
D. SPI
Ans: A

75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B

76. XMPP is used for streaming which type of elements?


A. XPL
B. XML
C. XHL
D. MPL
Ans: B

77. XMPP creates _________ identity.


A. Device
B. Email
C. Message
D. Data
Ans: A

78. XMPP uses ________ architecture.


A. Decentralized client-server
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
79. What does HTTP do?
A. Enables network resources and reduces perception of latency
B. Reduces perception of latency and allows multiple concurrency exchange
C. Allows multiple concurrent exchange and enables network resources
D. Enables network resources and reduces perception of latency and Allows multiple concurrent
exchange.
Ans: D
80. HTTP expands?
A. Hyper Text Transfer Protocol
B. Hyper Terminal Transfer Protocol
C. Hyper Text Terminal Protocol
D. Hyper Terminal Text Protocol
Ans: A

81. CoAP is specialized in ___________


A. Internet applications
B. Device applications
C. Wireless applications
D. Wired applications
Ans: A

82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A

83. Data in network layer is transferred in the form of ____________


A. Layers
B. Packets
C. Bytes
D. Bits
Ans:B

84. Services provided by application layer?


A. Web chat
B. Error control
C. Connection services
D. Congestion control
Ans: A

85. TCP and UDP are called?


A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
Ans: C

86. Security based connection is provided by which layer?


A. Application layer
B. Transport layer
C. Session layer
D. Network layer
Ans: D
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A

88. Transport layer receives data in the form of?


A. Packets
B. Byte streams
C. Bits stream
D. both packet and Byte stream
Ans: B

89. The network layer is considered as the _______?


A. Backbone
B. packets
C. Bytes
D. bits
Ans: A

90. The network layer consists of which hardware devices?


A. Router
B. Bridges
C. Switches
D. All of the above
Ans: D

91. Network layer protocol exits in_____?


A. Host
B. Switches
C. Packets
D. Bridges
Ans: A

92. Which protocol has a quality of service?


A. XMPP
B. HTTP
C. CoAP
D. MQTT
Ans: A

93. _____ is a data-centric middleware standard for device-to-device and machine-to-machine


communication.
A. Data Distribution Serviced (DDS)
B. Advance Message Queuing Protocol (AMQP)
C. Extensible Messaging and Presence Protocol (XMPP)
D. Message Queue Telemetry Transport (MQTT)
Ans:A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

96. Which is not an IoT communication model.


A. Request-Response
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair
Ans: C

97. In Node MCU, MCU stands for_____.


A. Micro Control Unit
B. Micro Controller Unit
C. Macro Control Unit
D. Macro Controller Unit
Ans: B

98. REST is acronym for________


A. Representational State Transfer
B. Represent State Transfer
C. Representational State Transmit
D. Representational Store Transfer
Ans: A

99. WSN stands for


A. Wide Sensor Network
B. Wireless Sensor Network
C. Wired Sensor Network
D. None of these
Ans: B

100. Benefit of cloud computing services


A. Fast
B. Anywhere access
C. Higher utilization
D. All of the above
Ans: D
101. PaaS stands for_____
A. Platform as a Service
B. Platform as a Survey
C. People as a Service
D. Platform as a Survey
Ans: A

102. _________ as a Service is a cloud computing infrastructure that creates a development


environment upon which applications may be build.
A. Infrastructure
B. Service
C. Platform
D. All of the mentioned
Ans:C

103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A

104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C

105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B

106._________ is the most refined and restrictive service model.


A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
Ans.C

107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A

109. Zigbee specification are based on ______.


A. 802.3
B. 802.11
C. 802.16
D. 802.15.4
Ans:D

110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B

111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C

112. Does Raspberry Pi need external hardware?


A. True
B. False
Ans.B

113. Does RPi have an internal memory?


A. True
B. False
Ans.A

114. What do we use to connect TV to RPi?


A. Male HDMI
B. Female HDMI
C. Male HDMI and Adapter
D. Female HDMI and Adapter
Ans.C

115. How power supply is done to RPi?


A. USB connection
B. Internal battery
C. Charger
D. Adapter
Ans.A

116. What is the Ethernet/LAN cable used in RPi?


A.Cat5
B.at5e
C. cat6
D . RJ45
Ans.D

117. Which instruction set architecture is used in Raspberry Pi?


A. X86
B. MSP
C. AVR
D. ARM
Ans: D

118. Does micro SD card present in all modules?


A. True
B. False
Ans: A

119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A

120. ________ empowers IoT by bringing together everyday objects.


A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: B

121. The collection of data is achieved with ________ changes.


A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: C
122. The number of devices that need to be managed and that communicate with each other will
be much larger.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: D
123. ________ in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B

124. Devices that transforms electrical signals into physical movements


A. Sensors
B. Actuators
C. Switches
D. Display
Ans: B

125. Stepper motors are_____


A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B

126. DC motors converts electrical into ___ energy.


A. Mechanical
B. Wind
C. Electric
D. None
Ans: A

127. Linear actuators are used in________


A. Machine tools
B. Industrial machinery
C.both A and B
D.None
Ans: A

128. Solenoid is a specially designed ________


A. Actuator
B. Machine
C. Electromagnet
D. none of above
Ans: C

129. Stepper motors are_____


A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B
130. Accelerometer sensors are used in______
A. Smartphones
B. Aircrafts
C. Both
D. None of above
Ans: C

131. Image sensors are found in_______


A. Cameras
B. Night-vision equipment
C. Sonars
D. All of above
Ans: D

132. Gas sensors are used to detect _____gases.


A. Toxic
B. Natural
C. Oxygen
D. Hydrogen
Ans: A

133. Properties of Arduino are:


A. Inexpensive
B. Independent
C. Simple
D. both A and C
Ans: D

134. Properties of IoT devices.


A. Sense
B. Send and receive data
C. Both A and B
D. None of above
Ans: C

135. IoT devices are ____


A. Standard
B. Non-standard
C. Both
D. None
Ans: B

136. What is the microcontroller used in Arduino UNO?


A. ATmega328p
B. ATmega2560
C. ATmega32114
D. AT91SAM3x8E
Ans: A
137. ___ is an open source electronic platform based on easy to used hardware and software.
A. Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A

138 ____ is used latching, locking, triggering.


A. Solenoid
B. Relay
C. Linear Actuator
D. Servo motors
Ans:A

139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D

140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B

141. The measurement of humidity is


A. RH
B. PH
C. IC
D. None of aboved
Ans:A

142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D

143 ____ sensor measure heat emitted by objects.


A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:C
Chapter-3 Basics of Digital Forensics

1. Digital forensics is all of them except:


A. Extraction of computer data.
B. Preservation of computer data.
C. Interpretation of computer data.
D. Manipulation of computer data.
Ans:D

2. IDIP stands for


A. Integrated Digital Investigation Process.
B. Integrated Data Investigator Process.
C. Integrated Digital Investigator Process.
D. Independent Digital Investigator Process.
Ans: A

3. Who proposed Road Map for Digital Forensic Research (RMDFR)


A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D

4. Investigator should satisfy following points:


A. Contribute to society and human being.
B. Avoid harm to others.
C. Honest and trustworthy.
D. All of the above
Ans: D

5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A

6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B

9. When the field of PC forensics began?


A.1960's
B.1970's
C.1980's
D.1990's
Ans: C

10. What is Digital Forensic?


A. Process of using scientific knowledge in analysis and presentation of evidence in court
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or
evidence in a court of law
Ans: B

11. Digital Forensics entails _____.


A. Accessing the system's directories viewing mode and navigating through the various systems
files and folders
B. Undeleting and recovering lost files
C. Identifying and solving computer crimes
D. The identification, preservation, recovery, restoration and presentation of digital evidence
from systems and devices
Ans: D

12. Which of the following is FALSE?


A. The digital forensic investigator must maintain absolute objectivity
B. It is the investigator’s job to determine someone’s guilt or innocence.
C. It is the investigator’s responsibility to accurately report the relevant facts of a case.
D. The investigator must maintain strict confidentiality, discussing the results of an investigation
on only a “need to know”
Ans: B

13. What is the most significant legal issue in computer forensics?


A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D

15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B

16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B

17. Computer forensics do not involve_____activity.


A. Preservation of computer data.
B. Exraction of computer data.
C. Manipulation of computer data.
D. Interpretation of computer data.
Ans: C

18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D

19. Which of following is not a rule of digital forensics?


A. An examination should be performed on the original data
B. A copy is made onto forensically sterile media. New media should always be used if
available.
C. The copy of the evidence must be an exact, bit-by-bit copy
D. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation
phase, is the goal of which phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B

21. To provide mechanism to an incident to be detected and confirmed is purpose of which


phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: D

22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C

23. ____________is known as father of computer forensic.


A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C

24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A

25. Who proposed End to End Digital Investigation Process (EEDIP)?


A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B

26. Which model of Investigation proposed by Carrier and Safford?


A. Extended Model of Cybercrime Investigation (EMCI)
B. Integrated Digital Investigation Process(IDIP)
C. Road Map for Digital Forensic Research (RMDFR)
D. Abstract Digital Forensic Model (ADFM)
Ans: B
27. Which of the following is not a property of computer evidence?
A. Authentic and Accurate.
B. Complete and Convincing.
C. Duplicated and Preserved.
D. Conform and Human Readable.
Ans. D

28. _______can makes or breaks investigation.


A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D

29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A

30. Which of following are general Ethical norms for Investigator?


A. To contribute to society and human being.
B. To avoid harm to others.
C. To be honest and trustworthy.
D. All of above
E. None of above
Ans: D

31. Which of following are Unethical norms for Investigator?


A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. All of above
E. None of above
Ans: D

32. Which of following is not general ethical norm for Investigator?


A. To contribute to society and human being.
B. Uphold any relevant Evidence.
C. To be honest and trustworthy.
D. To honor confidentially.
Ans: B

33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A

35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C

36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C

37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D

38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B

39. Which of this is not a computer crime?


A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D

40. Which file is used to store the user entered password?


A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and analysis
on user input.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: A

42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B

43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
EMERGING TRENDS IN COMPUTER AND
INFORMATION TECHNOLOGY (22618)

MULTIPLE CHOICE QUESTIONS AND ANSWERS

Chapter 4- Digital Evidence (CO4)

1. A valid definition of digital evidence is:


A. Data stored or transmitted using a computer
B. Information of probative value
C. Digital data of probative value
D. Any digital evidence on a computer
Ans: C

2. What are the three general categories of computer systems that can contain digital
evidence?
A. Desktop, laptop, server
B. Personal computer, Internet, mobile telephone
C. Hardware, software, networks
D. Open computer systems, communication systems, and embedded systems
Ans: D

3. In terms of digital evidence, a hard drive is an example of:


A. Open computer systems
B. Communication systems
C. Embedded computer systems
D. None of the above
Ans: A

4. In terms of digital evidence, a mobile telephone is an example of:


A. Open computer systems
B. Communication systems
C. Embedded computer systems
D. None of the above
Ans: C
5. In terms of digital evidence, a Smart Card is an example of:
A. Open computer systems
B. Communication systems
C. Embedded computer systems
D. None of the above
Ans: C

6. In terms of digital evidence, the Internet is an example of:


A. Open computer systems
B. Communication systems
C. Embedded computer systems
D. None of the above
Ans: B

7. Computers can be involved in which of the following types of crime?


A. Homicide and sexual assault
B. Computer intrusions and intellectual property theft
C. Civil disputes
D. All the above
Ans: D

8. A logon record tells us that, at a specific time:


A. An unknown person logged into the system using the account
B. The owner of a specific account logged into the system
C. The account was used to log into the system
D. None of the above
Ans: C

9. Cyber trails are advantageous because:


A. They are not connected to the physical world.
B. Nobody can be harmed by crime on the Internet.
C. They are easy to follow.
D. Offenders who are unaware of them leave behind more clues than they otherwise
would have.
Ans: D

10. Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above.
Ans: C
11. Due to caseload and budget constraints, often computer security professionals attempt to
limit the damage and close each investigation as quickly as possible. Which of the following is
NOT a significant drawback to this approach?
A. Each unreported incident robs attorneys and law enforcement personnel of an opportunity
to learn about the basics of computer-related crime.
B. Responsibility for incident resolution frequently does not reside with the security
professional, but with management.
C. This approach results in under-reporting of criminal activity, deflating statistics that are
used to allocate corporate and government spending on combating computer-related
crime.
D. Computer security professionals develop loose evidence processing habits that can make
it more difficult for law enforcement personnel and attorneys to prosecute an offender.
None of the above
Ans: B

12. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
Ans: A

13. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This
is an example of:
A. An individual characteristic
B. An incidental characteristic
C. A class characteristic
D. An indeterminate characteristic
Ans: A

14. Personal computers and networks are often a valuable source of evidence. Those
involved with should be comfortable with this technology.
A. Criminal investigation
B. Prosecution
C. Defense work
D. All of the above
Ans:

15. An argument for including computer forensic training computer security specialists is:
A. It provides an additional credential.
B. It provides them with the tools to conduct their own investigations.
C. It teaches them when it is time to call in law enforcement.
D. None of the above.
Ans: C
16. The digital evidence are used to establish a credible link between
A. Attacker and victim and the crime scene
B. Attacker and the crime scene
C. Victim and the crime scene
D. Attacker and Information
Ans: A

17. Digital evidences must follow the requirements of the


A. Ideal Evidence rule
B. Best Evidence rule
C. Exchange rule
D. All the mentioned
Ans: B

18. From the two given statements 1 and 2, select the correct option from a-d.
a. Original media can be used to carry out digital investigation process.
b. By default, every part of the victim’s computer is considered as unreliable.

A. a and b both are true


B. a is true and b is false
C. a and b both are false
D. a is false and b is true
Ans: B

19. The evidences or proof can be obtained from the electronic source is called the
A. digital evidence
B. demonstrative evidence
C. Explainable evidence
D. substantial evidence
Ans: A

20. Which of the following is not a type of volatile evidence?


A. Routing tables
B. Main memory
C. Log files
D. Cached data
Ans: C

21. The evidence must be usable in the court which is called as


A. Admissible
B. Authentic
C. Complete
D. Reliable
Ans: A
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a
a type of _
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: A

23. Email, hard drives are examples of


A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Ans: B

24. Blood, fingerprints, DNA these are examples of


A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Substantial evidence
Ans: D

25. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a
hint from the scene which is called as
A. Locard’s Exchange principle
B. Anderson’s Exchange principle
C. Charles’s Anthony principle
D. Kevin Ashton principle
Ans: A

26. Which is not procedure to establish a chain of custody?


A. Save the original materials.
B. Take photos of physical evidence.
C. Don’t take screenshots of digital evidence content.
D. Document date, time, and any other information of receipt.
Ans: C

27. Which is not related with digital evidence?


A. Work with the original evidence to develop procedures.
B. Use clean collecting media.
C. Document any extra scope.
D. Consider safety of personnel at the scene.
Ans: A
28. Which is example of non-volatile memory.
A. Flash memory
B. Registers and Cache
C. Process table
D. Arp cache
Ans: A

29. is known as testimonial.


A. Oath affidavit
B. DNA samples
C. Fingerprint
D. Dried blood
Ans: A

30. The process of ensuring that providing or obtaining the data that you have collected is similar
to the data provided or presented in a court is known as
A. Evidence validation
B. Relative evidence
C. Best evidence
D. Illustrative evidence
Ans: A
31. When cases got to trial your forensics examiner play one of role.
A. 2
B. 4
C. 3
D. 5
Ans. A

32. Types of digital evidence

A. Eye witness
B. Picture and video
C. Paper work
D. None of the above
Ans B

33. Rule of evidence is also known as

A. Law of witness
B. Law of litigation
C. Law of evidence
D. All of the above

Ans. C
True or False Questions
1. Digital evidence is only useful in a court of law.
A. True
B. False
Ans: B

2. Attorneys and police are encountering progressively more digital evidence in their
work.
A. True
B. False
Ans: A

3. Video surveillance can be a form of digital evidence.


A. True
B. False
Ans: A

4. All forensic examinations should be performed on the original digital evidence.


A. True
B. False
Ans: B

5. Digital evidence can be duplicated exactly without any changes to the original data.
A. True
B. False
Ans: B

6. Computers were involved in the investigations into both World Trade Center attacks.
A. True
B. False
Ans: A

7. Digital evidence is always circumstantial.


A. True
B. False
Ans: B

8. Digital evidence alone can be used to build a solid case.


A. True
B. False
Ans: B

9. Computers can be used by terrorists to detonate bombs.


A. True
B. False
Ans: A

10. The aim of a forensic examination is to prove with certainty what occurred.
A. True
B. False
Ans: B

11. Even digital investigations that do not result in legal action can benefit from principles of
forensic science.
A. True
B. False
Ans: A

12. Forensic science is the application of science to investigation and prosecution of crime or to
the just resolution of conflict.
A. True
B. False
Ans: A
Chapter 5
Basics of Hacking (CO5)

1. Ethical Hacking is also known as


A. Black Hat Hacking.
B. White Hat Hacking.
C. Encryption.
D. None of these.
Ans. B

2. Tool(s) used by ethical hacker .


A. Scanner
B. Decoder
C. Proxy
D. All of these.
Ans. D

3. Vulnerability scanning in Ethical hacking finds .


A. Strengths.
B. Weakness.
C. A &B
D. None of these.
Ans. B

4. Ethical hacking will allow to all the massive security breaches.


A. Remove.
B. Measure.
C. Reject.
D. None of these.
Ans. B

5. Sequential step hackers use are: _ _ _ _.


A. Maintaining Access.
B. Reconnaissance
C. Scanning.
D. Gaining Access.

A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Ans. A
6. is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above.
Ans. A

7. Which hacker refers to ethical hacker?


A. Black hat hacker.
B. White hat hacker.
C. Grey hat hacker.
D. None of the above.
Ans. B

8. The term cracker refers to


A. Black hat hacker.
B. White hat hacker.
C. Grey hat hacker.
D. None of the above.
Ans. A

9. Who described a dissertation on fundamentals of hacker’s attitude?


A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman.
Ans. B

10. Computer Hackers have been in existence for more than a .


A. Decade.
B. Year.
C. Century
D. Era.
Ans. C

11. Hackers do hack for?


A. Fame.
B. Profit.
C. Revenge.
D. All the above
Ans. D
12. The intent of ethical hacker is to discover vulnerabilities from a point of view to better
secure system.
A. Victims.
B. Attackers.
C. Both A & B
D. None of these.
Ans. B

13. Security audits are usually based on


A. Entries.
B. Checklists.
C. Both A & B
D. None of the above
Ans. B

14. Ethical hacking consist of


A. Penetration testing.
B. Intrusion testing.
C. Red teaming.
D. All of the above.
Ans. D

15. is a person who find and exploits the weakness in computer system.
A. Victim
B. Hacker
C. Developer
D. None of the above.
Ans. B

16. A white hat hacker is the one who


A. Fix identifies weakness
B. Steal the data
C. Identifies the weakness and leave message to owner
D. None of the above
Ans. A

17.A black hat hacker is the one who


A. Fix identifies weakness
B. Steal the data
C. Identifies the weakness and leave message to owner
D. None of the above.
Ans. B
18. A grey hat hacker is the one who
A. Fix identifies weakness
B. Steal the data
C. Identifies the weakness and leave message to owner
D. None of the above
Ans. C

19. Keeping information secured can protect an organization image and save and organization lot
of money
A. True
B. False
Ans. A

20. Information is a one of the most valuable assets of organization


A. True
B. False
Ans. A

21. To catch a thief, think like


A. Police
B. Forensics
C. Thief
D. Hacker
Ans. C

22. can create false feeling of safety


A. Firewall
B. Encryption
C. VNPs
D. All the above
Ans. D

23. exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. A
24. Connecting into network through a rogue modem attached to computer behind a firewall is an
example of -
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. B

25. comprise of large portion of hacker attacks simply because every computer has one
and so well know exploits can be used against them
A. Nontechnical attacks
B. Network infrastructure attack
C. Operating system attack
D. Application and other specialized attack
Ans. C

26. should be done before ethical hacking process.


A. Data gathering.
B. Attacking
C. Planning
D. Research
Ans. C

27. Which permission is necessary before ethical hacking?


A. Written permission.
B. Decision maker permission
C. Privacy permission
D. Risk permission.
Ans. A

28. Which tool is used to crack the password?


A. Nmap
B. LC4
C. ToneLOC
D. Nessus
Ans. B

29. Which tool is used for depth analysis of a web application?


A. Whisker
B. Super scan
C. Nikto
D. Kismet
Ans. A
30. Which tool is used to encrypt Email?
A. WebInspect
B. QualyGuard
C. PGP (pretty good privacy)
D. None of the above.
Ans. C

31. Malicious attacker often think like?


A. Thieves
B. Kidnapper
C. Both A & B
D. None of the above
Ans. C

32. Which hacker try to distribute political or social message through their work?
A. Black hat hacker
B. Hactivist
C. Script kiddes
D. White hat hacker
Ans. B

33. are part of organized crime on internet.


A. Criminal
B. Antinationalist
C. Hacker for hire
D. None of the above
Ans. C

34. Which magazines releases the latest hacking methods?


A. 2600
B. Hackin9
C. PHRACK
D. All the above
Ans. D

35. Performing a shoulder surfing in order to check other’s password is ethical


practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad
Ans. D
36. has now evolved to be one of the most popular automated tools for unethical
hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
Ans. C

37. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
Ans. A

38. A penetration tester must identify and keep in mind the &
requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Ans. A

39. The legal risks of ethical hacking include lawsuits due to of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Ans. B

40. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Ans. D
Chapter-6
Types of Hacking (CO6)

1. SNMP stands for


A. Simple Network Messaging Protocol
B. Simple Network Mailing Protocol
C. Simple Network Management Protocol
D. Simple Network Master Protocol
Ans: C

2. Which of the following tool is used for Network Testing and port Scanning
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D

3. Banner grabbing is used for


A. White Hat Hacking
B. Black Hat Hacking
C. Grey Hat Hacking
D. Script Kiddies
Ans: A

4. An attacker can create an attack by sending hundreds or thousands of e-mails a with


very large attachments.
A. Connection Attack
B. Auto responder Attack
C. Attachment Overloading Attack
D. All the above
Ans: B

5. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
6. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Ans: C

7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A

8. What is the most important activity in system cracking?


A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks
Ans: B

9. Which Nmap scan is does not completely open a TCP connection?


A. SYN stealth scan
B. TCP scan
C. XMAS tree scan
D. ACK scan
Ans: A

10. Key loggers are form of


A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
Ans: A

11. Nmap is abbreviated as Network Mapper.


A. True
B. False
Ans: A

12. is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
13. Which of this Nmap do not check?
A. Services different hosts are offering
B. On what OS they are running.
C. What kind of firewall in use?
D. What type of antivirus in use?
Ans: D

14. What is purpose of Denial of Service attacks?


A. Exploit weakness in TCP/IP attack.
B. To execute a trojan horse on a system.
C. To overload a system so it is no longer operational.
D. To shutdown services by turning them off.
Ans: C

15. What are the some of the most common vulnerabilities that exist in a network system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
Ans: B

16. Which of the following is not a characteristic of ethical hacker?


A. Excellent knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Ans: D

17. Attempting to gain access to a network using an employee’s credentials is called the
mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A

18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
19. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans: A

20. What are the port states determined by Nmap?


A. Active, inactive, standby
B. Open, half-open, closed
C. Open, filtered, unfiltered
D. Active, closed, unused
Ans: C

21. What port does Telnet use?


A. 22
B. 80
C. 20
D. 23
Ans: D

22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D

23. Performing hacking activities with the intent on gaining visibility for an unfair situation is
called .
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C

24. Why would a hacker use a proxy server?


A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection
D. To hide malicious activity on the network
Ans: A
25. Which phase of hacking performs actual attack on a network or system?
A. Reconnaissance
B. Maintaining Access
C. Scanning
D. Gaining Access
Ans: D

26. Sniffing is used to perform fingerprinting.


A. Passive stack
B. Active stack
C. Passive banner grabbing
D. Scanned
Ans: A

27. Services running on a system are determined by .


A. The system’s IP address
B. The Active Directory
C. The system’s network name
D. The port assigned
Ans: D

28. What are the types of scanning?


A. Port, network, and services
B. Network, vulnerability, and port
C. Passive, active, and interactive
D. Server, client, and network
Ans: B

29. Enumeration is part of what phase of ethical hacking?


A. Reconnaissance
B. Maintaining Access
C. Gaining Access
D. Scanning
Ans: C

30. framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
31. is a popular IP address and port scanner.
A. Cain and Abel
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C

32. is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D

33 scans TCP ports and resolves different hostnames.


A. SuperScan
B. Snort
C. Ettercap
D. QualysGuard .
Ans: A

34. What tool can be used to perform SNMP enumeration?


A. DNSlookup
B. Whois
C. Nslookup
D. IP Network Browser
Ans: D

35. Wireshark is a tool.


A. network protocol analysis
B. network connection security
C. connection analysis
D. defending malicious packet-filtering
Ans: A

36. Aircrack-ng is used for


A. Firewall bypassing
B. Wi-Fi attacks
C. Packet filtering
D. System password cracking
Ans: B
37. Phishing is a form of .
A. Spamming
B. Identify Theft
C. Impersonation
D. Scanning
Ans: C

38. What are the types of scanning?


A. Port, network, and services
B. Network, vulnerability, and port
C. Passive, active, and interactive
D. Server, client, and network
Ans: B

39 is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A

40. ARP spoofing is often referred to as


A. Man-in-the-Middle attack
B. Denial-of-Service attack
C. Sniffing
D. Spoofing
Ans: A

41. is a tool that allows you to look into network and analyze data going across the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
Ans: A

42. is not a function of network analyzer tool.


A. Captures all network traffic
B. Interprets or decodes what is found into a human-readable format.
C. Displays it all in chronological order.
D. Banner grabbing
Ans: D
43. protocol is used for network monitoring.
A. FTP SNMP
B.
C. RELNET
D. ARP
Ans: A

44. What is the attack called “evil twin”?


A. rouge access point
B. ARP poisoning
C. session hijacking
D. MAC spoofing
Ans: A

45. What is the primary goal of an ethical hacker?


A. avoiding detection
B. testing security controls
C. resolving security vulnerabilities
D. determining return on investment for security measures
Ans: C

46. What are the forms of password cracking technique?


A. Attack syllable
B. Attack brute forcing
C. Attacks hybrid
D. All the above
Ans: D

45. Which type of hacker represents the highest risk to your network?
A. black-hat hackers
B. grey-hat hackers
C. script kiddies
D. disgruntled employees
Ans: D

46. Hacking for a cause is called


A. hacktivism
B. black-hat hacking
C. active hacking
D. activism
Ans: A
47. When a hacker attempts to attack a host via the internet it is known as what type of attack?
A. local access
B. remote attack
C. internal attack
D. physical access
Ans: B

49. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
Ans. C

50. In computer networking, is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A. Hacking
B. Evidence
C. Tracing
D. None of above
Ans:-A

51. generally refers to unauthorized intrusion into a computer or a network.


A. Hacking
B. Evidence
C. Tracing
D. None of above

Ans:-A

52. We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest and .
A. Hckers and Prackers
B. Vendor software and firmware patches
C. Software amd Hardware
D. None of above
Ans:-B

53. Network consist devices such as routers, firewalls, hosts that you must assess as a part of
process.

A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
Ans:-D

54. Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D

55. attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
Ans:-B

56. DOS stands for


A. Detection of system
B. Denial of Service
C. Detection of service
D. None of above
Ans:-B

57. IDS stands for


A. Intrusion detection system
B. Information documentation service
C. Intrusion documentation system
D. None of above
Ans:-A

58. Which protocols are in use is vulnerable


A. TCL
B. SSL
C. FTP
D. SMTP
Ans:-B

59. SSL stands for


A. Secure Sockets Layer
B. Software Security Layer
C. Socket security layer
D. System software layer
Ans:-A
60. include phishing, SQL injection, hacking, social engineering, spamming, denial of
service attacks, Trojans, virus and worm attacks.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
Ans:-D

61. Who invent worm attack


A. Brightn Godfrey
B. Alan yeung
C. Robert Morris
D. None of above
Ans:-C

62. Which of the following is not a typical characteristic of an ethical hacker?


A. Excellent knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Ans:-D
63. What is the purpose of a Denial of Service attack?
A. Exploit a weakness in the TCP/IP stack
B. To execute a Trojan on a system
C. To overload a system so it is no longer operational
D. To shutdown services by turning them off
Ans:- C

64. What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Ans:B

65. What is the sequence of a TCP connection?


A. SYN-ACK-FIN
B. SYN-SYN ACK-ACK
C. SYN-ACK
D. SYN-SYN-ACK
Ans:B

66. Why would a ping sweep be used?


A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Ans:-A

67. A packet with no flags set is which type of scan?


A. TCP
B. XMAS
C. IDLE
D. NULL
Ans:-D
MCQ’s Question and Answers (the answers are highlighted in bold)

Q1.When the Federal Bureau of investigation was create ?.

A)1900 B)1980 C)19450 D)1984

Q2.What is The Full form of CART

A)Computer Analysis and Response Team B) Cathode Analog Ray Tube

C)Computer Accessories Repairing team D)None

Q3 When IOCE is Formed

A)1992 B)1980 C)19490 D)1995

Q4Full Form Of IOCE

A)International Organization on Computer Evidence B)Internet of Computer Education

C) Internet of Computer Evidence D)None

Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.

A)1992 B)1980 C)19490 D)2000

Q6How Many Rules in Digital forensic

A)12 B)19 C)10 D)6

Q7 What is the Long form of DFI

A)Digital Forensic Investigation B)Digital Fraud Industry

C)Defining Form In D)None

Q8 How Many Phases in RDMDFR

A)12 B)19 C)10 D)6

Q9 Investigator should satisfy the following point:

A)Contribute to the society and human being B)Avoid harm to others

C)honest and trustworthy D)All Of the Above

Q10 Who proposed Road Map Model

A)G. Gunsh B)S. Ciardhuain C)J. Korn D)G. Palmar

Q11 Digital Evidence in the form of the:

A)Office File B)E-mail Messages C)Either A or B D)Both A and B


Q12 In Computer intrusions the attacker will be leave multiple traces of there presence in:

A)File System B)Registry C)System Logs D)All of the Above

Q13 What are the Form of Electronic Evidence:

A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Q14 How Many Types of the Evidence

A)12 B)19 C)10 D)6

Q15 What is the full form of BPO

A)Business Process Outsourcing

Q16 The Digital evidence are used to established a credible link between……….

A)Attacker and victim and the crime scene B)Attacker And information

C)Either A or B D)Both A and B

Q17 The evidence and proof that can be obtained from the electronic source is called the…….

A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Q18 Which of the following is not type of volatile evidence:

A)Routing Tables B) Main Memory C)Log Files D) Cached Data

Q19 Digital Evidence must follow the requirement of the

A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned

Q20 White hat Hacker is known as the

A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Q21 What is an grey hat hacker

A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None

Q22 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:

A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Q23 Long Form of the VPN

A)Virtual Private Network B)Virtual Personal Network C)Both D)None

Q24 Who are use their skill to identify security problem with computer network

A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Q25 To crack the password you need cracking tool such as:

A)LC4 B)John The Ripper C)pwdump D)All of the above

Q26 NMAP known as:

A)Network Mapper B)NetCat C)SuperScan D)NetScan

Q27 What is the most valuable assets of an organization

A)Information

Q28 What is the full form of SMTP

A)Simple mail Transfer Protocol

Q29 What is the full form of DNS

A)Domain Name System B)Simple mail Transfer Protocol

C)Internet Message Access Protocol D) Network Mapper

Q30 What is the full form of IMAP

A)Internet Message Access Protocol B)Simple mail Transfer Protocol

C)Internet Message Access Protocol D)None

Q31 What is the full form of SNMP

A)Simple Network Management Protocol

Q32 Which of the following used for the Network Testing and port scanning

A)NetCat B)SuperScan C)NetScan D)All of Above

Q33 The whole email server may be targeted for a complete interruption of services with these failure
like

A)Storage overload and bandwidth blocking

Q34 Which is the top most directory in the server file system

A)Root Directory

Q35 Which list is used in the authorization process

A)Access Control List


Q36 What is the latest version of UNIX

A)LINUX

Q37 Which OS is widely used in the world

A)Windows B)LINUX C)IOS D)NONE

Q38 Name of network analyzer which support windows and unix OS

A)Ethereal

Q39 You can grab banner by using

A)Telnet B)NetCat C)Either A or B D)Both A and B

Q40 An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment

A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack

D)All of the Above

1. An Artificial Intelligence system developed by Terry A. Winograd to permit an interactive dialogue


about a domain he called blocks-world.

a. SIMD

b. STUDENT

c. SHRDLU

d. BACON

2. What is Artificial intelligence?

a. Programming with your own intelligence

b. Putting your intelligence into Computer

c.Making a Machine intelligent

d.Playing a Game
3. Who is the “father” of artificial intelligence?

a.John McCarthy

b. Fisher Ada

c. Allen Newell

d.Alan Turning

4.Which of the following is a proposed means of testing the intelligence of the machine?

Turing TestTurning TestTuning Test

a.Turing Test

b.Turning Test

c.Tuning Test

d.None

5.Which of the following is not a component of a production system?

a.Control System

b.Associative Memory

c.Primary Memory

d.Secondary Memory

6. Zero sum game has player…

a. seven

b. Two

c.three player

d. Multiplayer

7.Which one is used for compute the logical inference algorithm?

a. Validity

b.Satisfiability

c. Logical equivalence

d.All of these
8.Single inference rule also called…

a. Resolution

b. Reference

c.Reference

d.None of these

9.Factoring means…

a.Removal of redundant literal

b.Removal of redundant variable

c.Addition of redundant variable

d.Addition of redundant literal

1. A valid definition of digital evidence is:


a. Data stored or transmitted using a computer
b. Information of probative value
c. Digital data of probative value
d. Any digital evidence on a computer

2. What are the three general categories of computer systems that can contain digital
evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems

3. In terms of digital evidence, a hard drive is an example of:


a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above

4. In terms of digital evidence, a mobile telephone is an example of:


a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above

5. In terms of digital evidence, a Smart Card is an example of:


a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above
6. In terms of digital evidence, the Internet is an example of:
a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above

7. Computers can be involved in which of the following types of crime?


a. Homicide and sexual assault
b. Computer intrusions and intellectual property theft
c. Civil disputes
d. All of the above

8. A logon record tells us that, at a specific time:


a. An unknown person logged into the system using the account
b. The owner of a specific account logged into the system
c. The account was used to log into the system
d. None of the above

9. Cybertrails are advantageous because:


a. They are not connected to the physical world.
b. Nobody can be harmed by crime on the Internet.
c. They are easy to follow.
d. Offenders who are unaware of them leave behind more clues than they otherwise
would have.

10. Private networks can be a richer source of evidence than the Internet because:
a. They retain data for longer periods of time.
b. Owners of private networks are more cooperative with law enforcement.
c. Private networks contain a higher concentration of digital evidence.
d. All of the above.
Question 1. Which of the following statements best describes a white-hat hacker?

 A. Security professional
 B. Former black hat
 C. Former grey hat
 D. Malicious hacker
Answer 1. Option A.

Question 2. A security audit performed on the internal network of an organization


by the network administration is also known as ___________.

 A. Grey-box testing
 B. Black-box testing
 C. White-box testing
 D. Active testing
 E. Passive testing
Answer 2. Option C..

Question 3. What is the first phase of hacking?

 A. Attack
 B. Maintaining access
 C. Gaining access
 D. Reconnaissance
 E. Scanning
Answer 3. Option D.

Question 4. What type of ethical hack tests access to the physical infrastructure?

 A. Internal network
 B. Remote network
 C. External network
 D. Physical access
Answer 4. Option D

Question 5. The security, functionality, and ease of use triangle illustrates which
concept?

 A. As security increases, functionality and ease of use increase.


 B. As security decreases, functionality and ease of use increase.
 C. As security decreases, functionality and ease of use decrease.
 D. Security does not affect functionality and ease of use.
Answer 5. Option B.
Question 6. Which type of hacker represents the highest risk to your network?

 A. Disgruntled employees
 B. Black-hat hackers
 C. Grey-hat hackers
 D. Script kiddies
Answer 6. Option A.

Question 7. What are the three phases of a security evaluation plan? (Choose
three answers.)

 A. Conduct Security Evaluation


 B. Preparation
 C. Conclusion
 D. Final
 E. Reconnaissance
 F. Design Security
 G. Vulnerability Assessment
Answer 7. Options A, B, C.

Question 8. Hacking for a cause is called __________________.

 A. Active hacking
 B. Hacktivism
 C. Activism
 D. Black-hat hacking
Answer 8. Option B.

Question 9. Which federal law is most commonly used to prosecute hackers?

 A. Title 12
 B. Title 18
 C. Title 20
 D. Title 2
Answer 9. Option B.

Question 10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?

 A. Remote attack
 B. Physical access
 C. Local access
 D. Internal attack
Answer 10. Option A.
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
Answer: b

2. Which is the legal form of hacking based on which jobs are provided in IT industries and
firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism

Answer: c

3. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber
crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
Answer: d

4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
Answer: a
5. The amateur or newbie in the field of hacking who don’t have many skills about coding and
in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer: c

6. Suicide Hackers are those _________


a) who break a system for some specific purpose with or without keeping in mind that they may
suffer long term imprisonment due to their malicious activity
b) individuals with no knowledge of codes but an expert in using hacking tools
c) who know the consequences of their hacking activities and hence try to prevent them by
erasing their digital footprints
d) who are employed in an organization to do malicious activities on other firms
Answer: a

7. Criminal minded individuals who work for terrorist organizations and steal information of
nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
Answer: c

8. One who disclose information to public of a company, organization, firm, government and
private agency and he/she is the member or employee of that organization; such individuals are
termed as ___________
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
Answer: d
9. These types of hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
Answer: b

10. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
Answer: a

11. Role of security auditor is to ____________


a) secure the network
b) probe for safety and security of organization’s security components and systems
c) detects and prevents cyber attacks and threats to organization
d) does penetration testing on different web applications
Answer: b
Chapter 4 – Digital Evidences
1. Having a member of the search team trained to handle digital evidence:

a. Can reduce the number of people who handle the evidence


b. Can serve to streamline the presentation of the case
c. Can reduce the opportunity for opposing counsel to impugn the integrity of the
Evidence
d. All of the above

2. An attorney asking a digital investigator to find evidence supporting a particular line of


Inquiry is an example of:

a. Influencing the examiner


b. Due diligence
c. Quid pro quo
d. Voir dire

3. A digital investigator pursuing a line of investigation in a case because that line of


Investigation proved successful in two previous cases is an example of:

a. Logical reasoning
b. Common sense
c. Preconceived theory
d. Investigator’s intuition

4. A scientific truth attempts to identify roles that are universally true. Legal judgment, on
The other hand, has a standard of proof in criminal prosecutions of:

a. Balance of probabilities
b. Beyond a reasonable doubt
c. Acquittal
d. None of the above

5. Regarding the admissibility of evidence, which of the following is not a consideration:

a. Relevance
b. Authenticity
c. Best evidence
d. Nominally prejudicial

6. According to the text, the most common mistake that prevents evidence seized from
Being admitted is:

a. Uninformed consen
b. Forcible entry
c. Obtained without authorization
d. None of the above
7. In obtaining a warrant, an investigator must convince the judge on all of the following
Points except:

a. Evidence of a crime is in existence


b. A crime has been committed
c. The owner or resident of the place to be searched is likely to have committed
The crime
d. The evidence is likely to exist at the place to be searched

8. If, while searching a computer for evidence of a specific crime, evidence of a new,
Unrelated crime is discovered, the best course of action is:

a. Abandon the original search, and pursue the new line of investigation
b. Continue with the original search but also pursue the new inquiry
c. Stop the search and obtain a warrant that addresses the new inquiry
d. Continue with the original search, ignoring the new information

9. The process of documenting the seizure of digital evidence and, in particular, when that
Evidence changes hands, is known as:

a. Chain of custody
b. Field notes
c. Interim report
d. None of the above

10. Evidence contained in a document provided to prove that statements made in court are
True is referred to as:

a. Inadmissible evidence
b. Illegally obtained evidence
c. Hearsay evidence
d. Direct evidence
Chapter 5 Basics of Ethical hacking
1. What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
Answer: a

2. Performing a shoulder surfing in order to check other’s password is ____________


ethical practice.
a) a good
b) not so good
c) very good social engineering practice
d) a bad
Answer: d

3. ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c

4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
Answer: a

5. _____________ is the technique used in business organizations and firms to protect IT


assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
Answer: a
6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
Answer: b

7. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d

8. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
Answer: a

9. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c

10. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Chapter 5 Basics of Ethical hacking
1. What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
Answer: a

2. Performing a shoulder surfing in order to check other’s password is ____________


ethical practice.
a) a good
b) not so good
c) very good social engineering practice
d) a bad
Answer: d

3. ___________ has now evolved to be one of the most popular automated tools for
unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c

4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False
Answer: a

5. _____________ is the technique used in business organizations and firms to protect IT


assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
Answer: a
6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
Answer: b

7. Before performing any penetration test, through legal procedure, which key points
listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d

8. An ethical hacker must ensure that proprietary information of the firm does not get
leaked.
a) True
b) False
Answer: a

9. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c

10. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Chapter 6 Types of hackers

Question 1. Which of the following statements best describes a white-hat hacker?

A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
Answer. Option A.

Question 2. A security audit performed on the internal network of an organization


by the network administration is also known as ___________.

A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer. Option C.

Question 3. What is the first phase of hacking?

A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer. Option D.

Question 4. What type of ethical hack tests access to the physical infrastructure?

A. Internal network
B. Remote network
C. External network
D. Physical access
Answer. Option D.
Question 5. The security, functionality, and ease of use triangle illustrates which
concept?

A. As security increases, functionality and ease of use increase.


B. As security decreases, functionality and ease of use increase.
C. As security decreases, functionality and ease of use decrease.
D. Security does not affect functionality and ease of use.
Answer. Option B.

Question 6. Which type of hacker represents the highest risk to your network?

A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer. Option A.

Question 7. What are the three phases of a security evaluation plan? (Choose
three answers.)

A. Conduct Security Evaluation


B. Preparation
C. Conclusion
D. Final
E. Reconnaissance
F. Design Security
G. Vulnerability Assessment
Answer. Options A, B, C.

Question 8. Hacking for a cause is called __________________.

A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer. Option B.
Question 9. Which federal law is most commonly used to prosecute hackers?

A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer. Option B.

Question 10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?

A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Answer. Option A.

Chapter-3 Basics of Digital Forensics


1. Digital forensics is all of them except:

A. Extraction of computer data.

B. Preservation of computer data.

C. Interpretation of computer data.

D. Manipulation of computer data.

Ans:D

2. IDIP stands for

A. Integrated Digital Investigation Process.

B. Integrated Data Investigator Process.

C. Integrated Digital Investigator Process.

D. Independent Digital Investigator Process.

Ans: A
3. Who proposed Road Map for Digital Forensic Research (RMDFR)

A. G.Gunsh.

B. S.Ciardhuain

C. J.Korn.

D. G.Palmar

Ans: D

4. Investigator should satisfy following points:

A. Contribute to society and human being.

B. Avoid harm to others.

C. Honest and trustworthy.

D. All of the above

Ans: D

5. In the past, the method for expressing an opinion has been to frame a ____ question based
on available factual evidence.

A. Hypothetical

B. Nested

C. Challenging

D. Contradictory

Ans: A

6. More subtle because you are not aware that you are running these macros (the document
opens and the application automatically runs); spread via email

A. The purpose of copyright

B. Danger of macro viruses

C. Derivative works

D. computer-specific crime

Ans: B
7. There are three c's in computer forensics. Which is one of the three?

A. Control

B. Chance

C. Chains

D. Core

Ans: A

8. When Federal Bureau Investigation program was created?

A.1979

B.1984

C.1995

D.1989

Ans: B

9. When the field of PC forensics began?

A.1960's

B.1970's

C.1980's

D.1990's

Ans: C

10. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses

A. Preservation phase

B. Survey phase

C. Documentation phase

D. Reconstruction phase

E. Presentation phase

Ans: D
10 MCQs from Each Chapter of Emerging Trend in Computer Science

Chapter 1 Artificial Intelligence

----------------------------------------------------------------------------------------------

1. What is Artificial intelligence?

(A) Putting your intelligence into Computer

(B) Programming with your own intelligence

(C) Making a Machine intelligent

(D) Playing a Game

Ans: C

2. Which is not the commonly used programming language for AI?

(A) PROLOG

(B) Java

(C) LISP

(D) Perl

Ans: D
3. What is state space?

(A) The whole problem

(B) Your Definition to a problem

(C) Problem you design

(Ď) Representing your problem with variable and parameter

Ans: D

4. A production rule consists of

(A) A set of Rule (B) A sequence of steps

(C) Both (a) and (b) (D) Arbitrary representation to problem

Ans: C

5. Which search method takes less memory?

(A) Depth-First Search (B) Breadth-First search

(C) Both (A) and (B) (D) Linear Search.

Ans: A
6.A heuristic is a way of trying

(A) To discover something or an idea embedded in a program

(B) To search and measure how far a node in a search tree seems to be
from a goal

(C) To compare two nodes in a search tree to see if one is better than
the other

(D) Only (a), (b) and (c).

Ans: D

7. A* algorithm is based on

(A) Breadth-First-Search (B) Depth-First –Search

(C) Best-First-Search (D) Hill climbing.

Ans: C

8. Which is the best way to go for Game playing problem?

(A) Linear approach (B) Heuristic approach

(C) Random approach (D) Optimal approach

Ans: B

9. How do you represent “All dogs have tails”.

(A) ۷x: dog(x)àhastail(x) (B) ۷x: dog(x)àhastail(y)

(C) ۷x: dog(y)àhastail(x) (D) ۷x: dog(x)àhasàtail(x)

Ans: A
10. Which is not a property of representation of knowledge?

(A) Representational Verification (B) Representational Adequacy

(C) Inferential Adequacy (D) Inferential Efficiency

Ans: A
Chapter-2 Internet of Things

----------------------------------------------------------------------------------------------

1. Embedded systems are_____


A. General purpose
B. Special purpose
Ans: B

2. Embedded system is______


A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Ans: D

3. Which of the following is not true about embedded systems?


A. Built around specialized hardware
B. Always contain an operating system
C. Execution behavior may be deterministic

D. None of these
Ans: D
4. Which of the following is not an example of a “small-scale
embedded system”?
A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C

5. The first recognized modern embedded system is


A. Apple computer
B. Apollo Guidance Computer (AGC)
C. Calculator
D. Radio navigation system
Ans: B

6. The first mass produced embedded system is


A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Ans: C
7. Which of the following is an (are) an intended purpose(s) of
embedded systems?
A. Data collection
B. Data processing
C. Data communication

D. All of these
Ans: D

8. Which of the following is (are) example(s) of embedded system for


data communication?
A. Network router
B. Digital camera
C. Music player

D. All of these
Ans: B

9. What are the essential tight constraint/s related to the design


metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these

Ans: B

Chapter-3 Basics of Digital Forensics

----------------------------------------------------------------------------------------------

1. Digital forensics is all of them except:


(A) Extraction of computer data.
(B) Preservation of computer data.
(C) Interpretation of computer data.
(D) Manipulation of computer data.
Ans:D

2. IDIP stands for

(A) Integrated Digital Investigation Process.


(B) Integrated Data Investigator Process.
(C) Integrated Digital Investigator Process.
(D)Independent Digital Investigator Process.
Ans: A
3. Who proposed Road Map for Digital Forensic Research (RMDFR)
(A) G.Gunsh.
(B) S.Ciardhuain
(C) J.Korn.
(D) G.Palmar
Ans: D

4. Investigator should satisfy following points:


(A) Contribute to society and human being.
(B) Avoid harm to others.
(C) Honest and trustworthy.
(D) All of the above
Ans: D

5. In the past, the method for expressing an opinion has been to frame
a ____ question based on available factual evidence.
(A) Hypothetical
(B) Nested

(C) Challenging
(D) Contradictory
Ans: A
6. More subtle because you are not aware that you are running these
macros

(A) The purpose of copyright


(B) Danger of macro viruses
(C) Derivative works
(D) computer-specific crime
Ans: B

7. There are three c's in computer forensics. Which is one of the three?
(A) Control
(B) Chance
(C) Chains
(D) Core
Ans: A

8. When Federal Bureau Investigation program was created?


(A) 1979
(B) 1984
(C) 1995
(D) 1989
Ans: B

9. When the field of PC forensics began?


(A) 1960's
(B) 1970's
(C) 1980's
(D) 1990's
Ans: C
10. What is Digital Forensic?
(A) Process of using scientific knowledge in analysis and presentation of
evidence in court
(B) The application of computer science and investigative procedures
for a legal purpose involving the analysis of digital evidence after
proper search authority, chain of custody, validation with
mathematics, use of validated tools, repeatability, reporting, and
possible expert presentation
(C) process where we develop and test hypotheses that answer
questions about digital events
(D) Use of science or technology in the investigation and establishment
of the facts or evidence in a court of law
Ans: B
Chapter 4- Digital Evidence

----------------------------------------------------------------------------------------------

1. A valid definition of digital evidence is:

A. Data stored or transmitted using a computer

B. Information of probative value

C. Digital data of probative value

D. Any digital evidence on a computer

Ans: C

2. What are the three general categories of computer systems that


can contain digital

evidence?

A. Desktop, laptop, server

B. Personal computer, Internet, mobile telephone

C. Hardware, software, networks

D. Open computer systems, communication systems, and embedded


systems

Ans: D
3. In terms of digital evidence, a hard drive is an example of:

A. Open computer systems

B. Communication systems

C. Embedded computer systems

D. None of the above

Ans: A

4. In terms of digital evidence, a mobile telephone is an example of:

A. Open computer systems

B. Communication systems

C. Embedded computer systems

D. None of the above

Ans: C

5. In terms of digital evidence, a Smart Card is an example of:

A. Open computer systems

B. Communication systems

C. Embedded computer systems

D. None of the above

Ans: C
6. In terms of digital evidence, the Internet is an example of:

A. Open computer systems

B. Communication systems

C. Embedded computer systems

D. None of the above

Ans: B

7. Computers can be involved in which of the following types of


crime?

A. Homicide and sexual assault

B. Computer intrusions and intellectual property theft

C. Civil disputes

D. All the above

Ans: D

8. A logon record tells us that, at a specific time:

A. An unknown person logged into the system using the account

B. The owner of a specific account logged into the system

C. The account was used to log into the system

D. None of the above

Ans: C
9. Cyber trails are advantageous because:

A. They are not connected to the physical world.

B. Nobody can be harmed by crime on the Internet.

C. They are easy to follow.

D. Offenders who are unaware of them leave behind more clues than
they otherwise

would have.

Ans: D

10. Private networks can be a richer source of evidence than the


Internet because:

A. They retain data for longer periods of time.

B. Owners of private networks are more cooperative with law


enforcement.

C. Private networks contain a higher concentration of digital evidence.

D. All the above.

Ans: C
Chapter 5 Basics of Hacking (CO5)

----------------------------------------------------------------------------------------------

1. Ethical Hacking is also known as _____

A. Black Hat Hacking.

B. White Hat Hacking.

C. Encryption.

D. None of these.

Ans. B

2. Tool(s) used by ethical hacker_____.

A. Scanner

B. Decoder

C. Proxy

D. All of these.

Ans. D

3. Vulnerability scanning in Ethical hacking finds_____.

A. Strengths.

B. Weakness.

C. A &B

D. None of these.

Ans. B
4. Ethical hacking will allow to____ all the massive security breaches.

A. Remove.

B. Measure.

C. Reject.

D. None of these.

Ans. B

5. Sequential step hackers use are: _ _ _ _.

A. Maintaining Access.

B. Reconnaissance

C. Scanning.

D. Gaining Access.

A. B, C, D, A

B. B, A, C, D

C. A, B, C, D

D. D, C, B, A

Ans. A
6. ______ is the art of exploiting the human elements to gain access to
the authorized user.

A. Social Engineering.

B. IT Engineering.

C. Ethical Hacking.

D. None of the above.

Ans. A

7. Which hacker refers to ethical hacker?

A. Black hat hacker.

B. White hat hacker.

C. Grey hat hacker.

D. None of the above.

Ans. B

8. The term cracker refers to_____

A. Black hat hacker.

B. White hat hacker.

C. Grey hat hacker.

D. None of the above.

Ans. A
9. Who described a dissertation on fundamentals of hacker’s attitude?

A. G. Palma.

B. Raymond.

C. Either.

D. Jhon Browman.

Ans. B

10.Computer Hackers have been in existence for more than a____.

A. Decade.

B. Year.

C. Century

D. Era.

Ans. C
Chapter-6 Types of Hacking (CO6)

-----------------------------------------------------------------------------------------------

1. SNMP stands for_____

A. Simple Network Messaging Protocol

B. Simple Network Mailing Protocol

C. Simple Network Management Protocol

D. Simple Network Master Protocol

Ans: C

2. Which of the following tool is used for Network Testing and port
Scanning______

A. NetCat

B. SuperScan

C. NetScan

D. All of above

Ans: D

3. Banner grabbing is used for

A. White Hat Hacking

B. Black Hat Hacking

C. Grey Hat Hacking

D. Script Kiddies

Ans: A
4. An attacker can create an________attack by sending hundreds or
thousands of e-mails a with

very large attachments.

A. Connection Attack

B. Auto responder Attack

C. Attachment Overloading Attack

D. All the above

Ans: B

5. Which of the following tool is used for Windows for network


queries from DNS lookups to

trace routes?

A. Sam Spade

B. SuperScan

C. NetScan

D. Netcat

Ans: A

6. Which tool is used for ping sweeps and port scanning?

A. Netcat

B. SamSpade
C. SuperScan

D. All the above

Ans: C

7. Which of the following tool is used for security checks as port


scanning and firewall testing?

A. Netcat

B. Nmap

C. Data communication

D. Netscan

Ans: A

8. What is the most important activity in system cracking?

A. Information gathering

B. Cracking password

C. Escalating privileges

D. Covering tracks

Ans: B
9. Which Nmap scan is does not completely open a TCP connection?

A. SYN stealth scan

B. TCP scan

C. XMAS tree scan

D. ACK scan

Ans: A

10.Key loggers are form of

A. Spyware

B. Shoulder surfing

C. Trojan

D. Social engineering

Ans: A
MCQ EMERGING TRENDS
Chapter 1: - artificial inteligence

1) is a branch of science which deals with helping machine find solution to complex to
problem in a more human like a fashion.
(a) Artificial intelligence
(b) Internet of think
(c) Embided system
(d) Cyber security

2) Is a message that consist relavat meaning , implication , or input for decision and or
action.
(a) Data
(b) Information
(c) Knowledge
(d) Intelligence

3) The goal is for the software to use what is it is was learned in one area to solve
problem in other area.
(a) Machine learning
(b) Deep learning
(c) Neural network
(d) All of above

4) the consist of computer program that mimic the way the human brain process
information.
(a) Machine learning
(b) Deep learning
(c) Neural learning
(d) All of this
5) A heuristic is a rule of thumb-------
(a) Strategy
(b) Trick
(c) Simplification
(d) All of above

6) The component of AI concept of------


(a) Logic
(b) Congition
(c) Computation
(d) All of above

7) Is branch of science that deals with programming the system in such that they
automatically learn with experience
(a) Machine learning
(b) Deep earning
(c) Neural learning
(d) All of above

8) The first AI programming language was called


(a) Basic
(b) IPL
(c) FORIRAN
(d) LISP

9) The characteristic of the computer system cable of thinking, reasoning and learning is
know as
(a) Machine intelligence
(b) Human intelligence
(c) Artificial intelligence
(d) Virtual intelligence

10) There are how many dimensions of AI


(a) Four
(b) Two
(c) Three
(d) One
Chapter 2:- internet of things

1. _________ allows us to control electronic components


a) RETful API
b) RESTful API
c) HTTP
d) MQTT

2. MQTT stands for _____________


a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport

3. MQTT is better than HTTP for sending and receiving data.


a) True
b) False

4. MQTT is _________ protocol.


a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine things

5. Which protocol is lightweight?


a) MQTT
b) HTTP
c) CoAP

6. PubNub publishes and subscribes _________ in order to send and receive


messages.
a) Network
b) Account
c) Portal
d) Keys

7. By clicking which key the PubNub will display public, subscribe, and secret
keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
8. The messageChannel class declares the _________ class attribute that defines
the key string.
a) command_key
b) command-key
c) commandkey
d) Key_command

9. _________ method saves the received arguments in three attributes.


a) __Init
b) Init__
c) __Init__
d) _init_

10. _________ and _________ saves the publish and subscribe keys that we have
generated with the PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe

Chapter 3:- basic of digital forensic


1) The digital network divided radio frequency into time slots
(a) TQMA
(b) COMA
(c) EDMA
(d) EDGE

2) When cases go to trial forensics examiner can play one of role


(a) 2
(b) 4
(c) 3
(d) 5

3) Forensics is the systematic trucking of incoming and outgoing ruffic on


your network
(a) Network
(b) Computer
(c) Criminal
(d) Server
4) Validate your tools and verify your evidence with to ensure its integrity
(a) Hashing algorithms
(b) Steganography
(c) Watermark
(d) Digital certificates

5) Is a written list of objection to certain testimony are exhibits


(a) Defendant
(b) Plaintiff
(c) Empanelling the jury
(d) Motion in limine

6) Regarding the trail the term means rejecting potential jurors.


(a) Voir dire
(b) Rebuttal
(c) Strikes
(d) Venireman

7) The evidences of proof that can be obtained from the electricity source is
called the
(a) Digital evidence
(b) Demonstrative evidence
(c) Explainable evidence
(d) Substantial evidence

8) If a micro-phone is present during your testimony, placeit to eight to


inches from you
(a) 3
(b) 5
(c) 4
(d) 6

9) Jurors typically average just over year of education and eight-grade


reading level
(a) 11
(b) 9
(c) 10
(d) 12
10) The digital avoidance are use to stablish a credible link between
(a) Attacker and victim and crime scene
(b) Attacker and the crime scene
(c) Victim and crime scene
(d) Attacker and information.

Chapter 4:- digital evidence


1) A valid definition of digital evidence is
(a) data stored or transmitted using a computer
(b) information of probative value
(c) digital data of probative value
(d) any digital evidence an a computer

2) Digital evidence , a hard drive is a example


(a) Open computer system
(b) Communication system
(c) Embedded system
(d) None of these

3) The term of digital evidence the internet is an example of


(a) Open computer system
(b) Communication system
(c) Embedded system
(d) None of these

4) Digital avoidance is a only useful in a counter of law


(a) True
(b) False

5) What are the three general categories of computer system that can
contain digital evidence
(a) Desktop ,laptop ,server
(b) Personal computer
(c) Hardware, software
(d) Open computer system

6) In term of digital evidence , a smart card of use of example of


(a) Communication system
(b) Open system
(c) Embedded system
(d) None of above
7) All of forensic examination should be perform on a original digital
evidence
(a) True
(b) False

8) The term of digital evidence, the internet is an example of


(a) Open computer system
(b) Communication system
(c) Embedded system
(d) None of these

9) Private network can be a richear sorce of digital evidence than they


internet
(a) They retain data for longer period of time
(b) Owener of private network more cooprative with law enforcement
(c) Private network contain higher concentration of digital evidence
(d) None of these

10) Digital evidence can be duplicate exactly without any change to be


original data
(a) True
(b) False

Chapter 5:- basic of hackings


1). What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
2). Performing a shoulder surfing in order to check other’s password is
____________ ethical practice.
a) a good
b) not so good
c) very good social engineering practice
d) a bad

3). ___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms

4). Leaking your company data to the outside network without prior permission of
senior authority is a crime.
a) True
b) False

5). _____________ is the technique used in business organizations and firms to protect
IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach .

6) The legal risks of ethical hacking include lawsuits due to __________ of


personal data.
a) stealing
b) disclosure
c) deleting
d) hacking

7). Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm

8). An ethical hacker must ensure that proprietary information of the firm does
not get leaked.
a) True
b) False
9). After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting

10). __________ is the branch of cyber security that deals with morality and
provides different theories and a principle regarding the view-points about what
is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking

Chapter 6:- type of hacking


1) Which of the following statement based describe a white hat hackers
(a) Security professional
(b) Former black hat
(c) Former grey hat
(d) Malicious hackers

2) SNMP stand for


(a) simple network messeging protocol
(b) simple network mailing protocol
(c) simple network management protocol
(d) simple network master protocol

3) what is the first phase of hacking


(a) attack
(b) maintaining access
(c) gaining access
(d) reconnaissance

4) banner grabbing is often use for


(a) white hat hacking
(b) black hat hacking
(c) gray hat hacking
(d) script kiddies
5) an attack can create and attack by sending hundreds or thousand of e-mail
with very large attachment
(a) connection attack
(b) auto responder attack
(c) attachment overloading attack
(d) all of the above

6) what type of ethical hack test access to the physical infra structure
(a) internal network
(b) remote network
(c) external network
(d) physical network

7) the security functinallity and ease of use triangle illustrated which concept
(a) a security increase, functionality and ease of use increase
(b) a security decrease, functionality and ease of use increase
(c) a security increase, functionality and ease of use decrease
(d) security does not affect functionality and ease of use

8) which type of hackers represent the highest risk to your network


(a) black hat hackers
(b) grey hat hackers
(c) disgruntled employees
(d) script kiddies

9) hackings for a causes is called


(a) active hacking
(b) hacktivism
(c) activism
(d) black-hat-hackers

10) when a hackers attempt to attack a host via the internet is the know as
what type of attack
(a) remote attack
(b) local access
(c) internal attack
(d) physical access
Unit3. basics of digital forensics
1. What is Digital Forensic?

a. Process of using scientific knowledge in analysis and presentation of evidence in court

b. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation

c. A process where we develop and test hypotheses that answer questions about digital
events

d. Use of science or technology in the investigation and establishment of the facts or


evidence in a court of law

2. Digital forensics is all of them except:


a. Extraction of computer data.
b. Preservation of computer data.
c. Interpretation of computer data.
d. Manipulation of computer data.

3. Which of the following is NOT focus of digital forensic analysis?

a. Authenticity
b. Comparison
c. Proving
d. Enhancement
4. Which of the following represents the step of scientific method?
I- Develop hypothesis based on evidence
II- Calculate hash value of evidence
III- Test the hypothesis to look for additional evidence
IV-make an imaging of the original evidence
a. I and IV
b. I and II
c. II, III and IV
d. All of above

5. What is the Primary Objectives of Digital Forensic for Business and Industry?
a. Availability of service
b. Prosecution
c. Continuity of operation
d. Security
6. Which of the following hold the highest value of evidence in the court?

a. Documentary
b. Demonstrative
c. Testimonial
d. Real

6. Which of the following is FALSE?


a. The digital forensic investigator must maintain absolute objectivity
b. It is the investigator’s job to determine someone’s guilt or innocence.
c. It is the investigator’s responsibility to accurately report the relevant facts of a case.
d. The investigator must maintain strict confidentiality, discussing the results of an
investigation on only a “need to know” ba

7. which is following father of computer forensics


a. M. Anderson
b. G. Gunsh
c. S. Ciardhuain
d. G. Palmar

8. Who proposed Road map model?


a. G. Gunsh
b. S. Ciardhuain
c. J. Korn
d. G. Palmar

9. IDIP stands for


a. Integrated Digital Investigation Process
b. Integrated Data Investigation Process
c. Integrated Digital Investigator Process
d. Independent Digital Investigation Process

10. When you give ____ testimony, you present this evidence and explain what it is and how it
was obtained.
a. technical/scientific
b. expert
c. lay witness
d. deposition
Unit-4 Digital Evidences
1. A valid definition of digital evidence is:
a. Data stored or transmitted using a computer
b. Information of probative value
c. Digital data of probative value
d. Any digital evidence on a computer
2. What are the three general categories of computer systems that can contain digital evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
3. In terms of digital evidence, a hard drive is an example of:
a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above

4. In terms of digital evidence, a mobile telephone is an example of:


a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above

5. In terms of digital evidence, a Smart Card is an example of:


a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above

6. Digital evidence alone can be used to build a solid case.


a. True
b. False
7. Personal computers and networks are often a valuable source of evidence. Those involved
with _______ should be comfortable with this technology.
a. Criminal investigation
b. Prosecution
c. Defense work
d. All of the above
8. An argument for including computer forensic training computer security specialists is:
a. It provides an additional credential.
b. It provides them with the tools to conduct their own investigations.
c. It teaches them when it is time to call in law enforcement.
d. None of the above.
9. Digital evidence is only useful in a court of law.
a. True
b. False
10. In terms of digital evidence, the Internet is an example of:
a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above

Unit-5 Basics of Hacking


1. __________ is the branch of cyber security that deals with morality and provides
different theories and a principle regarding the view-points about what is right and
wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking

2. What is the first phase of hacking?


a. Attack
b. Maintaining access
c. Gaining access
d. Reconnaissance
e. Scanning
3. What is the one thing that old hackers were fond of or find interests in?
a) Breaking Other’s system
b) Voracious thirst for knowledge
c) Cracking Phone calls
d) Learning new languages
4. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
a) privacy and security
b) rules and regulations
c) hacking techniques
d) ethics to talk to seniors
5. What is the name of the first hacker’s conference?
a) DEFCON
b) OSCON
c) DEVCON
d) SECCON
6. After performing ____________ the ethical hacker should never disclose client
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
7. In which year the term hacking was coined?
a) 1965-67
b) 1955-60
c) 1970-80
d) 1980-82
8. From where the term ‘hacker’ first came to existence?

a) MIT
b) Stanford University
c) California
d) Bell’s Lab
9. In which year, hacking became a practical crime and a matter of concern in the field of
technology?

a) 1971
b) 1973
c) 1970
d) 1974
10. When a hacker attempts to attack a host via the Internet it is known as what type of
attack?
a. Local access
b. Remote attack
c. Internal attack
d. Physical access
11. Which tool can be used to perform a DNS zone transfer on Windows?
a. DNSlookup
b. nslookup
c. whois
d. ipconfig
Unit-6 Types of Hacking
1. Why would a hacker use a proxy server?
a. To create a stronger connection with the target.
b. To create a ghost server on the network.
c. To obtain a remote access connection.
d. To hide malicious activity on the network.
2. A security audit performed on the internal network of an organization by the network
administration is also known as ___________.
a. Grey-box testing
b. Black-box testing
c. White-box testing
d. Active testing E. Passive testing
3. Which are the four regional Internet registries?
a. APNIC, PICNIC, NANIC, RIPE NCC
b. APNIC, MOSTNIC, ARIN, RIPE NCC
c. APNIC, PICNIC, NANIC, ARIN
d. APNIC, LACNIC, ARIN, RIPE NCC

4. Attempting to gain access to a network using an employee’s credentials is called the _____________
mode of ethical hacking.
a. Local networking
b. Social engineering
c. Physical entry
d. Remote networking
5. What tool can be used to perform SNMP enumeration?

a. DNSlookup
b. Whois
c. Nslookup
d. IP Network Browser

6. What is the purpose of a Denial of Service attack?


a. Exploit a weakness in the TCP/IP stack
b. To execute a Trojan on a system
c. To overload a system so it is no longer operational
d. To shutdown services by turning them off

7. What port does Telnet use?


a. 22
b. 80
c. 20
d. 23
8. Performing hacking activities with the intent on gaining visibility for an unfair situation is called
________.
a. Cracking
b. Analysis
c. Hacktivism
d. Exploitation

9. What protocol is the Active Directory database based on?

a. LDAP
b. TCP
c. SQL
d. HTTP

10 Which databases is queried by Whois?

a. ICANN
b. ARIN
c. APNIC
d. DNS
MCQ Chapter 01

1) Which is the first AI program?


a) The Logical Brain
b) AlphaSense
c) The Jarvis
d) The Logic Theorist
Ans: d) The Logical Theorist

2) Who is regarded as “The Father of AI?”


a) Allan Turin
b) John Mc Carthy
c) J. C. Shaw
d) Allen Newell
Ans: b) John Mc Carthy

3) Which among this, is an AI created by IBM partner with Fluid PVT. Used specially for
‘Data Analysis?’
a) EVE AI
b) Watson
c) Siri
d) Novel AI
Ans: b) Watson

4) What is PROLOG and LISP?


a) Examples of super AI
b) Languages of AI
c) Concepts of AI
d) Type of AI

Ans: b) Languages of AI
5) The given illustrative diagram is related to which topic?

a) Machine Learning
b) Neural Network Processing
c) Reasoning
d) Deep learning
Ans: a) Machine Learning

6) There are how many dimensions of AI?


a) Four
b) Three
c) Two
d) One
Ans: b) Three

7) The term “Strong” or “Super” AI comes under which ‘type’ of AI?


a) Type-1
b) Type-2
c) None of the above
d) All of the above
Ans: a) Type-1

8) These machines can use stored data for a limited time period only.
a) Reactive Machine
b) Self-Awareness
c) Limited machine
d) Theory of mind
Ans: c) Limited machine

9) “KBS” in AI stands for?


a) Knowledge Based Scenario
b) Knowledge Based System
c) Knowledge Based Segments
d) Knowing Best System
Ans: b) Knowledge Based System

10) There are how many ‘AI Approaches?’


a) One
b) Two
c) Three
d) Four
Ans: d) Four

MCQ Chapter 03

1. When was International Organization on Computer Evidence (IOCE) formed?


a. 1980
b. 1997
c. 1995
d. 1984
Ans: c. 1995

2. CART is referred as…


a. Computer Art and Response Team
b. Common Analysis and Response Team
c. Computer Analysis and Reasoning Team
d. Computer Analysis and Response Team
Ans: d. Computer Analysis and Response Team

3. How many Rules are there of Digital Forensics?


a. 5
b. 6
c. 7
d. 4
Ans: b. 6
4. Fill in the blanks.

Digital Forensics is a series of steps to _________ and _________ electronic data through
________ method.

a. Solve, analyses, Intelligent


b. Uncover, analyses, scientific
c. Uncover, analyses, electronic
d. Solve, analyses, electronic
Ans: b. Uncover, analyses, scientific

5. There are how many models of digital forensics?


a. 4
b. 5
c. 6
d. 8
Ans: c. 6

6. Which of the following is not a model of digital forensics?


a. RMDFR
b. DFI
c. IDIP
d. UMDFPM
Ans: b. DFI

7. Who proposed EEDIP?


a. Gunsh
b. Korn
c. Stepenson
d. Palmer
Ans: c. Stepenson

8. There are hoe many phases in RMDFR model of digital forensics?


a. Four
b. Six
c. Eight
d. Ten
Ans: b. Six

9. When was pc forensics began?


a. 1980
b. 1984
c. 1995
d. 1997
Ans: a. 1980

10. Who is the father of Computer Forensics?


a. Anderson
b. Palmer
c. Ciardhuain
d. Korn
Ans: a. Anderson

MCQ Chapter 04

1. The digital evidence is used to establish the credible link between …


a. System, evidence and victim
b. Attacker, victim, and crime scene
c. Attacker, victim and case file
d. Attacker, system and victim
Ans: b. Attacker, victim and crime scene

2. An original copy of the document is considered as…


a. Best evidence
b. Original evidence
c. Superior evidence
d. True evidence
Ans: c. Superior evidence

3. Best Evidence Rule states that…


a. It states that multiple copies of electronic files may be a part of the “original” or equivalent
to the “original.”
b. It states that copy of evidence may be considered as original evidence.
c. It states that the multiple copies of evidence may be part of the “original” or equivalent to
the “original.”
d. It states that multiple copies of electronic files may be a part of the “original” or same as
“original.”

Ans: a. It states that multiple copies of electronic files may be a part of the “original” or equivalent
to the “original.”

4. According to Locard’s Exchange Principle, contact between two items will result in an
_________.
a. War
b. Love
c. Exchange
d. Failure
Ans: c. Exchange

5. Which of the following is used to portray data more specifically and is helpful in determining
the background of digital evidence?
a. Data
b. Metadata
c. Cookies
d. History
Ans: b. Metadata

6. Testimonial is the major type of Evidence.


a. True
b. False
c. None
d. N/A
Ans: a. True
7. When collecting evidence, you should always try to proceed from
a. Least volatile to most volatile evidence
b. Most volatile to least volatile evidence
c. All evidence at same priority
d. Least then medium then most volatile evidence
Ans: b. most volatile to least volatile evidence

8. You must have both ____ and ____ to validate your evidence.
a. Proof and victim
b. Power and skill
c. Power and proof
d. Proof and skill
Ans: b. power and skill

9. There are how many major types of evidence?


a. Two
b. Four
c. Six
d. Seven
Ans: c. six

10. Physical evidence is also called as.


a. Illustrative evidence
b. Explainable evidence
c. Substantial evidence
d. Real evidence
Ans: c. substantial evidence
MCQ Chapter 05

1. Select the most appropriate definition of Ethical hacking.


a. Ethical hacking is the science of testing computer and network for security vulnerabilities
and plugging the hole before the viruses get chance to exploit them.
b. Ethical hacking is the art of hacking computer and network for security vulnerabilities and
plugging the hole before the viruses get chance to exploit them.
c. Ethical hacking is the science of testing computer and network for security vulnerabilities
and plugging the hole before the unauthorized peoples get a chance to exploit them.
d. Ethical hacking is the art of testing computer and network for security vulnerabilities and
plugging the hole before the viruses get chance to handle them.
Ans: c. Ethical hacking is the science of testing computer and network for security vulnerabilities
and plugging the hole before the unauthorized peoples get a chance to exploit them.

2. A hacker who gains access to system with a view to fix the identified weaknesses is known as
a. White hat hackers
b. Grey hath hackers
c. Red hat hackers
d. Hacktivist
Ans: a. white hat hackers

3. Complete the sentence below

To catch a thief, think like a _______.

a. Police
b. Victim
c. Thief
d. Hacker
Ans: c. Thief

4. SATAN stands for_


a. Security Advanced Tool for Analysis Networks
b. Security Admin Tool for Analysis Networks
c. Security Administrator Tool for Analysis Networks
d. Security Administrator Tool for Analysing Network
Ans: c. Security Administrator for Analysis Networks

5. Which type of hackers are invited by the software vendors to find the security flaws in their
system?
a. White hat hackers
b. Black hat hackers
c. Grey hat hackers
d. Blue hat hackers
Ans: d. Blue hat hackers

6. IRC stands for


a. Internet Rules Chat
b. Internet Relay Chat
c. Internet Ready Chat
d. Internet Readable chat
Ans: b. Internet Relay chat

7. A non-skilled person who gains access to computer system using already made tools are
known as?
a. Grey hat hackers
b. Hacktivist
c. Script kiddies
d. Phreakers
Ans: c. Script kiddies

8. Identifying weakness in computer system or network to exploit its weaknesses to gain access
is known as
a. Cracking
b. Cybersecurity
c. Hacking
d. Threatening
Ans: c. Hacking

9. Exploration of a phone network without authorization is known as


a. Scripting
b. Phreaking
c. Phone hacking
d. Call tracing
Ans: b. Phreaking
10. Social engineering the ____ of exploiting the human elements to gain access to unauthorized
resources.
a. Art
b. Science
c. Hacking
d. Skill
Ans: a. Art

MCQ Chapter 06

1. Which of the following is not a network testing and port scanning tool?
a. Nmap
b. SuperScan
c. John the ripper
d. NetCat
Ans: c. John the Rippers

2. Select the most appropriate option for the below two statements.

I. A Dos attack can take down your internet connection


II. A Dos attack can take down your entire system

a. Both I and II are true


b. I is true II is false
c. I is false II is True
d. Both I and II are false
Ans: a. Both I and II are true

3. SNMP stands for


a. Simple Network Message Protocol
b. Simple New Message Protocol
c. Simple Network Management Protocol
d. Simple Network Managing Protocol
Ans: c. Simple Network Management Protocol
4. Which protocol does hackers use to make their system seems as your system or another
allowed host on your network?
a. SNMP protocol
b. TCP protocol
c. ARP protocol
d. ICMP protocol
Ans: c. ARP protocol

5. Letter bomb is also known as


a. Official bomb
b. Hacking bomb
c. Mail bomb
d. E-mail bomb
Ans: d. Email Bomb

6. Which attack allows the attacker to execute the scripts on the victim’s browser?
a. SSL attack
b. Cookie attack
c. Banner grabbing
d. XSS attack
Ans: d. XSS attack

7. ACL stands for.


a. Application Control Language
b. Application Control list
c. Access control List
d. Access Command List
Ans: c. Access Control List

8. As an ethical hacker, you should scan all ________ UDP and TCP port on each network host
that’s found by your scanner.
a. 65535
b. 65353
c. 65333
d. 65555
Ans: a. 65535
9. Which of the following are the foundation of all the technical security issues in your
information systems?
a. Network Infrastructure vulnerabilities
b. Information vulnerabilities
c. System Infrastructure vulnerabilities
d. Network Information vulnerabilities
Ans: a. Network infrastructure vulnerabilities

10. Which attack is an HTTP attack which allows attackers to access restricted directories and
execute commands outside the web servers root directory?
a. XSS attack
b. Path Traversal attack
c. MITM attack
d. SQL Injection attack
Ans: b. Path traversal Attack

1What allows digital devices to interconnect and transmit data?

a. a sensor

b.a global positioning sensor

c.a smart phone

d.a network

2. Which command is used to test network connectivity and provide a response to each packet
received by the remote host?

a.test

b.tracer

c.ping

d.connect

3. What type of device could allow a refrigerator to place a replacement order for an item contained
within it?

a.digital network

b.generator

c.smart phone

d.sensor
4. True or False?

Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or
PC.

a.true

b.false

5. What information is conveyed by the SSID that is configured on an IoT device?

a.the registration server

b.he default gateway

c.the wireless network

d.the home gateway

6. What is comprised of millions of smart devices and sensors connected to the internet?

a.the fog

b.the internet of things

c.the data center

d.the cloud

7. Which tool allows a user to simulate real networks?

a.artificial intelligence

b.Packet Tracer

c.internet

d.PAN

8. True or False?

The Internet of Things will connect inanimate objects to the network with intelligent sensors.

a.true

b.false
9. Which type of network is used to connect a company located in one area of a city to another
location in a city far away?

a.LAN

b.PAN

c.MAN

d.WAN

10. Which type of computing is located at the edge of a business or corporate network and that allows
data from sensors to be preprocessed?

a.internet

b.fog

c.wireless

d.WAN

1. Artificial Intelligence system developed by Terry A. Winograd to permit an


interactive dialogue about a domain he called blocks-world.

 SIMD
 STUDENT
 SHRDLU
 BACON

And:- SHRDLU

2. What is Artificial intelligence?

 Programming with your own intelligence


 Putting your intelligence into Computer
 Making a Machine intelligent
 Playing a Game

And:- Making a Machine intelligent


3. DARPA, the agency that has funded a great deal of American Artificial
Intelligence research, is part of the Department of

 Education
 Defense
 Energy
 Justice

And:- Defense.

4. Who is the “father” of artificial intelligence?

 John McCarthy
 Fisher Ada
 Allen Newell
 Alan Turning

And:- Fisher Ada .

5. KEE is a product of

 IntelliCorpn
 Teknowledge
 Texas Instruments
 Tech knowledge

Ans:- IntelliCorpn .

6. Default reasoning is another type of

 Analogical reasoning
 Bitonic reasoning
 Non-monotonic reasoning
 Monotonic reas

Ans:- Non-monotonic reasoning.


7. Weak AI is

 a set of computer programs that produce output that would be considered


to reflect intelligence if it were generated by humans.
 the study of mental faculties through the use of mental models
implemented on a computer.
 the embodiment of human intellectual capabilities within a computer.
 All of the above

Ans:- Weak AI is the study of mental faculties through the use of mental models
implemented on a computer.

8. If a robot can alter its own trajectory in response to external conditions, it is


considered to be:

 mobile
 open loop
 intelligent
 non-servo

Ans:- intelligent .

9. One of the leading American robotics centers is the Robotics Institute located
at

RAND

MIT

CMU

SRI

And:- CMU
10. What is the name of the computer program that contains the distilled
knowledge of an expert?

 Management information System


 Expert system
 Data base management system
 Artificial intelligence

Ans:- expert system.

11. In LISP, the function evaluates both <variable> and <object> is -

 setq
 add
 set
 eva

Ans:- setq

12. What is Artificial intelligence?

 Making a Machine intelligent


 Putting your intelligence into Computer
 Programming with your own intelligence
 putting more memory into Computer

Ans:- Making a Machine intelligent.

13. Which is not the commonly used programming language for AI?

 PROLOG
 LISP
 Perl
 Java script

And:- Perl
14. Which is not a property of representation of knowledge?

 Inferential Adequacy
 Representational Adequacy
 Representational Verification
 Inferential Efficiency

Ans:- Representational Verification .

15. A Hybrid Bayesian network contains

 Both discrete and continuous variables


 Only Discontinuous variable
 Both Discrete and Discontinuous variable
 Continous variable only.

And:- Both discrete and continuous variables


3. Basics of Digital Forensic

1. When cases go to trial, you as a forensics examiner can play one of ____ roles.

a. 2 c. 4

b. 3 d.5

Ans:- 2

2. When you give ____ testimony, you present this evidence and explain what it is and how it
was obtained.

a. technical/scientific. c. lay witness

b. expert d. deposition

And:- technical/scientific.

3. Validate your tools and verify your evidence with ____ to ensure its integrity

a. hashing algorithms c. steganography

b. watermarks d. digital certificates

And:- hashing algorithms

4. For forensics specialists, keeping the ____ updated and complete is crucial to supporting
your role as an expert and showing that you’re constantly enhancing your skills through
training, teaching, and experience.

a. testimony c. examination plan

b. CV d. deposition

Ans:- CV

5. If your CV is more than ____ months old, you probably need to update it to reflect new
cases and additional training.

a. 2 c. 4

b. 3 d. 5

Ans:- 3
6. __ is a written list of objections to certain testimony or exhibits.

a. Defendant c. Plaintiff

b. Empanelling the jury d. Motion in limine

Ans:- Motion in limine

7. Regarding a trial, the term ____ means rejecting potential jurors.

a. voir dire c. strikes

b. rebuttal d. venireman

Ans:- strikes

8. ____ from both plaintiff and defense is an optional phase of the trial. Generally, it’s allowed
to cover an issue raised during cross-examination

a. Rebuttal c. Closing arguments

b. Plaintiff d. Opening statements

Ans:- Rebuttal

9. If a microphone is present during your testimony, place it ____ to eight inches from you.

a. 3 c. 5

b. 4 d. 6

Ans:- 6

10. Jurors typically average just over ____ years of education and an eighth-grade reading
level. a. 9 c. 11

b. 10 d. 12

Ans:- 12
4. Digital Evidences

1. A valid definition of digital evidence is:

a. Data stored or transmitted using a computer

b. Information of probative value

c. Digital data of probative value

d. Any digital evidence on a computer

2. What are the three general categories of computer systems that can contain digital

evidence?

a. Desktop, laptop, server

b. Personal computer, Internet, mobile telephone

c. Hardware, software, networks

d. Open computer systems, communication systems, embedded systems

3. In terms of digital evidence, a hard drive is an example of:

a. Open computer systems

b. Communication systems

c. Embedded computer systems

d. None of the above

4. In terms of digital evidence, a mobile telephone is an example of:

a. Open computer systems

b. Communication systems

c. Embedded computer systems

d. None of the above


5. In terms of digital evidence, a Smart Card is an example of:

a. Open computer systems

b. Communication systems

c. Embedded computer systems

d. None of the above

6. In terms of digital evidence, the Internet is an example of:

a. Open computer systems

b. Communication systems

c. Embedded computer systems

d. None of the above

7. Computers can be involved in which of the following types of crime?

a. Homicide and sexual assault

b. Computer intrusions and intellectual property theft

c. Civil disputes

d. All of the above

8. A logon record tells us that, at a specific time:

a. An unknown person logged into the system using the account

b. The owner of a specific account logged into the system

c. The account was used to log into the system

d. None of the above


9. Cybertrails are advantageous because:

a. They are not connected to the physical world.

b. Nobody can be harmed by crime on the Internet.

c. They are easy to follow.

d. Offenders who are unaware of them leave behind more clues than they otherwise would
have.

10. Private networks can be a richer source of evidence than the Internet because:

a. They retain data for longer periods of time.

b. Owners of private networks are more cooperative with law enforcement.

c. Private networks contain a higher concentration of digital Evidences

d. None of the above.

5. Basic of Hacking

1. What is the attack called “evil twin”?

 Rogue access point


 ARP poisoning
 Session hijacking
 MAC spoofing

2. What are the forms of password cracking techniques?

 AttackSyllable
 AttackBrute Forcing
 AttacksHybrid
 All of the above
3. what is the primary goal of an Ethical Hacker ?

 Avoiding detection
 Testing security controls
 Resolving security vulnerabilities
 Determining return on investment for security measures

4. What is the first phase of hacking?

 Maintaining access
 Gaining access
 Reconnaissance
 Scanning

5. Which type of hacker represents the highest risk to your network?

 Black-hat hackers
 Grey-hat hackers
 Script kiddies
 Disgruntled employees

6. Hacking for a cause is called ..................

 Hacktivism
 Black-hat hacking
 Active hacking
 Activism

7. When a hacker attempts to attack a host via the Internet it is known as what type of attack?

 Local access
 Remote attack
 Internal attack
 Physical access
8. Which are the four regional Internet registries?

 APNIC, MOSTNIC, ARIN, RIPE NCC


 APNIC, PICNIC, NANIC, ARIN
 APNIC, PICNIC, NANIC, RIPE NCC
 APNIC, LACNIC, ARIN, RIPE NCC

9. What port number does HTTPS use?


 53
 443
 80
 21

10. Banner grabbing is an example of what?


 Footprinting
 Active operating system fingerprinting
 Passive operating system fingerprinting
 Application analysis
6. Types of Hacking
1 . Which of the following statements best describes a white-hat
hacker?

A. Security professional

B. Former black hat

C. Former grey hat

D. Malicious hacker

2. A security audit performed on the internal network of an


organization by the network administration is also known as
___________.

A. Grey-box testing

B. Black-box testing

C. White-box testing

D. Active testing

E. Passive testing

3. What is the first phase of hacking?

A. Attack

B. Maintaining access

C. Gaining access

D. Reconnaissance

E. Scanning
4. What type of ethical hack tests access to the physical infrastructure?

A. Internal network

B. Remote network

C. External network

D. Physical access

5. The security, functionality, and ease of use triangle illustrates which


concept?

A. As security increases, functionality and ease of use increase.

B. As security decreases, functionality and ease of use increase.

C. As security decreases, functionality and ease of use decrease.

D. Security does not affect functionality and ease of use.

6. Which type of hacker represents the highest risk to your network?

A. Disgruntled employees

B. Black-hat hackers

C. Grey-hat hackers

D. Script kiddies
7. What are the three phases of a security evaluation plan? (Choose
three answers.)

A. Conduct Security Evaluation

B. Preparation

C. Conclusion

D. Final

E. Reconnaissance

F. Design Security

G. Vulnerability Assessment

Answer :- A, B, C.

8. Hacking for a cause is called __________________.

A. Active hacking

B. Hacktivism

C. Activism

D. Black-hat hacking
9. Which federal law is most commonly used to prosecute hackers?

A. Title 12

B. Title 18

C. Title 20

D. Title 2

10. When a hacker attempts to attack a host via the Internet it is known
as what type of attack?

A. Remote attack

B. Physical access

C. Local access

D. Internal attack
MCQ’S

CHAPTER 3: Basics of Digital Forensics

1. IOCE is …………………..?
a. Organization on computer evidence
b. Organization on communication evidence
c. Organization on country education
d. Organization on crime evidence
Ans : a)Organization on computer evidence

2. Digital forensic applied both ……………. ?


a. Analysis and response action
b. Computer crime and civil action
c. Criminal and civil action
d. Regional and forensic action
Ans : c) criminal and civil action
3. How many rules are there in Digital Forensics :
a. 5
b. 2
c. 7
d. 6
Ans : d) 6

4. Compliance with the law and ………….


a. Professional norms.
b. Collection
c. Prevention
d. Examination
Ans : a) Professional norms

5. What is the full form of ADFM


a. Abstract defining forensic model
b. Abstract digital forensic model
c. Abstract digital forensic media
d. Analysis digital forensic model
Ans : b) Abstract digital forensic model

6. The whole process is trigged by …………..


a. Investigator
b. Society
c. Digital forensic
d. Criminal activity
Ans : d) Criminal activity

7. Digital forensic is all of them except:


a. Extraction of computer data
b. Preservation of computer data
c. Interpretation of computer data
d. Manipulation of computer data
Ans: b) Preservation of computer data

8. IDIP stand for


a. Integrated digital investigation process
b. Integrated data investigation process
c. Integrated digital investigator process
d. None of the above
Ans : a) Integrated digital investigation process
9. Who proposed Road map model ?
a. G.Gunsh
b. S.Ciardhuain
c. J.Korn
d. G.Palmar
Ans : d) G.Palmar

10. Field of PC forensics began in which year ?


a. 1975
b. 1944
c. 1971
d. 1980
Ans : d) 1980

MCQ’S

CHAPTER 4: Digital Evidences

1. Which of the following is not a digital device ?


a. Computer
b. Phone
c. Guitar
d. Internet
Ans : c) Guitar

2. Rule of evidence is called as ………….


a. Digital Evidence
b. Law of Evidence
c. Hidden Evidence
d. Electronic Evidence
Ans : b) Law Of Evidence

3. BPO stand for …………..


a. Business profile outsourcing
b. Business profile outcome
c. Business process outsourcing
d. Business process outcome
Ans : c) Businesses process outsourcing
4. The digital evidence are used to establish a credible link between……
a. Attacker and victim and the crime scene
b. Attacker and the crime scene
c. Victim and the crime scene
d. Attacker and information
Ans : a) Attacker and victim and the crime scene

5. Which of the following is not a type of volatile evidence?

a. Routing Table
b. Main memory
c. Log files
d. Cached Data
Ans : c) Log files

5. Will volatile evidences last forever


a. No
b. Not Sure
c. Yes
d. None of the above
Ans : a) No

6. Investigation means :
a. Collection of information
b. A procedure to find the Digital Evidence
c. Searching over internet
d. Hacking computer systems
Ans : b) A procedure to find the Digital Evidence

7. The evidence or proof that can be obtained from the electronic source is called the ………
a. Digital evidence
b. Demonstrative evidence
c. Explainable evidence
d. Substantial evidence
Ans : a) Digital evidence

8. Which one is not a 103 rule of evidence


a. Maintaining a claim of error
b. Aim of an offer of proof
c. Plain error taken
d. Destroying data
Ans : d) Destroying data
9. Digital evidence must follow the requirements of the ……..
a. Ideal evidence
b. Best evidence
c. Exchange evidence
d. All of the mentioned
Ans : b) Best evidence

MCQ’S

CHAPTER 5: Basics of Hacking

1. What is hacking ?
a. Identifying weakness in computer system or networks
b. Refers to act of locating vulnerabilities
c. A security to your personal data
d. Protocols of corrupting data
Ans : a) Identifying weakness in computer system or networks

2. Ethical Hacking is known as ………..


a. White Hat hacking
b. Black Hat hacking
c. Encrypting
d. None of these
Ans : a) white Hat hacking

3. How many steps are there the legality of ethical hacking ?


a. 5
b. 2
c. 7
d. 6
Ans : a) 5

4. Tools used by ethical hackers………..


a. Scanner
b. Decoder
c. Proxy
d. All of these
Ans : a) scanner
5. Hackers are also called as
a. Good Guys
b. Bad Guys
c. Both of the above
d. None of the above
Ans : b) Bad Guys

6. Vulnerability scanning in Ethical hacking finds……….


a. Strengths
b. Weakness
c. A&B
d. None of these
Ans : b) weakness

7. What is the required education to be an ethical hacker ?


a. Diploma holder
b. 10+2 passed
c. Bachelor’s degree in the related field
d. Nothing needed
Ans : c) Bachelor’s degree in related field

8. Ethical hacking will allow to ………all the massive security breaches.


a. Reject
b. Measure
c. Remove
d. None of these
Ans : d) None of these

9. Security tools that are widely used are :


a. Nmap
b. WebInspect
c. Network Strumbler
d. All of the above
Ans : d) All of the above

10. TCP stand for………


a. Transmission Control Protocol
b. Transfer Control Protocol
c. Travel Control Protocol
d. Tracking Control Protocol
Ans : a) Transmission Control Protocol
MCQ’S

CHAPTER 6: Types of Hacking

1. SNMP stand for…………


a. Simple network messaging protocol
b. Simple network Mailing protocol
c. Simple network management protocol
d. Simple network Master protocol
Ans : c) Simple network management protocol

2. What is the full form of NIV Foundation?


a. Network Infrastructure Violation
b. Network Issue Vulnerabilities
c. Network Infrastructure Vulnerabilities
d. Network Information Vulnerabilities
Ans : c) Network Infrastructure Vulnerabilities

3. Banner grabbing is often used for…….


a. White hat hacking
b. Black hat hacking
c. Gray hat hacking
d. Script kiddies
Ans : a) white hat hacking

4. What is the full form of UDP


a. Union Development Program
b. User Data Program
c. User Datagram Protocol
d. Unified Datagram Provider
Ans : c) User Datagram Protocol

5. IMAP stand for…………


a. Internet message access protocol
b. Internet mailing access protocol
c. Information access protocol
d. None of these
Ans : a) Internet message access protocol
6. What is full form of MAC
a. Model Access Communication
b. Media Access Control
c. Multimedia Access Control
d. Modern Access Control
Ans : b) Media Access Control

7. Which IEEE standards specify the technologies for wireless LANs 802.11
a. IEEE 802.11
b. IEEE 802.10
c. IEEE 279.6
d. IEEE 275.4
Ans : a) 802.11

8. An attackers can create an …....attack by sending hundreds or thousand of e-mail with


very large attachment.
a. Connection Attack
b. Auto responder Attack
c. Attachment overloading Attack
d. All of the above
Ans : c) Attachment overloading attack

9. Port no.(6346,6347) Gnutella service having which protocols …..


a. TCP
b. UDP
c. TCP, UDP
d. NONE
Ans : c) TCP,UDP

10. What is the full form of DMZ


a. Demilitarized Zone
b. Demonetized Zone
c. Demand Zone
d. Demoralized Zone
Ans : a) Demilitarized Zone
MCQ’S

CHAPTER 1: Artificial Intelligence

1) Which is the first AI program?


a) The Logical Brain
b) AlphaSense
c) The Jarvis
d) The Logic Theorist

Ans: d) The Logical Theorist


2) Who is regarded as “The Father of AI?”
a) Allan Turin
b) John Mc Carthy
c) J. C. Shaw
d) Allen Newell

Ans: b) John Mc Carthy


3) Which among this, is an AI created by IBM partner with Fluid PVT. Used specially for ‘Data
Analysis?’
a) EVE AI
b) Watson
c) Siri
d) Novel AI Ans: b)

Watson

4) What is PROLOG and LISP?


a) Examples of super AI
b) Languages of AI
c) Concepts of AI
d) Type of AI

Ans: b) Languages of AI

5) The given illustrative diagram is related to which topic?


a) Machine Learning
b) Neural Network Processing
c) Reasoning
d) Deep learning

Ans: a) Machine Learning


6) There are how many dimensions of AI?
a) Four
b) Three
c) Two
d) One

Ans: b) Three
7) The term “Strong” or “Super” AI comes under which ‘type’ of AI?
a) Type-1
b) Type-2
c) None of the above
d) All of the above

Ans: a) Type-1

8) These machines can use stored data for a limited time period only.
a) Reactive Machine
b) Self-Awareness
c) Limited machine
d) Theory of mind Ans: c)

Limited machine

9) “KBS” in AI stands for?


a) Knowledge Based Scenario
b) Knowledge Based System
c) Knowledge Based Segments
d) Knowing Best System

Ans: b) Knowledge Based System

10) There are how many ‘AI Approaches?’


a) One
b) Two
c) Three
d) Four

Ans: d) Four
CHAPTER 2: Internet of Things
1) Raspbian is:

a) Assembler

b) Language

c) Compiler

d) OS

Ans:- d. OS

2) Which one out of these is not LPWAN technologies:

a) SigFox

b) WiFi

c) NB-oT

d) LoRa

Ans:- b. WiFi

3) Computer programs that mimic the way the human brain processes information is called as:-

a) Machine learning

b) Deep learning

c) Neural networks

d) None of the above

Ans:- c. Neural

networks
4) is a branch of Science which deals with the helping machine find
solutions to complex problems in a more human like fashion

a. Artificial Intelligence

b. Internet Od Things

c. Embedded system

d. cyber Security

Ans:- a. Artificial Intelligence

5) What does LTE stands for:-


a) Long Terms Errors

b) Long Term Evolution

c) Lengthy terminal Estimation

d) Long term Estimates

Ans:- b. Long Term Evolution

6) Which transport layer protocols is used by DHCP:-

a. RSVP

b.TCP

c. DCCP

d. UDP

Ans:- d. UDP

7) Which one out of these is not a data link layer technology:-

a) Bluetooth

b) UART

c) WiFi

d) HTTP

Ans:- d. HTTP
8) IoT stands for:-

a) Internet of Technology

b) Intranet of Things

c) Internet of Things

d) Information of Things

Ans:- c. Internet of

Things

9) WSN stands for:-

a) Wide Sensor Network


b) Wireless Sensor Network

c) Wired Sensor Network

d) None of these

Ans:- b. Wireless Sensor Network

10) Which is not the feature of IoT:-

a. Connectivity

b. Self-configuring

c. Endpoint Management

d. Artificial Intelligence

Ans:- b. Self-configuring
CHAPTER 3: Basics of Digital Forensics

11. Which of the following sciences pay vital role in criminal justice systems ?
a. Digital Forensics
b. Forensic Science
c. PC Forensics
d. INTERPOL Forensic
Ans : b) Forensic Science

12. The full form of DFI is :


e. Digital Forensic Investigation
f. Digitalized Forensic Investigation
g. Digital Foreign Investment
h. Direct Forensic Investigation
Ans : a) Digital Forensic Science

13. How many rules are there in Digital Forensics :


a. 5
b. 2
c. 7
d. 6
Ans : d) 6

14. Which of the following is not involved in DFI’s road map :


a. Identification
b. Collection
c. Prevention
d. Examination
Ans : c) Prevention

15. What is the full form of EEDIP


a. End to End Digital Investigation Program
b. End to End Digital Investigation Process
c. End to End Digital Forensic Investigation
d. End to End Digital Forensic Investment
Ans : b) End to End Digital Investigation Process
16. Ethical Issues in Digital Forensic means :
a. Set of moral principals that regulate the use of computers
b. Related to ethical hacking
c. Honesty towards investigation
d. Compliance with law
Ans : a) Set of moral principals that regulate the use of computers

17. What do primary investigator consider from the original source :


a. Summarize and hold the data
b. Whether to analyze more data or to extract more data
c. Examine the data and store it
d. Compress the data
Ans : b) Whether to analyze more data or to extract more data

18. Who proposed the UML Modelling of Digital Forensic Process Model
a. Kohn, Eloff and Oliver
b. Response Team
c. Only (a)
d. None of the above
Ans : a) Kohn, Eloff and Oliver

19. From what should the digital data must be protected ?


a. Copied
b. Deleted
c. Modified
d. Destroyed
Ans : c) Modified

20. Field of PC forensics began in which year ?


a. 1975
b. 1944
c. 1971
d. 1980
Ans : d) 1980
MCQ’S

CHAPTER 4: Digital Evidences

10. Which of the following is not a digital device ?


a. Computer
b. Phone
c. Guitar
d. Internet
Ans : c) Guitar

11. Digital evidences are also called as :


a. Digital proof
b. Evidence
c. Hidden Truth
d. Electronic Evidence
Ans : d) Electronic Evidence

12. Which of the following is not the form of digital evidence:


a. Text messages
b. Emails
c. Pictures
d. Paper
Ans : d) Paper

13. According to Edmond Locard, there will be interchange if :


a. Two items interchange with each other
b. Two items make contact
c. No interaction needed
d. No devices needed
Ans : b) Two items make contact

14. What is digital evidence according to Cohen ?


a. Baggage of proofs
b. Collection of evidences
c. Bag of bits
d. Backpack of Bytes
Ans : c) Bag of bits
15. Will volatile evidences last forever
a. No
b. Not Sure
c. Yes
d. None of the above
Ans : a) No

16. Investigation means :


a. Collection of information
b. A procedure to find the Digital Evidence
c. Searching over internet
d. Hacking computer systems
Ans : b) A procedure to find the Digital Evidence

17. To whom is the IP addresses were traced ?


a. Internet Service Provider
b. Cyber Crime Office
c. Only (a)
d. None of the above
Ans : a) Internet Service Provider

18. Which one is not a 103 rule of evidence


a. Maintaining a claim of error
b. Aim of an offer of proof
c. Plain error taken
d. Destroying data
Ans : d) Destroying data

19. Which one of the following locates data on network devices :


a. ARP Cache
b. Kernel Statistics
c. Routing Table
d. Memory
Ans : c) Routing Table
MCQ’S

CHAPTER 5: Basics of Hacking

11. What is hacking ?


a. Identifying weakness in computer system or networks
b. Refers to act of locating vulnerabilities
c. A security to your personal data
d. Protocols of corrupting data
Ans : a) Identifying weakness in computer system or networks

12. Malicious users are also called as :


a. External attackers
b. Trusted users
c. hacker
d. Internal attackers
Ans : d) Internal attackers

13. How many steps are there the legality of ethical hacking ?
a. 5
b. 2
c. 7
d. 6
Ans : a) 5

14. What is PayPal ?


a. Pay through Pal
b. NetBanking
c. Payment Gateway
d. Information app
Ans : c) Payment Gateway

15. Hackers are also called as


a. Good Guys
b. Bad Guys
c. Both of the above
d. None of the above
Ans : b) Bad Guys
16. Ethical hackers are
a. Trained hackers
b. Related to ethical hacking
c. Bad guys
d. Good guys
Ans : a) Trained hackers

17. What is the required education to be an ethical hacker ?


a. Diploma holder
b. 10+2 passed
c. Bachelor’s degree in the related field
d. Nothing needed
Ans : c) Bachelor’s degree in related field

18. Which is not an Ethical Hacking related career


a. Back-End Developer
b. Software Tester
c. Software Developer
d. Computer Networking Specialist
Ans : a) Software Tester

19. Security tools that are widely used are :


a. Nmap
b. WebInspect
c. Network Strumbler
d. All of the above
Ans : d) All of the above

20. What is the full form of TCP :


a. Transmission Control Protocol
b. Transfer Control Protocol
c. Travel Control Protocol
d. Tracking Control Protocol
Ans : a) Transmission Control Protocol
MCQ’S

CHAPTER 6: Types of Hacking

11. Network Testing and port scanning tools are :


a. Sam Spade
b. SuperScan
c. NetScan
d. All of the above
Ans : d) All of the above

12. What is the full form of NIV Foundation?


a. Network Infrastructure Violation
b. Network Issue Vulnerabilities
c. Network Infrastructure Vulnerabilities
d. Network Information Vulnerabilities
Ans : c) Network Infrastructure Vulnerabilities

13. Number of Successful NetBIOS queries :


a. 5
b. 13
c. 12
d. 17
Ans : b) 13

14. What is the full form of UDP


a. Union Development Program
b. User Data Program
c. User Datagram Protocol
d. Unified Datagram Provider
Ans : c) User Datagram Protocol

15. What is Banner Grabbing ?


a. Act of capturing the information by banners
b. Grabbing Information
c. Information Sharing
d. Sharing Information
Ans : a) Act of capturing the information by banners
16. What is full form of MAC
a. Model Access Communication
b. Media Access Control
c. Multimedia Access Control
d. Modern Access Control
Ans : b) Media Access Control

17. Which IEEE standards specify the technologies for wireless LANs 802.11
a. IEEE 802.11
b. IEEE 802.10
c. IEEE 279.6
d. IEEE 275.4
Ans : a) 802.11

18. LINUX is an
a. Application
b. Software
c. Toolkit
d. Operating System
Ans : d) Operating System

19. Which of the following is an Email attack :


a. Hacking
b. Decrypting
c. Bomb
d. Banner
Ans : d) Banner

20. What is the full form of DMZ


a. Demilitarized Zone
b. Demonetized Zone
c. Demand Zone
d. Demoralized Zone
Ans : a) Demilitarized Zone
MCQ’s Question and Answers (the answers are highlighted in bold)

Q1.When the Federal Bureau of investigation was create ?.

A)1900 B)1980 C)19450 D)1984

Q2.What is The Full form of CART

A)Computer Analysis and Response Team B) Cathode Analog Ray Tube

C)Computer Accessories Repairing team D)None

Q3 When IOCE is Formed

A)1992 B)1980 C)19490 D)1995

Q4Full Form Of IOCE

A)International Organization on Computer Evidence B)Internet of Computer Education

C) Internet of Computer Evidence D)None

Q5When was the first FBI Regional Computer Forensic laboratory was Recognize ?.

A)1992 B)1980 C)19490 D)2000

Q6How Many Rules in Digital forensic

A)12 B)19 C)10 D)6

Q7 What is the Long form of DFI

A)Digital Forensic Investigation B)Digital Fraud Industry

C)Defining Form In D)None

Q8 How Many Phases in RDMDFR

A)12 B)19 C)10 D)6

Q9 Investigator should satisfy the following point:

A)Contribute to the society and human being B)Avoid harm to others

C)honest and trustworthy D)All Of the Above

Q10 Who proposed Road Map Model

A)G. Gunsh B)S. Ciardhuain C)J. Korn D)G. Palmar


Q11 Digital Evidence in the form of the:

A)Office File B)E-mail Messages C)Either A or B D)Both A and B

Q12 In Computer intrusions the attacker will be leave multiple traces of there presence in:

A)File System B)Registry C)System Logs D)All of the Above

Q13 What are the Form of Electronic Evidence:

A)Hard Drive B)E-mail C)Either A or B D)Both A and B

Q14 How Many Types of the Evidence

A)12 B)19 C)10 D)6

Q15 What is the full form of BPO

A)Business Process Outsourcing

Q16 The Digital evidence are used to established a credible link between……….

A)Attacker and victim and the crime scene B)Attacker And information

C)Either A or B D)Both A and B

Q17 The evidence and proof that can be obtained from the electronic source is called the…….

A)Digital Evidence B)Explainable evidence C)Either A or B D)Both A and B

Q18 Which of the following is not type of volatile evidence:

A)Routing Tables B) Main Memory C)Log Files D) Cached Data

Q19 Digital Evidence must follow the requirement of the

A)Ideal Evidence Rule B)Best Evidence Rule C)Exchange Rule D)All of the mentioned

Q20 White hat Hacker is known as the

A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Q21 What is an grey hat hacker

A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None

Q22 A Hacker who identifies and exploits weakness in telephones instead of computers is known as:

A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Q23 Long Form of the VPN

A)Virtual Private Network B)Virtual Personal Network C)Both D)None

Q24 Who are use their skill to identify security problem with computer network
A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Q25 To crack the password you need cracking tool such as:

A)LC4 B)John The Ripper C)pwdump D)All of the above

Q26 NMAP known as:

A)Network Mapper B)NetCat C)SuperScan D)NetScan

Q27 What is the most valuable assets of an organization

A)Information

Q28 What is the full form of SMTP

A)Simple mail Transfer Protocol

Q29 What is the full form of DNS

A)Domain Name System B)Simple mail Transfer Protocol

C)Internet Message Access Protocol D) Network Mapper

Q30 What is the full form of IMAP

A)Internet Message Access Protocol B)Simple mail Transfer Protocol

C)Internet Message Access Protocol D)None

Q31 What is the full form of SNMP

A)Simple Network Management Protocol

Q32 Which of the following used for the Network Testing and port scanning

A)NetCat B)SuperScan C)NetScan D)All of Above

Q33 The whole email server may be targeted for a complete interruption of services with these failure
like

A)Storage overload and bandwidth blocking

Q34 Which is the top most directory in the server file system

A)Root Directory
Q35 Which list is used in the authorization process

A)Access Control List

Q36 What is the latest version of UNIX

A)LINUX

Q37 Which OS is widely used in the world

A)Windows B)LINUX C)IOS D)NONE

Q38 Name of network analyzer which support windows and unix OS

A)Ethereal

Q39 You can grab banner by using

A)Telnet B)NetCat C)Either A or B D)Both A and B

Q40 An attacker can create an …………………………….. attack by sending hundreds or thousands of emails
with very large attachment

A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack

D)All of the Above


1. What is the first phase of hacking?

A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning

2. What type of ethical hack tests access to the physical infrastructure?

A. Internal network
B. Remote network
C. External network
D. Physical access

3. Which type of hacker represents the highest risk to your network?

A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies

4. Hacking for a cause is called __________________.

A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking

5. When a hacker attempts to attack a host via the Internet it is known as what
type of attack?

A. Remote attack
B. Physical access
C. Local access
D. Internal attack

6. Which are the four regional Internet registries?

A. APNIC, PICNIC, NANIC, RIPE NCC


B. APNIC, MOSTNIC, ARIN, RIPE NCC
C. APNIC, PICNIC, NANIC, ARIN
D. APNIC, LACNIC, ARIN, RIPE NCC

7.How does traceroute work?

A. It uses an ICMP destination-unreachable message to elicit the name of a router.


B. It sends a specially crafted IP packet to a router to locate the number of hops from the
sender to the destination network.
C. It uses a protocol that will be rejected by the gateway to determine the location.
D. It uses the TTL value in an ICMP message to determine the number of hops from the
sender to the router.

8. Nslookup can be used to gather information regarding which of the following?

A. Host names and IP addresses


B. Whois information
C. DNS server locations
D. Name server types and operating systems

9.What is it called when a hacker pretends to be a valid user on the system?

A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user

10.What is the best reason to implement a security policy?

A. It increases security.
B. It makes security harder to enforce.
C. It removes the employee’s responsibility to make judgments.
D. It decreases security.
Chapter No 3 : Basics Of Digital Forensic

1. What is Digital Forensic?

A. Process of using scientific knowledge in analysis and presentation of evidence in


court

B. The application of computer science and investigative procedures for a legal


purpose involving the analysis of digital evidence after proper search authority,
chain of custody, validation with mathematics, use of validated tools,
repeatability, reporting, and possible expert presentation

C. A process where we develop and test hypotheses that answer questions about
digital events

D. Use of science or technology in the investigation and establishment of the facts or


evidence in a court of law

2. Does database forensic include in Digital Forensic application

A. True

B. False

3. Which of the following is NOT focus of digital forensic analysis?

A. Authenticity

B. Comparison

C. Proving

D. Enhancement

4. Which of the following represents the step of scientific methodI- Develop hypothesis
based on evidenceII- Calculate hash value of evidenceIII- Test the hypothesis to look for
additional evidence IV-make an imaging of the original evidence

A. All above

B. I and III

C. II and IV

D. II, III and IV


5. What is the Primary Objectives of Digital Forensic for Business and Industry

A. Availability of service

B. Continuity of operation

C. Prosecution

D. Security

6. Which of the following hold the highest value of evidence in the court?

A. Documentary

B. Demonstrative

C. Testimonial

D. Real

7. Which of the following is FALSE

A. The digital forensic investigator must maintain absolute objectivity

B. It is the investigator’s job to determine someone’s guilt or innocence.

C. It is the investigator’s responsibility to accurately report the relevant facts of a


case.

D. The investigator must maintain strict confidentiality, discussing the results of an


investigation on only a “need to know” ba

8. ____ is a written list of objections to certain testimony or exhibits.

a.Defendant

b.Empanelling the jury

c.Plaintiff

d.Motion in limine
9. Attorneys can now submit documents electronically in many courts; the standard format
in federal courts is ____.

a. Microsoft Word (DOC)

b. Portable Document Format (PDF)

c. Encapsulated Postscript (EPS)

d. Postscript (PS)

10. A(n) ____is a document that lets you know what questions to expect when you are
testifying.

a.written report

b.affidavit

c.examination plan

d.subpoena

Chapter No 4 : Digital Evidences

1. A valid definition of digital evidence is:

a. Data stored or transmitted using a computer

b. Information of probative value

c. Digital data of probative value

d. Any digital evidence on a computer


2. What are the three general categories of computer systems that can contain digital

evidence?

a. Desktop, laptop, server

b. Personal computer, Internet, mobile telephone

c. Hardware, software, networks

d. Open computer systems, communication systems, embedded systems

3. In terms of digital evidence, a hard drive is an example of:

a. Open computer systems

b. Communication systems

c. Embedded computer systems

d. None of the above

4. In terms of digital evidence, a mobile telephone is an example of:

a. Open computer systems

b. Communication systems

c. Embedded computer systems

d. None of the above

5. In terms of digital evidence, a Smart Card is an example of:

a. Open computer systems

b. Communication systems

c. Embedded computer systems

d. None of the above


6. In terms of digital evidence, the Internet is an example of:

a. Open computer systems

b. Communication systems

c. Embedded computer systems

d. None of the above

7. Computers can be involved in which of the following types of crime?

a. Homicide and sexual assault

b. Computer intrusions and intellectual property theft

c. Civil disputes

d. All of the above

8. A logon record tells us that, at a specific time:

a. An unknown person logged into the system using the account

b. The owner of a specific account logged into the system

c. The account was used to log into the system

d. None of the above

9. Cybertrails are advantageous because:

a. They are not connected to the physical world.

b. Nobody can be harmed by crime on the Internet.

c. They are easy to follow.

d. Offenders who are unaware of them leave behind more clues than they otherwise

would have.
10. Private networks can be a richer source of evidence than the Internet because:

a. They retain data for longer periods of time.

b. Owners of private networks are more cooperative with law enforcement.

c. Private networks contain a higher concentration of digital evidence.

d. All of the above.

Chapter No 5 : Basics of hacking

1. What is the ethics behind training how to hack a system?


a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware

2. Performing a shoulder surfing in order to check other’s password is ____________ ethical


practice.
a) a good
b) not so good
c) very good social engineering practice
d) a bad

3. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms

4. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False

5. _____________ is the technique used in business organizations and firms to protect IT


assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach

6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking

7. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm

8. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False

9. After performing ____________ the ethical hacker should never disclose client information
to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting

10. __________ is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking

1.In terms of digital evidence, the Internet is an example of:


a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above
2. Computers can be involved in which of the following types of crime?
a. Homicide and sexual assault
b. Computer intrusions and intellectual property theft
c. Civil disputes
d. All of the above

4. What are the three general categories of computer systems that can contain digital
evidence?
a. Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems

5. In terms of digital evidence, a hard drive is an example of:


a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above

7. Computers can be involved in which of the following types of crime?


a. Homicide and sexual assault
b. Computer intrusions and intellectual property theft
c. Civil disputes

d. All of the above

8. A logon record tells us that, at a specific time:


a. An unknown person logged into the system using the account
b. The owner of a specific account logged into the system

c. The account was used to log into the system


d. None of the above

9. Cybertrails are advantageous because:


a. They are not connected to the physical world.
b. Nobody can be harmed by crime on the Internet.
c. They are easy to follow.
d. Offenders who are unaware of them leave behind more clues than they otherwise would
have.
MULTIPLE CHOICE QUESTIONS

Chapter 1- Artificial Intelligence

1. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.

A. Heuristic
B. Critical

C. Value based
D. Analytical

Ans: A

2. ______ do not guarantee optimal/any solutions


A. Heuristic
B. Critical
C. Value based
D. Analytical

Ans: A

3. Cognitive science related with _____


A. Act like human

B. ELIZA

C. Think like human


D. None of above

Ans: C

4. _____ Model should reflect how results were


obtained. A. Design model

B. Logic model

C. Computational model
D. None of above

Ans: C
5. Communication between man and machine is related with ______

A. LISP B.
ELIZA

C. All of above D.
None of above

Ans: B

6. ELIZA created by _____


A. John McCarthy

B. Steve Russell

C. Alain Colmerauer

D. Joseph Weizenbaum

Ans: D
7. The concept derived from ________ level are propositional logic, tautology,
predicate calculus, model, temporal logic.

A. Cognition level
B. Logic level

C. Functional level
D. All of above

Ans: B

8. PROLOG is an AI programming language which solves problems with a form of symbolic


logic known as ______.

A. Propositional logic
B. Tautology

C. Predicate calculus
D. Temporal logic

Ans: C

9. The ____ level contains constituents at the third level which are knowledge based
system, heuristic search, automatic theorem proving, multi-agent system.

A. Cognition level
B. Gross level

C. Functional level
D. All of above

Ans: B

10. PROLOG, LISP, NLP are the language of ____

B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A

11. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.

A. LISP B.
ELIZA C.
PROLOG D.
NLP

Ans: A
Chapter-2 Internet of Things

1. MQTT stands for _____________

A. MQ Telemetry Things

B. MQ Transport Telemetry

C. MQ Transport Things

D. MQ Telemetry Transport

Ans: D

2. MQTT is better than HTTP for sending and receiving data.


A. True

B. False

Ans: A

3. MQTT is _________ protocol.


A. Machine to Machine

B. Internet of Things

C. Machine to Machine and Internet of


Things D. Machine Things

Ans: C

4. Which protocol is lightweight?


A. MQTT
B. HTTP
C. CoAP
D. SPI

Ans: A
5. MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above

Ans: B

6. XMPP is used for streaming which type of elements?


A. XPL

B. XML
C. XHL
D. MPL

Ans: B

7. XMPP creates _________ identity.


A. Device
B. Email
C. Message
D. Data

Ans: A

8. XMPP uses ________ architecture.


A. Decentralized client-server

B. Centralized client-server
C. Message

D. Public/subscriber

Ans: A
9. What does HTTP do?

A. Enables network resources and reduces perception of latency


B. Reduces perception of latency and allows multiple concurrency exchange
C. Allows multiple concurrent exchange and enables network resources

D. Enables network resources and reduces perception of latency and Allows multiple
concurrent exchange.

Ans: D

10. HTTP expands?


A. Hyper Text Transfer Protocol

B. Hyper Terminal Transfer Protocol


C. Hyper Text Terminal Protocol
D. Hyper Terminal Text Protocol

Ans: A
Chapter-3 Basics of Digital Forensics

1. Which of following are Unethical norms for Investigator?


A. Uphold any relevant evidence.

B. Declare any confidential matters or knowledge.


C. Distort or falsify education, training, credentials.
D. All of above

E. None of above

Ans: D

2. Which of following is not general ethical norm for


Investigator? A. To contribute to society and human being.

B. Uphold any relevant Evidence.


C. To be honest and trustworthy.
D. To honor confidentially.

Ans: B

3. Which of following is a not unethical norm for Digital Forensics Investigation?


A. Uphold any relevant evidence.

B. Declare any confidential matters or knowledge.


C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.

Ans: D
4. What is called as the process of creation a duplicate of digital media for purpose
of examining it?

A. Acquisition.

B. Steganography.
C. Live analysis

D. Hashing.

Ans: A

5. Which term refers for modifying a computer in a way which was not originally intended
to view Information?

A. Metadata

B. Live analysis
C. Hacking

D. Bit Copy

Ans: C

6. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called?

A.Robotis

C.ComputerForenss
D.Animation

Ans: C

7. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM

C. ROM.
D.EMMC chip
Ans: D
Using what, data hiding in encrypted images be carried out in digital forensics?

A. Acquisition.

B.Steganogrhy. C.
Liveanalysis

D. Hashing.

And: B

Which of this is not a computer crime?

C. Sabotage.
D. Identification of data

Ans. D

Which file is used to store the user entered password?

A. .exe
B. .txt
C. .iso
D. .asm

Ans: D
Chapter-4 DIGITAL EVIDENCE

1. A Valid Definition of Digital Evidence is


a. Data Stored or transmitted using a computer
b. Information of Probative value
c. Digital dada of probative Value
d. Any digital evidence on computer

2. In term of Digital evidence, a hard drive is example.of


a. Open Computer System
b. Communication System
c. Embedded Computer System
d. None of the Above

3. In term of Digital evidence, a mobile telephone is an example.of


a. Open Computer System
b. Communication System
c. Embedded Computer System
d. None of the Above

4. In term of Digital evidence, the internet is an example of


a. Open computer System
b. Communication System
c. Embedded Computer System
d. None of the above

5. Digital Evidence is only useful in court of law


a. True
b. False

6. Video Surveillance can be form of Digital evidence


a. True
b. False

7. Computer Can be Involved in which of the following types of crime


a. Homicide and sexual Assault
b. Computer intrusions and intellectual property theft
c. Civil disputes
d. All of the above
8. A logon record tells us that, at a specific time:
a. An unknown person logged into the system using the account
b. The owner of a specific account logged into the system
c. The account was used to log into the system
d. None of the above

9. Private networks can be a richer source of evidence than the Internet because:
a. They retain data for longer periods of time.
b. Owners of private networks are more cooperative with law enforcement.
c. Private networks contain a higher concentration of digital evidence.
d. All of the above

10. Digital evidence can be duplicated exactly without any changes to the original data.
a. True
b. False

Chapter-5 Basics of Hacking

1. Which of the following statements best describes a white-hat hacker?

A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
2. What is the first phase of hacking?

A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
3. What type of ethical hack tests access to the physical infrastructure?

A. Internal network
B. Remote network
C. External network
D. Physical access

4. Which type of hacker represents the highest risk to your network?

A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
5. Hacking for a cause is called __________________

A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking

6. Which federal law is most commonly used to prosecute hackers?

A. Title 12
B. Title 18
C. Title 20
D. Title 2

8. port number does FTP use?

A. 21
B. 25
C. 23
D. 80
9. What is the primary goal of an Ethical Hacker?
a. Avoiding Detection
b. Determining return on investment (ROI) for security measure
c. Resolving security vulnerabilities
d. Testing Security Controls

10. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
a) True
b) False

Chapter-6 Types Of Hacking

1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to
crack a system are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers

2. Which is the legal form of hacking based on which jobs are provided in IT industries
and firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism

3. They are nefarious hackers, and their main motive is to gain financial profit by doing
cyber crimes. Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers

4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
5. The amateur or newbie in the field of hacking who don’t have many skills about
coding and in-depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers

6. Criminal minded individuals who work for terrorist organizations and steal
information of nations and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers

7. These types of hackers are the most skilled hackers in the hackers’ community. Who
are “they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers

8. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor

9. Governments hired some highly skilled hackers. These types of hackers are termed
as _______
a) Special Hackers
b) Government Hackers
c) Cyber Intelligence Agents
d) Nation / State sponsored hackers

10. __________ security consultants uses database security monitoring & scanning
tools to maintain security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
ETI 22618 Question Bank

Question Bank (I scheme)


Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS

Chapter 1- Artificial Intelligence


1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
5. What of the following is considered to be a pivotal event in the history of AI.
A. 1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
Ans: C
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B
7. The field that investigates the mechanics of human intelligence is:
A. History
B. cognitive science
C. psychology
D. sociology
E. None of the above
Ans: B
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
9. The first AI programming language was called:
A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above
Ans:
10. What is Artificial intelligence?
A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Putting more memory into Computer
Ans: C
11. Who is a father of AI?
A. Alain Colmerauer
B. John McCarthy
C. Nicklaus Wirth
D. Seymour Papert
Ans: B
12. Artificial Intelligence has its expansion in the following application.
A. Planning and Scheduling
B. Game Playing
C. Robotics
D. All of the above
Ans: D
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
14. The first AI programming language was called:
A. BASIC
B. FORTRAN
C. IPL
D. LISP
Ans:
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
21. ______ do not guarantee optimal/any solutions
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
22. Cognitive science related with _____
A. Act like human
B. ELIZA
C. Think like human
D. None of above
Ans: C
23. _____ Model should reflect how results were obtained.
A. Design model
B. Logic model
C. Computational model
D. None of above
Ans: C
24. Communication between man and machine is related with ______
A. LISP
B. ELIZA
C. All of above
D. None of above
Ans: B
25. ELIZA created by _____
A. John McCarthy
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
29. PROLOG, LISP, NLP are the language of ____
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
33. The core components are constituents of AI are derived from
A. Concept of logic
B. Cognition
C. Computation
D. All of above
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Gramma
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
40. Human to Machine is _____ and Machine to Machine is ______.
A. Process, Process
B. Process, Program
C. Program, Hardware
D. Program, Program
Ans: C
41. Weak AI is also known as ____
A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A
42. _____ AI is able to perform dedicated task.
A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A
43. Narrow AI is performs multiple task at a time.
A. True
B. False
Ans: B
44. Weak AI is____________
A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: C
45. Strong AI is__________
A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: A
46. Artificial intelligence is___________
A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: D
47. Apple siri is a good example of ______ AI.
A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A
48. IBM Watson supercomputer comes under ____ AI.
A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
55. ____ AI is hypothetical concept of AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
58. IBM’s deep blue system is example of ___.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
59. Google Alpha Go is example of ____.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B
61. Self-driving car is example of ____.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B [Car stores recent speed of nearby cars, distance of others car, speed limit, other
information to navigate the road]
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
63. Which machines will be smarter than human mind?
A. Reactive machine
B. Limited memory
C. Theory of mind
D. Self-Awareness
Ans: D
64. _________machines will have their own consciousness and sentiments
A. Reactive machine
B. Theory of mind
C. Self-Awareness
D. Both B & C
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
66. What is Machine learning?
A. The autonomous acquisition of knowledge through the use of computer programs
B. The autonomous acquisition of knowledge through the use of manual programs
C. The selective acquisition of knowledge through the use of computer programs
D. The selective acquisition of knowledge through the use of manual programs
Ans: A
67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
71. Machine learning invent by _____.
A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizenbaum
D. Arthur Samuel
Ans: D

Chapter-2 Internet of Things


1. Embedded systems are_____
A. General purpose
B. Special purpose
Ans: B
2. Embedded system is______
A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Ans: D
3. Which of the following is not true about embedded systems?
A. Built around specialized hardware
B. Always contain an operating system
C. Execution behavior may be deterministic
D. All of these
E. None of these
Ans: E
4. Which of the following is not an example of a “small-scale embedded system”?
A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C
5. The first recognized modern embedded system is
A. Apple computer
B. Apollo Guidance Computer (AGC)
C. Calculator
D. Radio navigation system
Ans: B
6. The first mass produced embedded system is
A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Ans: C
7. Which of the following is an (are) an intended purpose(s) of embedded systems?
A. Data collection
B. Data processing
C. Data communication
D. All of these
E. None of these
Ans: D
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
12. The instruction set of RISC processor is
A. Simple and lesser in number
B. Complex and lesser in number
C. Simple and larger in number
D. Complex and larger in number
Ans: A
13. Which of the following is true about CISC processors?
A. The instruction set is non-orthogonal
B. The number of general purpose registers is limited
C. Instructions are like macros in c language
D. Variable length instructions
E. All of these
F. None of these
Ans: E
14. Main processor chip in computers is_______
A. ASIC
B. ASSP
C. CPU
D. CPLD
Ans: C
15. Processors used in many microcontroller products need to be______
A. high power
B. low power
C. low interrupt response
D. low code density
Ans: B
16. In microcontrollers, UART is acronym of_____
A. Universal Applied Receiver/Transmitter
B. Universal Asynchronous Rectified Transmitter
C. Universal Asynchronous Receiver/Transmitter
D. United Asynchronous Receiver/Transmitter
Ans: C
17. Which architecture is followed by general purpose microprocessors?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: B
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
20. Harvard architecture allows:
A. Separate program and data memory
B. Pipe-ling
C. Complex architecture
D. All of the mentioned
Ans: D
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
22. Which of the following is an example for wireless communication interface?
A. RS-232C
B. Wi-Fi
C. Bluetooth
D. EEE1394
E. Both (B) and (C)
Ans: E
23. ARM stands for _________
A. Advanced RISC Machine
B. Advanced RISC Methodology
C. Advanced Reduced Machine
D. Advanced Reduced Methodology
Ans: A
24. What is the processor used by ARM7?
A. 8-bit CISC
B. 8-bit RISC
C. 32-bit CISC
D. 32-bit RISC
Ans: D
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
26. ARM processors where basically designed for _______
A. Main frame systems
B. Distributed systems
C. Mobile systems
D. Super computers
Ans: C
27. ASIC chip is
A. Simple in design.
B. Manufacturing time is less.
C. It is faster.
D. Both A&C.
Ans: C
28. ASIC stands for
A. Application-System Integrated Circuits
B. Application-Specific Integrated Circuits
C. Application-System Internal Circuits
D. Application-Specific Internal Circuits
Ans: B
29. In microcontrollers, I2C stands for
A. Inter-Integrated Clock
B. Initial-Integrated Clock
C. Intel-Integrated Circuit
D. Inter-Integrated Circuit
Ans: D
30. ______________ is the smallest microcontrollers which can be programmed to perform a
large range of tasks.
A. PIC microcontrollers
B. ARM microcontrollers
C. AVR microcontrollers
D. ASIC microcontrollers
Ans: - A
31. _______________ was developed in the year 1996 by ATMEL Corporation
A. PIC
B. AVR
C. ARM
D. ASIC
Ans: - B
32. AVR stands for_____________________.
A. Advanced Virtual RISC.
B. Alf-Egil Bogen and Vegard Wollan RISC
C. Both A & B
D. None of the above
Ans: - C
33. AVR microcontroller executes most of the instruction in _________________.
A. Single execution cycle.
B. Double execution cycle.
C. Both A& B
D. None of the above.
Ans: - A
34. Term "the Internet of things" was coined by
A. Edward L. Schneider
B. Kevin Ashton
C. John H.
D. Charles Anthony
Ans: B
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
36. What does “Things” in IoT refers to?
A. General device
B. Information
C. IoT devices
D. Object
Ans: C
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
39 _____ devices may support a number of interoperable communication protocols and
communicate with other device and also with infrastructure.
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. None of above
Ans: C
40. Which one is not element of IOT?
A. Process
B. People
C. Security
D. Things
Ans:C
41. IIOT stands for
A. Information Internet of Things
B. Industrial Internet of Things
C. Inovative Internet of Things
D. None of above
Ans:B
42. Name of the IOT device which is first recognized?
A. Smart Watch
B. internet toaster
C. smart mobile
D. fitness tracker
Ans: B
43. _____ is used by IOT
A. Radio information technology
B. Satellite
C. Cable
D. Broadband
Ans:A
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
47. The sensed data communicated ___________________.
A. Cloud-based servers/storage.
B. I/O interfaces.
C. Internet connectivity.
D. None of the above
Ans: - A
48. IOT devices are various types, for instance______________.
A. Wearable sensors.
B. Smart watches.
C. LED lights.
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
50.______ is a collection of WLAN communication standards.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:B
51. ____ is a collection of wireless broadband standards (WiMax).
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:C
52 ___ is a collection of standards for LR-WPANs.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:D
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
54. ______ includes GSM and CDMA.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:A
55. ______include UMTS and CDMA2000.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:B
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
62. 6LOWPAN stands for
A. 6 LOW Personal Area Network
B. IPv6 LOW Personal Area Network
C. IPv6 over Low power wireless personal area network
D. None of above
Ans:C
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
64. IEEE 802.11 standards provide data rates ______________
A. 10 Gbit/s.
B. 1 Gbit/s
C. 1 Mb/s to up to 6.75 Gb/s
D. 250 Kb/s
Ans: - C
65. ________ of the following is a protocol related to IOT
A. Zigbee
B. 6LoWPAN
C. CoAP
D. All of the above
Ans: C

66. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer
D. None of the above.
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D
70. What is size of the IPv6 Address?
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Ans: C
71. MQTT stands for _____________
A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A

73. MQTT is _________ protocol.


A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
74. Which protocol is lightweight?
A. MQTT
B. HTTP
C. CoAP
D. SPI
Ans: A
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
76. XMPP is used for streaming which type of elements?
A. XPL
B. XML
C. XHL
D. MPL
Ans: B
77. XMPP creates _________ identity.
A. Device
B. Email
C. Message
D. Data
Ans: A
78. XMPP uses ________ architecture.
A. Decentralized client-server
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
79. What does HTTP do?
A. Enables network resources and reduces perception of latency
B. Reduces perception of latency and allows multiple concurrency exchange
C. Allows multiple concurrent exchange and enables network resources
D. Enables network resources and reduces perception of latency and Allows multiple concurrent
exchange.
Ans: D

80. HTTP expands?


A. Hyper Text Transfer Protocol
B. Hyper Terminal Transfer Protocol
C. Hyper Text Terminal Protocol
D. Hyper Terminal Text Protocol
Ans: A
81. CoAP is specialized in ___________
A. Internet applications
B. Device applications
C. Wireless applications
D. Wired applications
Ans: A
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
83. Data in network layer is transferred in the form of ____________
A. Layers
B. Packets
C. Bytes
D. Bits
Ans:B
84. Services provided by application layer?
A. Web chat
B. Error control
C. Connection services
D. Congestion control
Ans: A
85. TCP and UDP are called?
A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
Ans: C
86. Security based connection is provided by which layer?
A. Application layer
B. Transport layer
C. Session layer
D. Network layer
Ans: D
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A
88. Transport layer receives data in the form of?
A. Packets
B. Byte streams
C. Bits stream
D. both packet and Byte stream
Ans: B
89. The network layer is considered as the _______?
A. Backbone
B. packets
C. Bytes
D. bits
Ans: A
90. The network layer consists of which hardware devices?
A. Router
B. Bridges
C. Switches
D. All of the above
Ans: D
91. Network layer protocol exits in_____?
A. Host
B. Switches
C. Packets
D. Bridges
Ans: A
92. Which protocol has a quality of service?
A. XMPP
B. HTTP
C. CoAP
D. MQTT
Ans: A
93. _____ is a data-centric middleware standard for device-to-device and machine-to-machine
communication.
A. Data Distribution Serviced (DDS)
B. Advance Message Queuing Protocol (AMQP)
C. Extensible Messaging and Presence Protocol (XMPP)
D. Message Queue Telemetry Transport (MQTT)
Ans:A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
96. Which is not an IoT communication model.
A. Request-Response
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair
Ans: C
97. In Node MCU, MCU stands for_____.
A. Micro Control Unit
B. Micro Controller Unit
C. Macro Control Unit
D. Macro Controller Unit
Ans: B
98. REST is acronym for________
A. Representational State Transfer
B. Represent State Transfer
C. Representational State Transmit
D. Representational Store Transfer
Ans: A
99. WSN stands for
A. Wide Sensor Network
B. Wireless Sensor Network
C. Wired Sensor Network
D. None of these
Ans: B
100. Benefit of cloud computing services
A. Fast
B. Anywhere access
C. Higher utilization
D. All of the above
Ans: D

101. PaaS stands for_____


A. Platform as a Service
B. Platform as a Survey
C. People as a Service
D. Platform as a Survey
Ans: A
102. _________ as a Service is a cloud computing infrastructure that creates a development
environment upon which applications may be build.
A. Infrastructure
B. Service
C. Platform
D. All of the mentioned
Ans:C
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
106._________ is the most refined and restrictive service model.
A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
Ans.C
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
109. Zigbee specification are based on ______.
A. 802.3
B. 802.11
C. 802.16
D. 802.15.4
Ans:D
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
112. Does Raspberry Pi need external hardware?
A. True
B. False
Ans.B
113. Does RPi have an internal memory?
A. True
B. False
Ans.A
114. What do we use to connect TV to RPi?
A. Male HDMI
B. Female HDMI
C. Male HDMI and Adapter
D. Female HDMI and Adapter
Ans.C
115. How power supply is done to RPi?
A. USB connection
B. Internal battery
C. Charger
D. Adapter
Ans.A
116. What is the Ethernet/LAN cable used in RPi?
A.Cat5
B.at5e
C. cat6
D . RJ45
Ans.D
117. Which instruction set architecture is used in Raspberry Pi?
A. X86
B. MSP
C. AVR
D. ARM
Ans: D
118. Does micro SD card present in all modules?
A. True
B. False
Ans: A
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
120. ________ empowers IoT by bringing together everyday objects.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: B
121. The collection of data is achieved with ________ changes.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: C
122. The number of devices that need to be managed and that communicate with each other will
be much larger.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: D

130. Accelerometer sensors are used in______


A. Smartphones
B. Aircrafts
C. Both
D. None of above
Ans: C
131. Image sensors are found in_______
A. Cameras
B. Night-vision equipment
C. Sonars
D. All of above
Ans: D
132. Gas sensors are used to detect _____gases.
A. Toxic
B. Natural
C. Oxygen
D. Hydrogen
Ans: A
133. Properties of Arduino are:
A. Inexpensive
B. Independent
C. Simple
D. both A and C
Ans: D
134. Properties of IoT devices.
A. Sense
B. Send and receive data
C. Both A and B
D. None of above
Ans: C
135. IoT devices are ____
A. Standard
B. Non-standard
C. Both
D. None
Ans: B
136. What is the microcontroller used in Arduino UNO?
A. ATmega328p
B. ATmega2560
C. ATmega32114
D. AT91SAM3x8E
Ans: A
137. ___ is an open source electronic platform based on easy to used hardware and software.
A. Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A
138 ____ is used latching, locking, triggering.
A. Solenoid
B. Relay
C. Linear Actuator
D. Servo motors
Ans:A
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B
141. The measurement of humidity is
A. RH
B. PH
C. IC
D. None of aboved
Ans:A
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
143 ____ sensor measure heat emitted by objects.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:C
IOT
1. IIoT stands for __________

a) Industrial Internet of Things

b) Internet Internet of Things

c) Intelligence Internet of Things

d) Internal Internet of Things

View Answer

Answer: a
Explanation: Industrial Internet of Things (IIoT) is the subset of IoT that associates itself with connected manufacturing
operations to design and craft products and services.

2. IIoT is sophisticated.

a) True

b) False

View Answer

Answer: b
Explanation: Using IIoT, the previous labor intensive, time consuming technique can be substituted with vibrant,
sophisticated, and automated mechanisms.
3. What does design provide?

a) Technology

b) Ecosystem

c) Technology and ecosystem

d) Digital revolution

View Answer

Answer: c
Explanation: Design not only provides the framework for how technology works and how it’s used but also places it in a
broader context that includes the total ecosystem with which it interacts and the possibility of unintended consequences.

4. Which possibility ensures load balancing and peak levelling of energy consumption?

a) Transportation and logistics

b) Energy and utilities

c) Automotive

d) Connected supply chain

View Answer

Answer: b
Explanation: Energy and utilities: A network of smart grids, smart meters and devices continuously communicate with each
other to ensure load balancing and peak levelling of energy consumption, down to the device level.
5. Which possibility automatically communicates with other vehicles?

a) Transportation and logistics

b) Energy and utilities

c) Automotive

d) Connected supply chain

View Answer

Answer: c
Explanation: Automotive: Within the automotive space, the connected car concept is a game changer. New models
continuously generate data when in operation.
6. Which possibility connects the production line to suppliers?

a) Transportation and logistics

b) Energy and utilities

c) Automotive

d) Connected supply chain

View Answer

Answer: d
Explanation: Connected supply chain: By connecting the production line to suppliers, all stakeholders can understand
interdependencies, the flow of material and process cycle times.
7. Which possibility provides inter connectivity between shop floor and top floor?

a) Transportation and logistics

b) Energy and utilities

c) Plant control flow operation

d) Connected supply chain

View Answer

Answer: c
Explanation: Plant control flow operation: The IoT data network provides inter connectivity between shop floor and top floor,
which enables the automation of specific process and reduces the human intervention required to address issues.

8. Which possibility is the highest contributor to cost overhead for manufacturing facilities?

a) Transportation and logistics

b) Energy and utilities

c) Plant control flow operation

d) Energy management and resource optimization

View Answer

Answer: d
Explanation: Energy management and resource optimization: Energy is among the highest contributor to cost overhead for
manufacturing facilities.

1. Term "the Internet of things" was coined by

a) Edward L. Schneider

b) Kevin Ashton

c) John H.

d) Charles Anthony

2. The huge numbers of devices connected to the Internet of Things have to communicate

automatically, not via humans, what is this called?

a) Bot to Bot(B2B)

b) Machine to Machine(M2M)

c) InterCloud

d) Skynet

3. What does “Things” in IoT refers to?

a) General device

b) Information

c) IoT devices
d) Object

4. Interconnection of Internet and computing devices embedded in everyday objects, enabling

them to send and receive data is called_____________

a) Internet of Things

b) Network Interconnection

c) Object Determination

d) None of these

5. _____________ is a computing concept that describes the idea of everyday physical objects

being connected to the internet.

a) IOT (Internet of Things)

b) MQTT

c) COAP

d) SPI

6 _____ devices may support a number of interoperable communication protocols and

communicate with other device and also with infrastructure.

a) Artificial Intelligence

b) Machine Learning

c) Internet of Things

d) None of above

7. Which one is not element of IOT?

a) Process

b) People

c) Security

d) Things

8. IIOT stands for

a) Information Internet of Things

b) Industrial Internet of Things

c) Inovative Internet of Things

d) None of above

9. Name of the IOT device which is first recognized?

a) Smart Watch

b) ATM

c) Radio

d) Video Game

10. _____ is used by IOT

a) Radio information technology

b) Satellite

c) Cable

d) Broadband

11. _____________ refers to establish a proper connection between all the things of IOT.

a) Connectivity

b) Analyzing
c) Sensing

d) Active Engagement

12. IOT devices which have unique identities and can perform _____________

a) Remote sensing

b) Actuating

c) Monitoring capabilities

d) All of the above

13. The sensed data communicated ___________________.

a) Cloud-based servers/storage.

b) I/O interfaces.

c) Internet connectivity.

d) None of the above

14. IOT devices are various types, for instance______________.

a) Wearable sensors.

b) Smart watches.

c) LED lights.

d) All of the above

15. Properties of IoT devices.

a) Sense

b) Send and receive data

c) Both a and b

d) None of above

16. IoT devices are ____

a) Standard

b) Non-standard

c) Both

d) None

17. _____________ layer protocols determine how the data is physically sent over the network’s

physical layer or medium.

a) Application layer

b) Transport layer

c) Network layer

d) Link layer

18 _______ layer is responsible for sending of IP datagrams from the source network to the

destination network.

a) Application layer

b) Transport layer

c) Network layer

d) Link layer

19. ___ layer perform the host addressing and packet routing.

a) Application layer

b) Transport layer
c) Network layer

d) Link layer

20. _________layer is responsible for error free, end to end delivery of data from source host to

destination host.

a) Application layer

b) Transport layer

c) Network layer

d) Link layer

21. The _______ protocols that focus on process to process connections using ports

a) Application layer

b) Transport layer

c) Network layer

d) Link layer

22. 6LOWPAN stands for

a) 6 LOW Personal Area Network

b) IPv6 LOW Personal Area Network

c) IPv6 over Low power wireless personal area network

d) None of above

23. ______________ is a collection of wired Ethernet standard for the link layer.

a) IEEE 802.3

b) IEEE 802.11

c) IEEE 802.16

d) IEEE 802.15.4

24______ is a collection of WLAN communication standards.

a) IEEE 802.3

b) IEEE 802.11

c) IEEE 802.16

d) IEEE 802.15.4

25. ____ is a collection of wireless broadband standards (WiMax).

a) IEEE 802.3

b) IEEE 802.11

c) IEEE 802.16

d) IEEE 802.15.4

26 ______ is a collection of standards for LR-WPANs.

a) IEEE 802.3

b) IEEE 802.11

c) IEEE 802.16

d) IEEE 802.15.4

27. LR-WPANs standards from basis of specifications for high level communication protocol

such as ___.

a) Zigbee

b) Allsean
c) Tyrell

d) Microsoft's Azure

28. ______ includes GSM and CDMA.

a) 2G

b) 3G

c) 4G

) None of above

29. ______include UMTS and CDMA2000.

a) 2G

b) 3G

c) 4G

d) None of above

30 ______include LTE.

a) 2G

b) 3G

c) 4G

d) None of above

31. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.

a) Twisted pair cable

b) Coaxial cable

c) Fiber optic cable

d) None of the above

32. IEEE 802.11 standards provide data rates ______________

a) 10 Gbit/s.

b) 1 Gbit/s

c) 1 Mb/s to up to 6.75 Gb/s

d) 250 Kb/s

33. _______________ is useful for time-sensitive application that have very small data units to

exchange and do not want the overhead of connection setup.

a) TCP

b) UDP

c) Transport layer

d) None of the above.

35. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP

resources.

a) HTTP

b) COAP

c) WebSocket

d) MQTT

37. Which one out of these is not a data link layer technology?

a) Bluetooth

b) UART

c) Wi-Fi
d) HTTP

38. What is size of the IPv6 Address?

a) 32 bits

b) 64 bits

c) 128 bits

d) 256 bits

39.What role of the cloud in smart grid architecture is?

Collect data

Manage data

security

store data

Explanation: B) Role of the cloud in smart grid architecture is to manage data.

40.Through which network does Open IoT manage registration, deployment of sensors?

LSM
HTTP
X-GSN
GSN
Explanation: C) Open IoT manages registration, deployment of sensors through X-GSN.

41.Identify the java extension file in IoT.


.c
.py
. exe
. jar
Explanation: D) .jar is the java extension file in IoT.

42.Total types of voice communications in IoT environment is?


1
2
3
4
Explanation: C) Total types of voice communications in IoT environment is 3.

43. The standard length of the MAC address is


16 bits
48 bits
32 bits
8 bits
Explanation: B) Standard length of MAC address is 48 bits.
6
44. VNC stands for _________
Virtual network communication
Virtual network computing
Virtual network computers
None
Explanation: B) VNC stands for Virtual network computing

Identify the language preferred for IoT analytics.


python
html
php
c++
Explanation: A) Python is preferred for IoT analytics.

Who operates the core element?


PaaS
IaaS
IOT service provider
SaaS
Explanation: C) IoT service provider operates the core element.

Identify the incorrect advantage of IoT.


Reduce waste
Enhanced data collection
Improve customer engagement
Security
Explanation: D) Security is not an advantage of IoT.

Who coined the term IoT?


IBM
Kevin Ashton
Ross Ihaka
Guido van Rossum
Explanation: B) Kevin Ashton coined the term IoT.

Service is termed as ____, in SOA


Network service
Software service
Business service
Developer service
Explanation: C) In SOA, service is termed as business service.
12
Through API, _____ service portability is enabled.
device
network
services
systems
Explanation: D) Through API, systems service portability is enabled.

Identify the challenge coming under securing the information.


security
Power consumption
presece detection
signaling
Explanation: C) Presence detection comes under securing the information.

Full form of SBC is?


Standard business center
Smart business center
Standard building center
Smart building center
Explanation: B) SBC stands for Smart business center.

Total types in which IoT platform is divided.


4
3
5
2
Explanation: A) IoT platform is divided into 4 types.

ITS stands for _________


Internet travel services
Intelligent transportation security
Intelligent transportation services
Internet transport security
Explanation: C) Intelligent transportation services

Which of the following allows to monitor the application


boot
hypermedia
actuators
endpoints
Explanation: D) Endpoints allow us to monitor the application.

In which of the following terms in resolution expressed?


bits
bytes
nibble
word
Explanation: A) Resolution is expressed in terms of bits.

SLA stands for _________


System local area
Service local area
System-level argument
Service level argument
Explanation: D) SLA stands for Service level argument.

Identify the last step of reliable data transfer.


Selective recovery
Lost message detection
Message relaying
Initialization

IoT stands for _________


Internet of Things
Internet of Technology
Incorporate of Things
Incorporate of Technology
Explanation: A) IoT stands for Internet of Things.

The term IoT was coined in?


2000
1999
1995
2001
Explanation: B) The term IoT was coined in 1999.

Identify among the following which is not an IoT platform.


Salesforce
AWS
Microsoft Azure
Flipkart

Explanation: D) Flipkart is not an IoT platform.

IIoT stands for _________.


Intense Internet of Things
Index Internet of Technology
Industrial Internet of Things
Incorporate Internet of Technology

Explanation: C) IIoT stands for Industrial Internet of Things

Identify among the following which is not a fundamental component of IoT system.
User interface
Sensors
Transformers
Connectivity and data processing

Explanation: C) Transformers are not a fundamental component of an IoT systems.

Among the following layers, identify the one which is used for wireless connection in IoT devices.
Datalink layer
Transport layer
Network layer
Application layer
Explanation: A) Data link layer is used for wireless connection in IoT devices.

Total elements in the Open IoT Architecture is ____


5
6
7
8
Explanation: C) Total elements in the Open IoT Architecture is 7

Which of the following IoT gateway must provide?


Protocol abstraction
Security with hardware
Simple and fast installation
Data storage
Explanation: A) IoT gateway must provide Protocol abstraction.

Identify the protocol used to link all devices in IoT,


UDP
TCP/IP
HTTP
Network
Explanation: B) TCP/IP protocol is used to link all devices in IoT.

Identify the service which permits the changes to IoT services.


Enable
Enable from suspension
Update
Registered service status
Explanation: C) Update service permits the changes to IoT services.

Arduino IDE is written in which programming language


Java
C/C++
JavaScript
Python
Explanation: B) Arduino IDE is written in C/C++.
Chapter-3 Basics of Digital Forensics
1. Digital forensics is all of them except:

A. Extraction of computer data.

B. Preservation of computer data.

C. Interpretation of computer data.

D. Manipulation of computer data.

Ans:D

2. IDIP stands for

A. Integrated Digital Investigation Process.

B. Integrated Data Investigator Process.

C. Integrated Digital Investigator Process.

D. Independent Digital Investigator Process.

Ans: A

3. Who proposed Road Map for Digital Forensic Research (RMDFR)

A. G.Gunsh.

B. S.Ciardhuain

C. J.Korn.

D. G.Palmar

Ans: D

4. Investigator should satisfy following points:

A. Contribute to society and human being.

B. Avoid harm to others.

C. Honest and trustworthy.

D. All of the above

Ans: D

5. In the past, the method for expressing an opinion has been to frame a ____ question based on

available factual evidence.

A. Hypothetical

B. Nested

C. Challenging

D. Contradictory

Ans: A

6. More subtle because you are not aware that you are running these macros (the document opens

and the application automatically runs); spread via email

A. The purpose of copyright

B. Danger of macro viruses

C. Derivative works

D. computer-specific crime

Ans: B

7. There are three c's in computer forensics. Which is one of the three?

A. Control
B. Chance

C. Chains

D. Core

Ans: A

8. When Federal Bureau Investigation program was created?

A.1979

B.1984

C.1995

D.1989

Ans: B

9. When the field of PC forensics began?

A.1960's

B.1970's

C.1980's

D.1990's

Ans: C

10. What is Digital Forensic?

A. Process of using scientific knowledge in analysis and presentation of evidence in court

B. The application of computer science and investigative procedures for a legal purpose

involving the analysis of digital evidence after proper search authority, chain of custody,

validation with mathematics, use of validated tools, repeatability, reporting, and possible

expert presentation

C. process where we develop and test hypotheses that answer questions about digital events

D. Use of science or technology in the investigation and establishment of the facts or

evidence in a court of law

Ans: B

11. Digital Forensics entails _____.

A. Accessing the system's directories viewing mode and navigating through the various systems

files and folders

B. Undeleting and recovering lost files

C. Identifying and solving computer crimes

D. The identification, preservation, recovery, restoration and presentation of digital evidence

from systems and devices

Ans: D

12. Which of the following is FALSE?

A. The digital forensic investigator must maintain absolute objectivity

B. It is the investigator’s job to determine someone’s guilt or innocence.

C. It is the investigator’s responsibility to accurately report the relevant facts of a case.

D. The investigator must maintain strict confidentiality, discussing the results of an investigation

on only a “need to know”

Ans: B

13. What is the most significant legal issue in computer forensics?

A. Preserving Evidence
B. Seizing Evidence

C. Admissibility of Evidence

D. Discovery of Evidence

Ans: C

14. _______phase includes putting the pieces of a digital puzzle together and developing

investigative hypotheses

A. Preservation phase

B. Survey phase

C. Documentation phase

D. Reconstruction phase

E. Presentation phase

Ans: D

15. In _______phase investigator transfers the relevant data from a venue out of physical or

administrative control of the investigator to a controlled location

A. Preservation phase

B. Survey phase

C. Documentation phase

D. Reconstruction phase

E. Presentation phase

Ans:B

16. In _______phase investigator transfers the relevant data from a venue out of physical or

administrative control of the investigator to a controlled location

F. Preservation phase

G. Survey phase

H. Documentation phase

I. Reconstruction phase

J. Presentation phase

Ans:B

17. Computer forensics do not involve_____activity.

A. Preservation of computer data.

B. Exraction of computer data.

C. Manipulation of computer data.

D. Interpretation of computer data.

Ans: C

18. A set of instruction compiled into a program that perform a particular task is known as:

A. Hardware.

B.CPU

C. Motherboard

D. Software

Ans: D

19. Which of following is not a rule of digital forensics?

A. An examination should be performed on the original data

B. A copy is made onto forensically sterile media. New media should always be used if
available.

C. The copy of the evidence must be an exact, bit-by-bit copy

D. The examination must be conducted in such a way as to prevent any modification of the

evidence.

Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation

phase, is the goal of which phase?

A. Physical crime investigation

B. Digital crime investigation.

C. Review phase.

D. Deployment phase.

Ans: B

21. To provide mechanism to an incident to be detected and confirmed is purpose of which

phase?

A. Physical crime investigation

B. Digital crime investigation.

C. Review phase.

D. Deployment phase.

Ans: D

22. Which phase entails a review of the whole investigation and identifies area of improvement?

A. Physical crime investigation

B. Digital crime investigation.

C. Review phase.

D. Deployment phase

Ans: C

23. ____________is known as father of computer forensic.

A. G. Palmar

B. J. Korn

C. Michael Anderson

D. S.Ciardhuain.

Ans: C

24. ___________is well established science where various contribution have been made

A. Forensic

B. Crime

C. Cyber Crime

D. Evidence

Ans: A

25. Who proposed End to End Digital Investigation Process (EEDIP)?

A. G. Palmar

B. Stephenson

C. Michael Anderson

D. S.Ciardhuain

Ans: B
26. Which model of Investigation proposed by Carrier and Safford?

A. Extended Model of Cybercrime Investigation (EMCI)

B. Integrated Digital Investigation Process(IDIP)

C. Road Map for Digital Forensic Research (RMDFR)

D. Abstract Digital Forensic Model (ADFM)

Ans: B

27. Which of the following is not a property of computer evidence?

A. Authentic and Accurate.

B. Complete and Convincing.

C. Duplicated and Preserved.

D. Conform and Human Readable.

Ans. D

28. _______can makes or breaks investigation.

A. Crime

B. Security

C: Digital Forensic

D: Evidence

Ans: D

29. __________ is software that blocks unauthorized users from connecting to your computer.

A. Firewall

B. Quick lauch

C. OneLogin

D. Centrify

Ans: A

30. Which of following are general Ethical norms for Investigator?

A. To contribute to society and human being.

B. To avoid harm to others.

C. To be honest and trustworthy.

D. All of above

E. None of above

Ans: D

31. Which of following are Unethical norms for Investigator?

A. Uphold any relevant evidence.

B. Declare any confidential matters or knowledge.

C. Distort or falsify education, training, credentials.

D. All of above

E. None of above

Ans: D

32. Which of following is not general ethical norm for Investigator?

A. To contribute to society and human being.

B. Uphold any relevant Evidence.

C. To be honest and trustworthy.

D. To honor confidentially.
Ans: B

33. Which of following is a not unethical norm for Digital Forensics Investigation?

A. Uphold any relevant evidence.

B. Declare any confidential matters or knowledge.

C. Distort or falsify education, training, credentials.

D. To respect the privacy of others.

Ans: D

34. What is called as the process of creation a duplicate of digital media for purpose of

examining it?

A. Acquisition.

B. Steganography.

C. Live analysis

D. Hashing.

Ans: A

35. Which term refers for modifying a computer in a way which was not originally intended to

view Information?

A. Metadata

B. Live analysis

C. Hacking

D. Bit Copy

Ans: C

36. The ability to recover and read deleted or damaged files from a criminal’s computer is an

example of a law enforcement specialty called?

A. Robotics

B. Simulation

C. Computer Forensics

D. Animation

Ans: C

37. What are the important parts of the mobile device which used in Digital forensic?

A. SIM

B. RAM

C. ROM.

D.EMMC chip

Ans: D

38. Using what, data hiding in encrypted images be carried out in digital forensics?

A. Acquisition.

B. Steganography.

C. Live analysis

D. Hashing.

And: B

39. Which of this is not a computer crime?

A. e-mail harassment

B. Falsification of data.
C. Sabotage.

D. Identification of data

Ans. D

40. Which file is used to store the user entered password?

A. .exe

B. .txt

C. .iso

D. .sam

Ans: D

41. __________is the process of recording as much data as possible to create reports and analysis

on user input.

A. Data mining

B. Data carving

C. Meta data

D. Data Spoofing.

Ans: A

42. ________searches through raw data on a hard drive without using a file system.

A. Data mining

B. Data carving

C. Meta data

D. Data Spoofing.

Ans: B

43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?

A. Formatting disk

B. Storing data

C. Finding configuration files.

D. Deleting files.

Ans: C
ETI Questions-
1) The science and engineering of making intelligent machines, especially intelligent
computer programs are known as
a) Machine learning
b) Artificial Intelligence
c)Deep Learning
d) Neural Network

2) Which AI system not store memories or past experiences for future actions

a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

3) The Components of AI are derived from?

a) Logic
b) Cognition
c) Function
d) All of the above

4) Which is the 3 Concepts of AI?

a) Deep Learning
b) Neural Network
c) Machine Learning
d) None of the Above

5) What is Machine learning?

a) THE AUTONOMOUS ACQUISITION OF KNOWLEDGE THROUGH THE USE OF COMPUTERPROGRAMS


b) THE AUTONOMOUS ACQUISITION OF KNOWLEDGE THROUGH THE USE OF MANUALPROGRAMS
c) THE SELECTIVE ACQUISITION OF KNOWLEDGE THROUGH THE USE OF COMPUTERPROGRAMS
d) THE SELECTIVE ACQUISITION OF KNOWLEDGE THROUGH THE USE OF MANUALPROGRAMS

6) Weak AI is

a) the embodiment of human intellectual capabilities within a computer.

b) a set of computer programs that produce output that would be considered to reflect

c) intelligence if it were generated by humans.


d) the study of mental faculties using mental models implemented on a computer.

7) Who is the "father" of artificial intelligence?

a. Fisher Ada

b. John McCarthy

c. Allen Newell

d. Alan Turning

8) The Strategic Computing Program is a project of the:

a. Défense Advanced Research Projects Agency

b. National Science Foundation

c. Jet Propulsion Laboratory

d. All of the above

9) Which of the following is an application of Artificial Intelligence?


a) It helps to exploit vulnerabilities to secure the firm
b) Language understanding and problem-solving (Text analytics and NLP)
c) Easy to create a website
d) It helps to deploy applications on the cloud

10) Which of the following is a component of Artificial Intelligence?


a) Learning
b) Training
c) Designing
d) Puzzling

11) Which of the following is not the commonly used programming language for Artificial
Intelligence?

a) Perl
b) Java
c) PROLOG
d) LISP

12) Which of the following are the approaches to Artificial Intelligence?


a) Applied approach
b) Strong approach
c) Weak approach
d) All of the mentioned
13) What is Weak AI?
a) the study of mental faculties using mental models implemented on a computer
b) the embodiment of human intellectual capabilities within a computer
c) a set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans
d) all of the mentioned

14) Which of the following machine requires input from the humans but can interpret the
outputs themselves?
a) Actuators
b) Sensor
c) Agents
d) AI system

15) ______ is the graphical representation of information and data.

a. Data visualization

b. Data Analytics

c. Data mapping

d. Data storytelling

16) Chomsky's linguistic computational theory generated a model for syntactic analysis
through

a. regular grammar

b. regular expression

c. regular word

d. none

17) Which AI should understand human emotions, people, and beliefs and be able to
interact socially like humans.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of the above

18) Ability to think, puzzle, make judgments, plan, learn, communication by its own is
known as___ AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of the above
19) Strong AI is__________
a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a
computer
d) All of the above

20) In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
a) Marvin Minsky
b) Alain Colmerauer
c) John McCarthy
d) None of above

21) The conference that launched the AI revolution in 1956 was held at:
a) Dartmouth
b) Harvard
c) New York
d) Stanford

22) In data storytelling, internal and external stakeholders are ____ .

a. Targeted audience

b. General audience

c. Specific audience

d. Data specific audience

23) The self-driving car is an example of ____.


a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of the above

24) A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device
which drastically limits the search for solutions in large problem spaces.
a) Heuristic
b) Critical
c) Value based
d) Analytical

25) What of the following is considered to be a pivotal event in the history of AI.
a) 1949, Donald O, The organization of Behaviour.
b) 1950, Computing Machinery and Intelligence.
c) 1956, Dartmouth University Conference Organized by John McCarthy.
d) 1961, Computer and Computer Sense.

26 Which layer is used for wireless connection in IoT devices?


a) Application layer
b) Network layer
c) Data link layer
d) Transport layer

27) What is the full form of IIOT?


a) Index Internet of Things
b) Incorporate Internet of Things
c) Industrial Internet of Things
d) Intense Internet of Things

28) Which of the following is used to capture data from the physical world in IoT devices?
a) Sensors
b) Actuators
c) Microprocessors
d) Microcontrollers

29) IoT gateway must provide __________


a) Protocol abstraction
b) Data storage
c) Security with hardware
d) Simple and fast installation

30) What is the component of an IoT system that executes a program?


a) A sensor
b) A microcontroller
c) An actuator
d) A digital to analog converter

31) Which of the following protocol is used to link all the devices in the IoT?
a) HTTP
b) UDP
c) Network
d) TCP/IP

32) Which of the following is false about the MANET IoT network?
a) It is a self-configuring network
b) It has a low data rate
c) It does not have any encryption
d) Power is readily available for complex security
33) Internet domain name and hostname are translated into IP address by

a. Domain name system


b. Domain name database
c. Router
d. Domain information system

35) Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a. ALOHA
b. CSMA/CA
c. CDMA
d. none of the mentioned

36)What is the real example of a smart grid device in IoT?

a) Mobile phone

b) Television

c) Smart Speaker

d) Smart Meters

37) What is MQTT primarily used for?

a) User communication

b) System transfer

c) Machine to Machine Communication

d) Create connection

38) Which one of the following protocols is lightweight?

a) IP

b) HTTP

c) MQTT

d) CoAP

39) Which of the following devices is used to measure the gases or liquid?

a) Optical Sensor

b) Gas Sensor

c) Smoke Sensor
d) Pressure sensor

40) Which of the following is the type of SPI controller?

a) Micro-wire or plus

b) Microwire

c) Data SPI

d) Queued SPI

41) Which of the following devices is used to measure the gases or liquid?

a) Optical Sensor

b) Gas Sensor

c) Smoke Sensor

d) Pressure sensor

42) Which of the following touch sensors is used in a cell phone?

a) Resistive touch sensors

b) Human sensor

c) Capacitive touch sensor

d)Follow sensor

43) The address of the original IEEE 802 MAC comes from ___________.
a. Http
b. Ethernet address
c. IP address
d. MAC address
44) The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of
himself/herself behind, is:
a). Locard’s Exchange Principle
b) Differential Association Theory
c) Beccaria’s Social Contract
d) None of the above

45)What is the use of PWM signals in IoT development boards?


a) They are used by sensors to have analog input
b) They are used by sensors to have digital input
c) They are used by actuators to have analog input
d) They are used by actuators to have digital input
46)Which of the following is a complete line of home IoT devices that include smart
switches?
a) Belkin’sWeMo
b) Cinder
c) Awair
d) Canary

47) Which programming language is used by Arduino IDE IoT software for writing codes?
a) Python
b) Java
c) C/C++
d) JavaScript

48) The autonomous ________ based IoT platforms are used for internal management of the
corresponding enterprise.
a) eGovermnent related
b) Enterprise-based
c) Company based
d) Business oriented platform

49) The IoT platforms are mainly divided into how many types
a) 3 types
b) 5 types
c) 4 types
d) 2 types

50) dweet.io provides __________ to send data from IoT devices.


a) Web API
b) POST HTTP
c) JSON
d) HTTP
ETI Questions-
1) The science and engineering of making intelligent machines, especially intelligent
computer programs are known as
a) Machine learning
b) Artificial Intelligence
c)Deep Learning
d) Neural Network

2) Which AI system not store memories or past experiences for future actions

a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

3) The Components of AI are derived from?

a) Logic
b) Cognition
c) Function
d) All of the above

4) Which is the 3 Concepts of AI?

a) Deep Learning
b) Neural Network
c) Machine Learning
d) None of the Above

5) What is Machine learning?

a) THE AUTONOMOUS ACQUISITION OF KNOWLEDGE THROUGH THE USE OF COMPUTERPROGRAMS


b) THE AUTONOMOUS ACQUISITION OF KNOWLEDGE THROUGH THE USE OF MANUALPROGRAMS
c) THE SELECTIVE ACQUISITION OF KNOWLEDGE THROUGH THE USE OF COMPUTERPROGRAMS
d) THE SELECTIVE ACQUISITION OF KNOWLEDGE THROUGH THE USE OF MANUALPROGRAMS

6) Weak AI is

a) the embodiment of human intellectual capabilities within a computer.

b) a set of computer programs that produce output that would be considered to reflect

c) intelligence if it were generated by humans.


d) the study of mental faculties using mental models implemented on a computer.

7) Who is the "father" of artificial intelligence?

a. Fisher Ada

b. John McCarthy

c. Allen Newell

d. Alan Turning

8) The Strategic Computing Program is a project of the:

a. Défense Advanced Research Projects Agency

b. National Science Foundation

c. Jet Propulsion Laboratory

d. All of the above

9) Which of the following is an application of Artificial Intelligence?


a) It helps to exploit vulnerabilities to secure the firm
b) Language understanding and problem-solving (Text analytics and NLP)
c) Easy to create a website
d) It helps to deploy applications on the cloud

10) Which of the following is a component of Artificial Intelligence?


a) Learning
b) Training
c) Designing
d) Puzzling

11) Which of the following is not the commonly used programming language for Artificial
Intelligence?

a) Perl
b) Java
c) PROLOG
d) LISP

12) Which of the following are the approaches to Artificial Intelligence?


a) Applied approach
b) Strong approach
c) Weak approach
d) All of the mentioned
13) What is Weak AI?
a) the study of mental faculties using mental models implemented on a computer
b) the embodiment of human intellectual capabilities within a computer
c) a set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans
d) all of the mentioned

14) Which of the following machine requires input from the humans but can interpret the
outputs themselves?
a) Actuators
b) Sensor
c) Agents
d) AI system

15) ______ is the graphical representation of information and data.

a. Data visualization

b. Data Analytics

c. Data mapping

d. Data storytelling

16) Chomsky's linguistic computational theory generated a model for syntactic analysis
through

a. regular grammar

b. regular expression

c. regular word

d. none

17) Which AI should understand human emotions, people, and beliefs and be able to
interact socially like humans.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of the above

18) Ability to think, puzzle, make judgments, plan, learn, communication by its own is
known as___ AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of the above
19) Strong AI is__________
a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a
computer
d) All of the above

20) In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
a) Marvin Minsky
b) Alain Colmerauer
c) John McCarthy
d) None of above

21) The conference that launched the AI revolution in 1956 was held at:
a) Dartmouth
b) Harvard
c) New York
d) Stanford

22) In data storytelling, internal and external stakeholders are ____ .

a. Targeted audience

b. General audience

c. Specific audience

d. Data specific audience

23) The self-driving car is an example of ____.


a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of the above

24) A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device
which drastically limits the search for solutions in large problem spaces.
a) Heuristic
b) Critical
c) Value based
d) Analytical

25) What of the following is considered to be a pivotal event in the history of AI.
a) 1949, Donald O, The organization of Behaviour.
b) 1950, Computing Machinery and Intelligence.
c) 1956, Dartmouth University Conference Organized by John McCarthy.
d) 1961, Computer and Computer Sense.

26 Which layer is used for wireless connection in IoT devices?


a) Application layer
b) Network layer
c) Data link layer
d) Transport layer

27) What is the full form of IIOT?


a) Index Internet of Things
b) Incorporate Internet of Things
c) Industrial Internet of Things
d) Intense Internet of Things

28) Which of the following is used to capture data from the physical world in IoT devices?
a) Sensors
b) Actuators
c) Microprocessors
d) Microcontrollers

29) IoT gateway must provide __________


a) Protocol abstraction
b) Data storage
c) Security with hardware
d) Simple and fast installation

30) What is the component of an IoT system that executes a program?


a) A sensor
b) A microcontroller
c) An actuator
d) A digital to analog converter

31) Which of the following protocol is used to link all the devices in the IoT?
a) HTTP
b) UDP
c) Network
d) TCP/IP

32) Which of the following is false about the MANET IoT network?
a) It is a self-configuring network
b) It has a low data rate
c) It does not have any encryption
d) Power is readily available for complex security
33) Internet domain name and hostname are translated into IP address by

a. Domain name system


b. Domain name database
c. Router
d. Domain information system

35) Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a. ALOHA
b. CSMA/CA
c. CDMA
d. none of the mentioned

36)What is the real example of a smart grid device in IoT?

a) Mobile phone

b) Television

c) Smart Speaker

d) Smart Meters

37) What is MQTT primarily used for?

a) User communication

b) System transfer

c) Machine to Machine Communication

d) Create connection

38) Which one of the following protocols is lightweight?

a) IP

b) HTTP

c) MQTT

d) CoAP

39) Which of the following devices is used to measure the gases or liquid?

a) Optical Sensor

b) Gas Sensor

c) Smoke Sensor
d) Pressure sensor

40) Which of the following is the type of SPI controller?

a) Micro-wire or plus

b) Microwire

c) Data SPI

d) Queued SPI

41) Which of the following devices is used to measure the gases or liquid?

a) Optical Sensor

b) Gas Sensor

c) Smoke Sensor

d) Pressure sensor

42) Which of the following touch sensors is used in a cell phone?

a) Resistive touch sensors

b) Human sensor

c) Capacitive touch sensor

d)Follow sensor

43) The address of the original IEEE 802 MAC comes from ___________.
a. Http
b. Ethernet address
c. IP address
d. MAC address
44) The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of
himself/herself behind, is:
a). Locard’s Exchange Principle
b) Differential Association Theory
c) Beccaria’s Social Contract
d) None of the above

45)What is the use of PWM signals in IoT development boards?


a) They are used by sensors to have analog input
b) They are used by sensors to have digital input
c) They are used by actuators to have analog input
d) They are used by actuators to have digital input
46)Which of the following is a complete line of home IoT devices that include smart
switches?
a) Belkin’sWeMo
b) Cinder
c) Awair
d) Canary

47) Which programming language is used by Arduino IDE IoT software for writing codes?
a) Python
b) Java
c) C/C++
d) JavaScript

48) The autonomous ________ based IoT platforms are used for internal management of the
corresponding enterprise.
a) eGovermnent related
b) Enterprise-based
c) Company based
d) Business oriented platform

49) The IoT platforms are mainly divided into how many types
a) 3 types
b) 5 types
c) 4 types
d) 2 types

50) dweet.io provides __________ to send data from IoT devices.


a) Web API
b) POST HTTP
c) JSON
d) HTTP
6.1 Network Hacking

1) Why would a ping sweep be used?


a) To identify live systems
b) To locate live systems
c) To identify open ports
d) To locate firewalls

2) A _____ is a simple network scanning technique used for determining which range of IP
address map to live hosts.
a) Scan sweep
b) Ping sweep
c) Scan ping
d) Host ping

3) SNMP stands for


a) Simple network mail protocol
b) Simple network memory protocol
c) Standard network management protocol
d) Simple network management protocol

4) Which port does the Telnet use?


a) 23
b) 21
c) 25
d) 80

5) You can grab banners by using?


a) Telnet
b) Netcat
c) SMTP
d) Both a and b
6) ICMP stands for
a) Internet Control Message Protocol
b) Internet Communication Messaging Protocol
c) Internet Control Messaging Protocol
d) None

7) SNMP is a framework for managing devices in an Internet using the


a) TCP/IP protocol
b) UDP
c) SMTP
d) None

8) ARP Spoofing is often referred to as


a) Man-in-the-Middle(MITM) attack
b) MAC-Daddy attack
c) None
d) Both

9) __ is a tool that allows you to look into a network and analyze data across the wire for
network optimization, security and troubleshooting purposes.
a) SuperScan
b) Network Analyzer
c) Netcat
d) Nmap

10) Network analyzers are generally known as


a) Sniffers
b) Nmap
c) NetCat
d) SuperScan

11) _______is a UNIX -based program alerts you via email if it detects changes in MAC
addresses associated with specific IP addresses on the network.
a) ARP spoofing
b) ARP Poisoning
c) ARP Watch
d) MAC address spoofing
12) Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD

13) Nmap is abbreviated as Network Mapper


a) True
b) False

14) ___software stores encrypted WEP keys in the Windows Registry even for multiple
networks
a) NetStumbler
b) Orinoco Client Manager
c) AiroPeek
d) None

15) WEP stands for


a) Wired Equivalent Privacy
b) Wireless Equivalent Privacy
c) Wired Enhanced Privacy
d) Wireless Enhanced Privacy

16) Which of the following tool is used for Network Testing and Port Scanning?
a) NetCat
b) SuperScan
c) NetScan
d) All of the above

17) Banner Grabbing is often used for


a) White Hat Hacking
b) Black Hat Hacking
c) Script Kiddies
d) Grey Hat Hacking
18) A sniffer can help you in
a) Tracking and isolating malicious network usage
b) Monitor and track down IP addresses
c) Detect malicious Trojan horse applications
d) Both a and c

19) What can be done to prevent ARP poisoning?


a) Create and maintain static ARP entries
b) Create and maintain dynamic ARP entries
c) Create and maintain static and dynamic entries
d) Both b and c

20) Network analyzer performs the following functions


a) Captures all network traffic
b) Interprets or decodes what is found in human readable format
c) Displays all the info
d) All of the above

21) __ can grab information from routers and other network hosts, such as a wireless access
point or managed Ethernet switch
a) Netcat
b) Netscan
c) Telnet
d) Superscan

22) Dsniff supports which OS


a) Unix
b) Linux
c) Windows
d) MAC OS

23) EtherPeek by WildPacket supports which OS


a) Unix
b) Linux
c) Windows
d) MAC OS
24) Ethereal and ettercap supports which OS?
a) Unix
b) Linux
c) Windows
d) Both a and c

25) MAC stands for


a) Media Area Control
b) Memory Access Control
c) Memory Area Control
d) Media Access Control

26) Network Stumbler is a Windows Wi-Fi monitoring tool


a) True
b) False
6.2 Operating System Hacking

6.2 MCQ’S
Q1.Which program acts as an interface between the software and the computer hardware.
a. Operating System.
b. Microsoft.
c. Linux.
d. Unix.

Q2.what is used to manage operating system.


a. Controls and monitors the execution.
b. Resources and operations of the computer.
c. Poor security management.
d. Unix and Linux

Q3. Which operating system is most widely used OS in the world.


a. Linux .
b. Unix.
c. Microsoft Windows.
d. OS.

Q4. Which is most widely hacked OS.


a. Microsoft Windows.
b. Unix.
c. OS.
d. Linux .
Q5.which of the following is one positive about hackers.
a. They are driving the requirements for better security.
b. They have RPC vulnerabilities.
c. They have around long time Unix and Linux.
d. All of the above.

Q6. Which vendor is easiest to pick.


a. Linux.
b. Unix.
c. Both a and b.
d. Windows.

Q7. Windows operating system is published for which of the following.


a. Less vulnerability.
b. Much vulnerability.
c. Common vulnerabilities.
d. All of the above.

Q8. Which of the following are windows operating system vulnerabilities.


a. Dos , Sql Injection.
b. Remote Code Execution, Overflow.
c. Memory Corruption.
d. All of the above.

Q9. Http Response Splitting, Directory Traversal and XSS includes which operating system.
a. Linux.
b. UNIX.
c. Windows.
d. None of the above.
Q10. Which of the following are windows vulnerabilities.
a. Microsoft platform for their networking needs.
b. The windows operating system for networking usage.
c. Web servers and database servers on the windows platform.
d. All of the above.

Q11. In windows platform what are the many organizations run critical servers.
a. Both c and d.
b. None of the below.
c. Web servers.
d. Database servers.

Q12. When windows and other Microsoft software are attacked especially by.
a. A widespread Internet-based worm or virus hundreds of thousands of organization.
b. Millions of computers are affected.
c. Both a and b.
d. None of the above.

Q13. Leakage of confidential information, including files being copied and credit card numbers
being stolen are leading.
a. Many well-known attacks against windows.
b. Microsoft Windows.
c. Linus
d. Both b and c

Q14.what are the Many well-known attacks against windows can lead to.
a. Passwords being cracked and used to carry out other attacks.
b. Systems taken completely offline by DoS attacks.
c. Credit card numbers being stolen and many more things.
d. All of the above.
Q15. Systems taken completely offline by which attacks.
a. Memory Corruption.
b. DoS attacks.
c. XSS attacks.
d. Sql Injection.

Q16. When insecure windows-based systems are attacked by which of the following.
a. Leakage of confidential information.
b. Passwords being cracked.
c. Entire databases being corrupted or deleted.
d. None of the above.

Q17. Entire databases being corrupted or deleted by


a. Serious things can happen to a tremendous number of computers around the world.
b. When insecure windows-based systems are attacked.
c. None of the above.
d. Both a and b.

Q 18. ____________ is the cyclic practice for identifying & classifying and then solving the
vulnerabilities in a system.
a. Bug protection
b. Bug bounty
c. Vulnerability measurement
d. Vulnerability management

Q 19. Risk and vulnerabilities are the same things.


a. True
b. False

Q 20. _____________ is a special type of vulnerability that doesn’t possess risk.


a) Vulnerabilities without risk
b) Vulnerabilities without attacker
c) Vulnerabilities without action
d) Vulnerabilities no one knows

Q 21. Remote exploits is that type of exploits acts over any network to exploit on security
vulnerability.
a. True
b. False

Q 22. Which is the competitor operating system for Microsoft.


a. UNIX.
b. Linux.
c. Windows.
d. Both a and b.

Q 23. Which is the most popular OS that hackers are attacking most.
a. windows
b. Microsoft windows.
c. Linux.
d. all of these.

Q 24. Why hackers are attacking Linux.


a. Because its popularity.
b. Growing usage in today’s network environment.
c. Because some versions of Linux are free.
d. All of the above.

Q 25. What is the purpose for many organizations installing Linux for their web servers and e-
mail servers in expectations of.
a. Saving money.
b. For some reasons.
c. None of the above.
d. Both a and b.
6.3.1 Applications Hacking

1) Messaging software is at the _______ level vulnerable.


a. Client
b. Server
c. Both a and b
d. None of these

2) Why messaging software both at the client and server level is vulnerable?
a. Network administrators forget about securing these systems.
b. Believe that antivirus software is all that’s needed to keep trouble away.
c. Ignore the existing security vulnerabilities.
d. All of the above

3) Which of the following one hacker do to attacks messaging systems?


a. Obtaining remote control of workstations.
b. Orinoco wireless card.
c. Legal liabilities associated with unauthorized users.
d. None of the above

4) An email bomb is also known as ______.


a. Molecule bomb
b. Covalent bomb
c. Equivalent bomb
d. Letter bomb

5) Which of the following is the email bomb attack?


a. Hackers attack
b. Autoresponder attack
c. Molecular attack
d. All of these

6) Which tool determines e-mail server version information based on how the server
responds to malformed SMTP requests?
a. Ethereal
b. Dsniff
c. Smtpscan
d. Ettercap
7) ________ is a famous technological medium for the spread of malware, facing problems
of spam and phishing attacks.
a. Cloud
b. Pen drive
c. Website
d. Email

8) Unsolicited Bulk Emails(UBI) are called _________.


a. SMS
b. MMS
c. Spam Emails
d. Malicious Emails

9) Which protocols are in use is vulnerable?


a. TCL
b. SSL
c. FTP
d. SMTP

10) _____ crash a server and provide unauthorized administrator access.


a. E-mail bomb
b. Letter bomb
c. Both a and b
d. None of these
6.3.2 Web Applications

1.__________is a security vulnerability that allows an attacker to alter backend SQL statements
by manipulating the user supplied data.
a. SQL Injection
b. Cross site Scripting
c. both a & b
d. None of above

2. Cross Site Scripting is also shortly known as _______.


a. XSS
b.CSS
c. All of above
d. None of Above

3. XSS vulnerabilities target scripts embedded in a page that are executed on the _______
a. Client Side
b. Server Side
c. Both a & b
d. None of Above

4.________ is the top-most directory on the server file System


a. home directory.
b. root directory.
c. user directory.
d. None of Above.
5.________type of hackers attack web site like marketing,contact information,document
downloads.
a. Script Kiddies
b. Criminal Hackers
c. Ethical Hacker.
d. None of Above

6.________type of hackers attack web site that store valuable information like credit card and
Social Security numbers.
a. Script Kiddies
b. Criminal Hackers
c. Ethical Hacker.
d. None of Above

6.3.3Database System Vulnerabilities

1. What are Vulnerabilities in database management system?

a) Loose access permission


b) Excessive retention of sensitive data
c) Aggregation of personally identifiable information
d) All of the above

2. Which type of data keeping longer than necessary increases the impact of a security breach?

a) Excessive retention of sensitive data


b) Loose access permission
c) Directory Traversals
d) None of these
3.________ is a weakness that can be exploited by attackers.
a) System with security controls
b) System with Vulnerabilities
c) System with virus
d) System without firewall

4.__________ attacks cyber criminals often target the database that is where the money is.
a) Cyber crime
b) Denial of service
c) Security
d) None of the above

5. Which type of server to keep separate from the web server.


a) Database
b) Information
c) Server
d) All of them

6. DMZ stands for_________


a) Digital Management Zone
b) Database menu zone
c) Demilitarized zone
d) None of above

7.________security estimates that 83 percent of all wed sites are vulnerable to at least one form
of attack.
a) Black Hat
b) Script kiddies
c) White Hat
d) All of the above

8. WAF stands for__________


a) Web application firewalls.
b) Web application fire
c) Web attacks fire
d) None of these

9. In addition to protecting a site against crosssite scripting _________ and _________


vandalism, a good application firewall can thwart SQL injection attacks as well.
a) Vulnerabilities and web site
b) Database and Web Server
c) Wed site and Database
d) None of above

10) Keep Patches Current means_________


a) This is the one type of security
b) This is one area where administrators often come up short.
c) This is one type of minimizing database security risks
d) None of above
Question Bank (I scheme)

Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence

1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B

2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A

3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A

4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A

5. What of the following is considered to be a pivotal event in the history of AI.


A. 1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
Ans: C
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B

7. The field that investigates the mechanics of human intelligence is:


A. History
B. cognitive science
C. psychology
D. sociology
E. None of the above
Ans: B

8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A

9. The first AI programming language was called:


A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above
Ans: C

10. What is Artificial intelligence?


A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Putting more memory into Computer
Ans: C

11. Who is a father of AI?


A. Alain Colmerauer
B. John McCarthy
C. Nicklaus Wirth
D. Seymour Papert
Ans: B

12. Artificial Intelligence has its expansion in the following application.


A. Planning and Scheduling
B. Game Playing
C. Robotics
D. All of the above
Ans: D

13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C

14. The first AI programming language was called:


A. BASIC
B. FORTRAN
C. IPL
D. LISP
Ans: C

15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C

16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A

18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C

20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

21. ______ do not guarantee optimal/any solutions


A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

22. Cognitive science related with _____


A. Act like human
B. ELIZA
C. Think like human
D. None of above
Ans: C

23. _____ Model should reflect how results were obtained.


A. Design model
B. Logic model
C. Computational model
D. None of above
Ans: C

24. Communication between man and machine is related with ______


A. LISP
B. ELIZA
C. All of above
D. None of above
Ans: B

25. ELIZA created by _____


A. John McCarthy
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B

27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C

28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B

29. PROLOG, LISP, NLP are the language of ____


A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A

30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A

31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A

32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D

33. The core components are constituents of AI are derived from


A. Concept of logic
B. Cognition
C. Computation
D. All of above
Ans: D

34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A

35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B

36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A

37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B

38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C

39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A

40. Human to Machine is _____ and Machine to Machine is ______.


A. Process, Process
B. Process, Program
C. Program, Hardware
D. Program, Program
Ans: C

41. Weak AI is also known as ____


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

42. _____ AI is able to perform dedicated task.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

43. Narrow AI is performs multiple task at a time.


A. True
B. False
Ans: B

44. Weak AI is____________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: C

45. Strong AI is__________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: A

46. Artificial intelligence is___________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: D

47. Apple siri is a good example of ______ AI.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

48. IBM Watson supercomputer comes under ____ AI.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

55. ____ AI is hypothetical concept of AI.


A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

58. IBM’s deep blue system is example of ___.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

59. Google Alpha Go is example of ____.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B

61. Self-driving car is example of ____.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B [Car stores recent speed of nearby cars, distance of others car, speed limit, other
information to navigate the road]

62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C

63. Which machines will be smarter than human mind?


A. Reactive machine
B. Limited memory
C. Theory of mind
D. Self-Awareness
Ans: D

64. _________machines will have their own consciousness and sentiments


A. Reactive machine
B. Theory of mind
C. Self-Awareness
D. Both B & C
Ans: C

65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C

66. What is Machine learning?


A. The autonomous acquisition of knowledge through the use of computer programs
B. The autonomous acquisition of knowledge through the use of manual programs
C. The selective acquisition of knowledge through the use of computer programs
D. The selective acquisition of knowledge through the use of manual programs
Ans: A
67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A

68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A

69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B

70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B

71. Machine learning invent by _____.


A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizenbaum
D. Arthur Samuel
Ans: D

Chapter-2 Internet of Things

1. Embedded systems are_____


A. General purpose
B. Special purpose
Ans: B

2. Embedded system is______


A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Ans: D
3. Which of the following is not true about embedded systems?
A. Built around specialized hardware
B. Always contain an operating system
C. Execution behavior may be deterministic
D. All of these
E. None of these
Ans: E

4. Which of the following is not an example of a “small-scale embedded system”?


A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C

5. The first recognized modern embedded system is


A. Apple computer
B. Apollo Guidance Computer (AGC)
C. Calculator
D. Radio navigation system
Ans: B

6. The first mass produced embedded system is


A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Ans: C

7. Which of the following is an (are) an intended purpose(s) of embedded systems?


A. Data collection
B. Data processing
C. Data communication
D. All of these
E. None of these
Ans: D

8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B

11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D

12. The instruction set of RISC processor is


A. Simple and lesser in number
B. Complex and lesser in number
C. Simple and larger in number
D. Complex and larger in number
Ans: A

13. Which of the following is true about CISC processors?


A. The instruction set is non-orthogonal
B. The number of general purpose registers is limited
C. Instructions are like macros in c language
D. Variable length instructions
E. All of these
F. None of these
Ans: E

14. Main processor chip in computers is_______


A. ASIC
B. ASSP
C. CPU
D. CPLD
Ans: C

15. Processors used in many microcontroller products need to be______


A. high power
B. low power
C. low interrupt response
D. low code density
Ans: B

16. In microcontrollers, UART is acronym of_____


A. Universal Applied Receiver/Transmitter
B. Universal Asynchronous Rectified Transmitter
C. Universal Asynchronous Receiver/Transmitter
D. United Asynchronous Receiver/Transmitter
Ans: C
17. Which architecture is followed by general purpose microprocessors?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: B

18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

20. Harvard architecture allows:


A. Separate program and data memory
B. Pipe-ling
C. Complex architecture
D. All of the mentioned
Ans: D

21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A

22. Which of the following is an example for wireless communication interface?


A. RS-232C
B. Wi-Fi
C. Bluetooth
D. EEE1394
E. Both (B) and (C)
Ans: E

23. ARM stands for _________


A. Advanced RISC Machine
B. Advanced RISC Methodology
C. Advanced Reduced Machine
D. Advanced Reduced Methodology
Ans: A
24. What is the processor used by ARM7?
A. 8-bit CISC
B. 8-bit RISC
C. 32-bit CISC
D. 32-bit RISC
Ans: D

25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A

26. ARM processors where basically designed for _______


A. Main frame systems
B. Distributed systems
C. Mobile systems
D. Super computers
Ans: C

27. ASIC chip is


A. Simple in design.
B. Manufacturing time is less.
C. It is faster.
D. Both A&C.
Ans: C

28. ASIC stands for


A. Application-System Integrated Circuits
B. Application-Specific Integrated Circuits
C. Application-System Internal Circuits
D. Application-Specific Internal Circuits
Ans: B

29. In microcontrollers, I2C stands for


A. Inter-Integrated Clock
B. Initial-Integrated Clock
C. Intel-Integrated Circuit
D. Inter-Integrated Circuit
Ans: D

30. ______________ is the smallest microcontrollers which can be programmed to perform a


large range of tasks.
A. PIC microcontrollers
B. ARM microcontrollers
C. AVR microcontrollers
D. ASIC microcontrollers
Ans: - A
31. _______________ was developed in the year 1996 by ATMEL Corporation
A. PIC
B. AVR
C. ARM
D. ASIC
Ans: - B

32. AVR stands for_____________________.


A. Advanced Virtual RISC.
B. Alf-Egil Bogen and Vegard Wollan RISC
C. Both A & B
D. None of the above
Ans: - C

33. AVR microcontroller executes most of the instruction in _________________.


A. Single execution cycle.
B. Double execution cycle.
C. Both A& B
D. None of the above.
Ans: - A

34. Term "the Internet of things" was coined by


A. Edward L. Schneider
B. Kevin Ashton
C. John H.
D. Charles Anthony
Ans: B

35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B

36. What does “Things” in IoT refers to?


A. General device
B. Information
C. IoT devices
D. Object
Ans: C

37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A

39 _____ devices may support a number of interoperable communication protocols and


communicate with other device and also with infrastructure.
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. None of above
Ans: C

40. Which one is not element of IOT?


A. Process
B. People
C. Security
D. Things
Ans:C

41. IIOT stands for


A. Information Internet of Things
B. Industrial Internet of Things
C. Inovative Internet of Things
D. None of above
Ans:B

42. Name of the IOT device which is first recognized?


A. Smart Watch
B. ATM
C. Radio
D. Video Game
Ans: B

43. _____ is used by IOT


A. Radio information technology
B. Satellite
C. Cable
D. Broadband
Ans:A

44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A

46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D

47. The sensed data communicated ___________________.


A. Cloud-based servers/storage.
B. I/O interfaces.
C. Internet connectivity.
D. None of the above
Ans: - A

48. IOT devices are various types, for instance______________.


A. Wearable sensors.
B. Smart watches.
C. LED lights.
D. All of the above
Ans: - D

49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A

50.______ is a collection of WLAN communication standards.


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:B

51. ____ is a collection of wireless broadband standards (WiMax).


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:C
52 ___ is a collection of standards for LR-WPANs.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:D

53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A

54. ______ includes GSM and CDMA.


A. 2G
B. 3G
C. 4G
D. None of above
Ans:A

55. ______include UMTS and CDMA2000.


A. 2G
B. 3G
C. 4G
D. None of above
Ans:B

56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C

57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C

60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B

61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A

62. 6LOWPAN stands for


A. 6 LOW Personal Area Network
B. IPv6 LOW Personal Area Network
C. IPv6 over Low power wireless personal area network
D. None of above
Ans:C

63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B

64. IEEE 802.11 standards provide data rates ______________


A. 10 Gbit/s.
B. 1 Gbit/s
C. 1 Mb/s to up to 6.75 Gb/s
D. 250 Kb/s
Ans: - C

65. ________ of the following is a protocol related to IOT


A. Zigbee
B. 6LoWPAN
C. CoAP
D. All of the above
Ans: C
66. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer
D. None of the above.
Ans: - B

67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A

68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A

69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D

70. What is size of the IPv6 Address?


A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Ans: C

71. MQTT stands for _____________


A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D

72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C

74. Which protocol is lightweight?


A. MQTT
B. HTTP
C. CoAP
D. SPI
Ans: A

75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B

76. XMPP is used for streaming which type of elements?


A. XPL
B. XML
C. XHL
D. MPL
Ans: B

77. XMPP creates _________ identity.


A. Device
B. Email
C. Message
D. Data
Ans: A

78. XMPP uses ________ architecture.


A. Decentralized client-server
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
79. What does HTTP do?
A. Enables network resources and reduces perception of latency
B. Reduces perception of latency and allows multiple concurrency exchange
C. Allows multiple concurrent exchange and enables network resources
D. Enables network resources and reduces perception of latency and Allows multiple concurrent
exchange.
Ans: D
80. HTTP expands?
A. Hyper Text Transfer Protocol
B. Hyper Terminal Transfer Protocol
C. Hyper Text Terminal Protocol
D. Hyper Terminal Text Protocol
Ans: A

81. CoAP is specialized in ___________


A. Internet applications
B. Device applications
C. Wireless applications
D. Wired applications
Ans: A

82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A

83. Data in network layer is transferred in the form of ____________


A. Layers
B. Packets
C. Bytes
D. Bits
Ans:B

84. Services provided by application layer?


A. Web chat
B. Error control
C. Connection services
D. Congestion control
Ans: A

85. TCP and UDP are called?


A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
Ans: C

86. Security based connection is provided by which layer?


A. Application layer
B. Transport layer
C. Session layer
D. Network layer
Ans: D
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A

88. Transport layer receives data in the form of?


A. Packets
B. Byte streams
C. Bits stream
D. both packet and Byte stream
Ans: B

89. The network layer is considered as the _______?


A. Backbone
B. packets
C. Bytes
D. bits
Ans: A

90. The network layer consists of which hardware devices?


A. Router
B. Bridges
C. Switches
D. All of the above
Ans: D

91. Network layer protocol exits in_____?


A. Host
B. Switches
C. Packets
D. Bridges
Ans: A

92. Which protocol has a quality of service?


A. XMPP
B. HTTP
C. CoAP
D. MQTT
Ans: A

93. _____ is a data-centric middleware standard for device-to-device and machine-to-machine


communication.
A. Data Distribution Serviced (DDS)
B. Advance Message Queuing Protocol (AMQP)
C. Extensible Messaging and Presence Protocol (XMPP)
D. Message Queue Telemetry Transport (MQTT)
Ans:A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

96. Which is not an IoT communication model.


A. Request-Response
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair
Ans: C

97. In Node MCU, MCU stands for_____.


A. Micro Control Unit
B. Micro Controller Unit
C. Macro Control Unit
D. Macro Controller Unit
Ans: B

98. REST is acronym for________


A. Representational State Transfer
B. Represent State Transfer
C. Representational State Transmit
D. Representational Store Transfer
Ans: A

99. WSN stands for


A. Wide Sensor Network
B. Wireless Sensor Network
C. Wired Sensor Network
D. None of these
Ans: B

100. Benefit of cloud computing services


A. Fast
B. Anywhere access
C. Higher utilization
D. All of the above
Ans: D
101. PaaS stands for_____
A. Platform as a Service
B. Platform as a Survey
C. People as a Service
D. Platform as a Survey
Ans: A

102. _________ as a Service is a cloud computing infrastructure that creates a development


environment upon which applications may be build.
A. Infrastructure
B. Service
C. Platform
D. All of the mentioned
Ans:C

103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A

104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C

105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B

106._________ is the most refined and restrictive service model.


A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
Ans.C

107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A

109. Zigbee specification are based on ______.


A. 802.3
B. 802.11
C. 802.16
D. 802.15.4
Ans:D

110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B

111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C

112. Does Raspberry Pi need external hardware?


A. True
B. False
Ans.B

113. Does RPi have an internal memory?


A. True
B. False
Ans.A

114. What do we use to connect TV to RPi?


A. Male HDMI
B. Female HDMI
C. Male HDMI and Adapter
D. Female HDMI and Adapter
Ans.C

115. How power supply is done to RPi?


A. USB connection
B. Internal battery
C. Charger
D. Adapter
Ans.A

116. What is the Ethernet/LAN cable used in RPi?


A.Cat5
B.at5e
C. cat6
D . RJ45
Ans.D

117. Which instruction set architecture is used in Raspberry Pi?


A. X86
B. MSP
C. AVR
D. ARM
Ans: D

118. Does micro SD card present in all modules?


A. True
B. False
Ans: A

119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A

120. ________ empowers IoT by bringing together everyday objects.


A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: B

121. The collection of data is achieved with ________ changes.


A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: C
122. The number of devices that need to be managed and that communicate with each other will
be much larger.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: D
123. ________ in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B

124. Devices that transforms electrical signals into physical movements


A. Sensors
B. Actuators
C. Switches
D. Display
Ans: B

125. Stepper motors are_____


A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B

126. DC motors converts electrical into ___ energy.


A. Mechanical
B. Wind
C. Electric
D. None
Ans: A

127. Linear actuators are used in________


A. Machine tools
B. Industrial machinery
C.both A and B
D.None
Ans: A

128. Solenoid is a specially designed ________


A. Actuator
B. Machine
C. Electromagnet
D. none of above
Ans: C

129. Stepper motors are_____


A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B
130. Accelerometer sensors are used in______
A. Smartphones
B. Aircrafts
C. Both
D. None of above
Ans: C

131. Image sensors are found in_______


A. Cameras
B. Night-vision equipment
C. Sonars
D. All of above
Ans: D

132. Gas sensors are used to detect _____gases.


A. Toxic
B. Natural
C. Oxygen
D. Hydrogen
Ans: A

133. Properties of Arduino are:


A. Inexpensive
B. Independent
C. Simple
D. both A and C
Ans: D

134. Properties of IoT devices.


A. Sense
B. Send and receive data
C. Both A and B
D. None of above
Ans: C

135. IoT devices are ____


A. Standard
B. Non-standard
C. Both
D. None
Ans: B

136. What is the microcontroller used in Arduino UNO?


A. ATmega328p
B. ATmega2560
C. ATmega32114
D. AT91SAM3x8E
Ans: A
137. ___ is an open source electronic platform based on easy to used hardware and software.
A. Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A

138 ____ is used latching, locking, triggering.


A. Solenoid
B. Relay
C. Linear Actuator
D. Servo motors
Ans:A

139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D

140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B

141. The measurement of humidity is


A. RH
B. PH
C. IC
D. None of aboved
Ans:A

142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D

143 ____ sensor measure heat emitted by objects.


A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:C
Chapter-3 Basics of Digital Forensics

1. Digital forensics is all of them except:


A. Extraction of computer data.
B. Preservation of computer data.
C. Interpretation of computer data.
D. Manipulation of computer data.
Ans:D

2. IDIP stands for


A. Integrated Digital Investigation Process.
B. Integrated Data Investigator Process.
C. Integrated Digital Investigator Process.
D. Independent Digital Investigator Process.
Ans: A

3. Who proposed Road Map for Digital Forensic Research (RMDFR)


A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D

4. Investigator should satisfy following points:


A. Contribute to society and human being.
B. Avoid harm to others.
C. Honest and trustworthy.
D. All of the above
Ans: D

5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A

6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B

9. When the field of PC forensics began?


A.1960's
B.1970's
C.1980's
D.1990's
Ans: C

10. What is Digital Forensic?


A. Process of using scientific knowledge in analysis and presentation of evidence in court
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or
evidence in a court of law
Ans: B

11. Digital Forensics entails _____.


A. Accessing the system's directories viewing mode and navigating through the various systems
files and folders
B. Undeleting and recovering lost files
C. Identifying and solving computer crimes
D. The identification, preservation, recovery, restoration and presentation of digital evidence
from systems and devices
Ans: D

12. Which of the following is FALSE?


A. The digital forensic investigator must maintain absolute objectivity
B. It is the investigator’s job to determine someone’s guilt or innocence.
C. It is the investigator’s responsibility to accurately report the relevant facts of a case.
D. The investigator must maintain strict confidentiality, discussing the results of an investigation
on only a “need to know”
Ans: B

13. What is the most significant legal issue in computer forensics?


A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D

15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B

16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B

17. Computer forensics do not involve_____activity.


A. Preservation of computer data.
B. Exraction of computer data.
C. Manipulation of computer data.
D. Interpretation of computer data.
Ans: C

18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D

19. Which of following is not a rule of digital forensics?


A. An examination should be performed on the original data
B. A copy is made onto forensically sterile media. New media should always be used if
available.
C. The copy of the evidence must be an exact, bit-by-bit copy
D. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation
phase, is the goal of which phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B

21. To provide mechanism to an incident to be detected and confirmed is purpose of which


phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: D

22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C

23. ____________is known as father of computer forensic.


A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C

24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A

25. Who proposed End to End Digital Investigation Process (EEDIP)?


A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B

26. Which model of Investigation proposed by Carrier and Safford?


A. Extended Model of Cybercrime Investigation (EMCI)
B. Integrated Digital Investigation Process(IDIP)
C. Road Map for Digital Forensic Research (RMDFR)
D. Abstract Digital Forensic Model (ADFM)
Ans: B
27. Which of the following is not a property of computer evidence?
A. Authentic and Accurate.
B. Complete and Convincing.
C. Duplicated and Preserved.
D. Conform and Human Readable.
Ans. D

28. _______can makes or breaks investigation.


A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D

29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A

30. Which of following are general Ethical norms for Investigator?


A. To contribute to society and human being.
B. To avoid harm to others.
C. To be honest and trustworthy.
D. All of above
E. None of above
Ans: D

31. Which of following are Unethical norms for Investigator?


A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. All of above
E. None of above
Ans: D

32. Which of following is not general ethical norm for Investigator?


A. To contribute to society and human being.
B. Uphold any relevant Evidence.
C. To be honest and trustworthy.
D. To honor confidentially.
Ans: B

33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A

35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C

36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C

37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D

38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B

39. Which of this is not a computer crime?


A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D

40. Which file is used to store the user entered password?


A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and analysis
on user input.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: A

42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B

43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
lOMoARcPSD|14293917

Eti mcq Question paper

ethics (Government Polytechnic, Nagpur)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

cwipedia.in
Question Bank (I scheme)

Name of Subject: Emerging Trends in Computer Engineering and Information Technology


Subject Code: 22618 Courses: CW6I Semester: VI

MULTIPLE CHOICE QUESTIONS AND ANSWERS

1- Artificial Intelligence

1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B

2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A

3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A

4. What is the term used for describing the judgmental or commonsense part of problem
solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

5. What of the following is considered to be a pivotal event in the history of AI. A.


1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
Ans: C

6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B

7. The field that investigates the mechanics of human intelligence is:


A. History
B. cognitive science
C. psychology
D. sociology
E. None of the above
Ans: B

8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A

9. The first AI programming language was called:


A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above
Ans: C

10. What is Artificial intelligence?


A. Putting your intelligence into Computer
B. Programming with your own intelligence

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C. Making a Machine intelligent


D. Putting more memory into Computer
Ans: C

11. Who is a father of AI?


A. Alain Colmerauer
B. John McCarthy
C. Nicklaus Wirth
D. Seymour Papert
Ans: B

12. Artificial Intelligence has its expansion in the following application.


A. Planning and Scheduling
B. Game Playing
C. Robotics
D. All of the above
Ans: D

13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C

14. The first AI programming language was called:


A. BASIC
B. FORTRAN
C. IPL
D. LISP
Ans: C

15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C

16. What is the term used for describing the judgmental or commonsense part of
problem solving? A. Heuristic
B. Critical

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C. Value based
D. Analytical
Ans: A

17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A

18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B

19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C

20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

21. ______ do not guarantee optimal/any solutions


A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

22. Cognitive science related with _____


A. Act like human
B. ELIZA

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C. Think like human


D. None of above
Ans: C

23. _____ Model should reflect how results were obtained.


A. Design model
B. Logic model
C. Computational model
D. None of above
Ans: C

24. Communication between man and machine is related with ______


A. LISP
B. ELIZA
C. All of above
D. None of above
Ans: B

25. ELIZA created by _____


A. John McCarthy
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D

26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B

27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C

28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C. Functional level
D. All of above
Ans: B

29. PROLOG, LISP, NLP are the language of ____


A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A

30. ______ is used for AI because it supports the implementation of software that computes
with symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A

31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG D. NLP
Ans: A

32. ______ that deals with the interaction between computers and humans using the
natural language A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D

33. The core components are constituents of AI are derived from


A. Concept of logic
B. Cognition
C. Computation
D. All of above
Ans: D

34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: A

35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B

36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A

37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B

38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C

39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A

40. Human to Machine is _____ and Machine to Machine is ______.


A. Process, Process
B. Process, Program
C. Program, Hardware
D. Program, Program

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: C

41. Weak AI is also known as ____


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

42. _____ AI is able to perform dedicated task.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

43. Narrow AI is performs multiple task at a time.


A. True
B. False
Ans: B

44. Weak AI is____________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: C

45. Strong AI is__________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: A

46. Artificial intelligence is___________


A. The embodiment of human intellectual capabilities within a computer.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: D

47. Apple siri is a good example of ______ AI.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

48. IBM Watson supercomputer comes under ____ AI.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human. A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.

Ans: A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A. Narrow AI
B. General AI
C. Super AI
D. None of above
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

55. ____ AI is hypothetical concept of AI.


A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

58. IBM’s deep blue system is example of ___.


A. Reactive machine
B. Limited memory
Ans: A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C. Theory of mind
D. None of above
Ans: A

59. Google Alpha Go is example of ____.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above

60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B

61. Self-driving car is example of ____.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B [Car stores recent speed of nearby cars, distance of others car, speed limit, other
information to navigate the road]

62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans. A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C

63. Which machines will be smarter than human mind?


A. Reactive machine
B. Limited memory
C. Theory of mind
D. Self-Awareness
Ans: D

64. _________machines will have their own consciousness and sentiments


A. Reactive machine
B. Theory of mind
C. Self-Awareness
D. Both B & C

Ans: A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: C

65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C

66. What is Machine learning?


A. The autonomous acquisition of knowledge through the use of computer programs
B. The autonomous acquisition of knowledge through the use of manual programs
C. The selective acquisition of knowledge through the use of computer programs
D. The selective acquisition of knowledge through the use of manual programs

Ans: A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A

68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____. A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A

69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B

70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B

71. Machine learning invent by _____.


A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizenbaum
D. Arthur Samuel
Ans: D

Chapter-2 Internet of Things

1. Embedded systems are_____


A. General purpose
B. Special purpose
Ans: B

2. Embedded system is______

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Ans: D
3. Which of the following is not true about embedded systems?
A. Built around specialized hardware
B. Always contain an operating system
C. Execution behavior may be deterministic
D. All of these
E. None of these
Ans: E

4. Which of the following is not an example of a “small-scale embedded system”?


A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C

5. The first recognized modern embedded system is


A. Apple computer
B. Apollo Guidance Computer (AGC)
C. Calculator
D. Radio navigation system
Ans: B

6. The first mass produced embedded system is


A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Ans: C

7. Which of the following is an (are) an intended purpose(s) of embedded systems?


A. Data collection
B. Data processing
C. Data communication
D. All of these
E. None of these
Ans: D

8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B

11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D

12. The instruction set of RISC processor is


A. Simple and lesser in number
B. Complex and lesser in number
C. Simple and larger in number
D. Complex and larger in number
Ans: A

13. Which of the following is true about CISC processors?


A. The instruction set is non-orthogonal
B. The number of general purpose registers is limited
C. Instructions are like macros in c language
D. Variable length instructions
E. All of these
F. None of these
Ans: E

14. Main processor chip in computers is_______


A. ASIC
B. ASSP

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C. CPU
D. CPLD
Ans: C

15. Processors used in many microcontroller products need to be______


A. high power
B. low power
C. low interrupt response
D. low code density
Ans: B

16. In microcontrollers, UART is acronym of_____


A. Universal Applied Receiver/Transmitter
B. Universal Asynchronous Rectified Transmitter
C. Universal Asynchronous Receiver/Transmitter
D. United Asynchronous Receiver/Transmitter Ans: C

17. Which architecture is followed by general purpose microprocessors?


A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: B

18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

20. Harvard architecture allows:


A. Separate program and data memory
B. Pipe-ling
C. Complex architecture
D. All of the mentioned
Ans: D

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A

22. Which of the following is an example for wireless communication interface?


A. RS-232C
B. Wi-Fi
C. Bluetooth
D. EEE1394
E. Both (B) and (C)
Ans: E

23. ARM stands for _________


A. Advanced RISC Machine
B. Advanced RISC Methodology
C. Advanced Reduced Machine
D. Advanced Reduced Methodology
Ans: A

24. What is the processor used by ARM7?


A. 8-bit CISC
B. 8-bit RISC
C. 32-bit CISC
D. 32-bit RISC
Ans: D

25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A

26. ARM processors where basically designed for _______


A. Main frame systems
B. Distributed systems
C. Mobile systems
D. Super computers
Ans: C

27. ASIC chip is


A. Simple in design.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B. Manufacturing time is less.


C. It is faster.
D. Both A&C.
Ans: C

28. ASIC stands for


A. Application-System Integrated Circuits
B. Application-Specific Integrated Circuits
C. Application-System Internal Circuits
D. Application-Specific Internal Circuits
Ans: B

29. In microcontrollers, I2C stands for


A. Inter-Integrated Clock
B. Initial-Integrated Clock
C. Intel-Integrated Circuit
D. Inter-Integrated Circuit
Ans: D

30. ______________ is the smallest microcontrollers which can be programmed to perform a


large range of tasks. A. PIC microcontrollers
B. ARM microcontrollers
C. AVR microcontrollers
D. ASIC microcontrollers
Ans: - A

31. _______________ was developed in the year 1996 by ATMEL Corporation


A. PIC
B. AVR
C. ARM
D. ASIC
Ans: - B

32. AVR stands for_____________________. A.


Advanced Virtual RISC.
B. Alf-Egil Bogen and Vegard Wollan RISC
C. Both A & B
D. None of the above
Ans: - C

33. AVR microcontroller executes most of the instruction in _________________. A.


Single execution cycle.
B. Double execution cycle.
C. Both A& B
D. None of the above.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: - A

34. Term "the Internet of things" was coined by


A. Edward L. Schneider B.
Kevin Ashton
C. John H.
D. Charles Anthony
Ans: B

35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B

36. What does “Things” in IoT refers to?


A. General device
B. Information
C. IoT devices
D. Object
Ans: C

37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A

38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A

39 _____ devices may support a number of interoperable communication protocols and


communicate with other device and also with infrastructure.
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D. None of above
Ans: C

40. Which one is not element of IOT?


A. Process
B. People
C. Security
D. Things
Ans:C

41. IIOT stands for


A. Information Internet of Things
B. Industrial Internet of Things
C. Inovative Internet of Things
D. None of above
Ans:B

42. Name of the IOT device which is first recognized?


A. Smart Watch
B. ATM
C. Radio
D. Video Game
Ans: B

43. _____ is used by IOT


A. Radio information technology
B. Satellite
C. Cable
D. Broadband
Ans:A

44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C

45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: - A

46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D

47. The sensed data communicated ___________________. A.


Cloud-based servers/storage.
B. I/O interfaces.
C. Internet connectivity.
D. None of the above
Ans: - A

48. IOT devices are various types, for instance______________. A.


Wearable sensors.
B. Smart watches.
C. LED lights.
D. All of the above
Ans: - D

49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A

50.______ is a collection of WLAN communication standards.


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:B

51. ____ is a collection of wireless broadband standards (WiMax).


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:C

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

52 ___ is a collection of standards for LR-WPANs.


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4 Ans:D
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___. A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A

54. ______ includes GSM and CDMA.


A. 2G
B. 3G
C. 4G
D. None of above
Ans:A

55. ______include UMTS and CDMA2000.


A. 2G
B. 3G
C. 4G
D. None of above
Ans:B

56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C

57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: C

59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C

60. _____________ protocols provide end to end message transfer capability independent of the
underlying network. A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B

61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A

62. 6LOWPAN stands for


A. 6 LOW Personal Area Network
B. IPv6 LOW Personal Area Network
C. IPv6 over Low power wireless personal area network
D. None of above
Ans:C

63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B

64. IEEE 802.11 standards provide data rates ______________ A.


10 Gbit/s.
B. 1 Gbit/s
C. 1 Mb/s to up to 6.75 Gb/s
D. 250 Kb/s
Ans: - C

65. ________ of the following is a protocol related to IOT

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A. Zigbee
B. 6LoWPAN
C. CoAP
D. All of the above
Ans: C
66. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer D. None of the above.
Ans: - B

67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A

68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A

69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
Ans: D

70. What is size of the IPv6 Address?


A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Ans: C

71. MQTT stands for _____________


A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D. MQ Telemetry Transport
Ans: D

72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A

73. MQTT is _________ protocol.


A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C

74. Which protocol is lightweight?


A. MQTT
B. HTTP
C. CoAP
D. SPI
Ans: A

75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B

76. XMPP is used for streaming which type of elements?


A. XPL
B. XML
C. XHL
D. MPL
Ans: B

77. XMPP creates _________ identity.


A. Device
B. Email
C. Message
D. Data
Ans: A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

78. XMPP uses ________ architecture.


A. Decentralized client-server
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
79. What does HTTP do?
A. Enables network resources and reduces perception of latency
B. Reduces perception of latency and allows multiple concurrency exchange
C. Allows multiple concurrent exchange and enables network resources
D. Enables network resources and reduces perception of latency and Allows multiple concurrent
exchange.
Ans: D

80. HTTP expands?


A. Hyper Text Transfer Protocol
B. Hyper Terminal Transfer Protocol
C. Hyper Text Terminal Protocol
D. Hyper Terminal Text Protocol
Ans: A

81. CoAP is specialized in ___________


A. Internet applications
B. Device applications
C. Wireless applications
D. Wired applications
Ans: A

82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A

83. Data in network layer is transferred in the form of ____________


A. Layers
B. Packets
C. Bytes
D. Bits Ans:B

84. Services provided by application layer?


A. Web chat
B. Error control

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C. Connection services
D. Congestion control
Ans: A

85. TCP and UDP are called?


A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
Ans: C

86. Security based connection is provided by which layer?


A. Application layer
B. Transport layer
C. Session layer
D. Network layer
Ans: D

87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A

88. Transport layer receives data in the form of?


A. Packets
B. Byte streams
C. Bits stream
D. both packet and Byte stream
Ans: B

89. The network layer is considered as the _______?


A. Backbone
B. packets
C. Bytes
D. bits
Ans: A

90. The network layer consists of which hardware devices?


A. Router
B. Bridges
C. Switches

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D. All of the above


Ans: D

91. Network layer protocol exits in_____?


A. Host
B. Switches
C. Packets
D. Bridges
Ans: A

92. Which protocol has a quality of service?


A. XMPP
B. HTTP
C. CoAP
D. MQTT
Ans: A

93. _____ is a data-centric middleware standard for device-to-device and machine-to-machine


communication.
A. Data Distribution Serviced (DDS)
B. Advance Message Queuing Protocol (AMQP)
C. Extensible Messaging and Presence Protocol (XMPP)
D. Message Queue Telemetry Transport (MQTT)
Ans:A

94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server. A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

96. Which is not an IoT communication model.


A. Request-Response
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: C

97. In Node MCU, MCU stands for_____.


A. Micro Control Unit
B. Micro Controller Unit
C. Macro Control Unit
D. Macro Controller Unit
Ans: B

98. REST is acronym for________


A. Representational State Transfer
B. Represent State Transfer
C. Representational State Transmit
D. Representational Store Transfer
Ans: A

99. WSN stands for


A. Wide Sensor Network
B. Wireless Sensor Network
C. Wired Sensor Network
D. None of these
Ans: B

100. Benefit of cloud computing services


A. Fast
B. Anywhere access
C. Higher utilization
D. All of the above
Ans: D

101. PaaS stands for_____


A. Platform as a Service
B. Platform as a Survey
C. People as a Service
D. Platform as a Survey
Ans: A

102. _________ as a Service is a cloud computing infrastructure that creates a development


environment upon which applications may be build.
A. Infrastructure
B. Service
C. Platform
D. All of the mentioned

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans:C

103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud. A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A

104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Ans:C

105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B

106._________ is the most refined and restrictive service model.


A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
Ans.C

107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D

108____ is a one of the most popular wireless technologies used by WSNs.


A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

109. Zigbee specification are based on ______.


A. 802.3
B. 802.11
C. 802.16
D. 802.15.4
Ans:D

110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B

111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:C

112. Does Raspberry Pi need external hardware?


A. True
B. False
Ans.B

113. Does RPi have an internal memory?


A. True
B. False
Ans.A

114. What do we use to connect TV to RPi?


A. Male HDMI
B. Female HDMI
C. Male HDMI and Adapter
D. Female HDMI and Adapter
Ans.C

115. How power supply is done to RPi?


A. USB connection
B. Internal battery
C. Charger
D. Adapter

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans.A

116. What is the Ethernet/LAN cable used in RPi?


A.Cat5
B.at5e
C. cat6
D . RJ45
Ans.D

117. Which instruction set architecture is used in Raspberry Pi?


A. X86
B. MSP
C. AVR
D. ARM
Ans: D

118. Does micro SD card present in all modules?


A. True
B. False
Ans: A

119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation? A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A

120. ________ empowers IoT by bringing together everyday objects.


A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: B

121. The collection of data is achieved with ________ changes.


A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: C
122. The number of devices that need to be managed and that communicate with each other will
be much larger. A. Intelligence
B. Connectivity
C. Dynamic Nature

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D. Enormous Scale
Ans: D

123. ________ in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B

124. Devices that transforms electrical signals into physical movements


A. Sensors
B. Actuators
C. Switches
D. Display
Ans: B

125. Stepper motors are_____


A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B

126. DC motors converts electrical into ___ energy.


A. Mechanical
B. Wind
C. Electric
D. None
Ans: A

127. Linear actuators are used in________


A. Machine tools
B. Industrial machinery
C.both A and B
D.None
Ans: A

128. Solenoid is a specially designed ________


A. Actuator
B. Machine
C. Electromagnet
D. none of above

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: C

129. Stepper motors are_____


A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B

130. Accelerometer sensors are used in______


A. Smartphones
B. Aircrafts
C. Both
D. None of above
Ans: C

131. Image sensors are found in_______


A. Cameras
B. Night-vision equipment
C. Sonars
D. All of above
Ans: D

132. Gas sensors are used to detect _____gases.


A. Toxic
B. Natural
C. Oxygen
D. Hydrogen
Ans: A

133. Properties of Arduino are:


A. Inexpensive
B. Independent
C. Simple
D. both A and C
Ans: D

134. Properties of IoT devices.


A. Sense
B. Send and receive data
C. Both A and B
D. None of above
Ans: C

135. IoT devices are ____

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A. Standard
B. Non-standard
C. Both
D. None Ans: B

136. What is the microcontroller used in Arduino UNO?


A. ATmega328p
B. ATmega2560
C. ATmega32114
D. AT91SAM3x8E
Ans: A

137. ___ is an open source electronic platform based on easy to used hardware and software. A.
Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A

138 ____ is used latching, locking, triggering.


A. Solenoid
B. Relay
C. Linear Actuator
D. Servo motors
Ans:A

139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D

140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:B

141. The measurement of humidity is


A. RH

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B. PH
C. IC
D. None of aboved
Ans:A

142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D

143 ____ sensor measure heat emitted by objects.


A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:C

Chapter-3 Basics of Digital Forensics

1. Digital forensics is all of them except: A.


Extraction of computer data.
B. Preservation of computer data.
C. Interpretation of computer data.
D. Manipulation of computer data.
Ans:D

2. IDIP stands for


A. Integrated Digital Investigation Process.
B. Integrated Data Investigator Process.
C. Integrated Digital Investigator Process.
D. Independent Digital Investigator Process.
Ans: A

3. Who proposed Road Map for Digital Forensic Research (RMDFR) A.


G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D

4. Investigator should satisfy following points: A.


Contribute to society and human being.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B. Avoid harm to others.


C. Honest and trustworthy.
D. All of the above
Ans: D

5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A

6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989 Ans:
B

9. When the field of PC forensics began?


A.1960's
B.1970's
C.1980's
D.1990's Ans:
C

10. What is Digital Forensic?


A. Process of using scientific knowledge in analysis and presentation of evidence in court
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D. Use of science or technology in the investigation and establishment of the facts or


evidence in a court of law
Ans: B

11. Digital Forensics entails _____.


A. Accessing the system's directories viewing mode and navigating through the various systems
files and folders
B. Undeleting and recovering lost files
C. Identifying and solving computer crimes
D. The identification, preservation, recovery, restoration and presentation of digital evidence
from systems and devices
Ans: D

12. Which of the following is FALSE?


A. The digital forensic investigator must maintain absolute objectivity
B. It is the investigator’s job to determine someone’s guilt or innocence.
C. It is the investigator’s responsibility to accurately report the relevant facts of a case.
D. The investigator must maintain strict confidentiality, discussing the results of an
investigation on only a “need to know”
Ans: B

13. What is the most significant legal issue in computer forensics?


A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C

14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D

15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans:B

16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B

17. Computer forensics do not involve_____activity. A.


Preservation of computer data.
B. Exraction of computer data.
C. Manipulation of computer data.
D. Interpretation of computer data.
Ans: C

18. A set of instruction compiled into a program that perform a particular task is known as: A.
Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D

19. Which of following is not a rule of digital forensics?


A. An examination should be performed on the original data
B. A copy is made onto forensically sterile media. New media should always be used if
available.
C. The copy of the evidence must be an exact, bit-by-bit copy
D. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Ans: A

20. To collect and analyze the digital evidence that was obtained from the physical investigation
phase, is the goal of which phase? A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B

21. To provide mechanism to an incident to be detected and confirmed is purpose of which


phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D. Deployment phase.
Ans: D

22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C

23. ____________is known as father of computer forensic.


A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C

24. ___________is well established science where various contribution have been made A.
Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A

25. Who proposed End to End Digital Investigation Process (EEDIP)?


A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B

26. Which model of Investigation proposed by Carrier and Safford?


A. Extended Model of Cybercrime Investigation (EMCI)
B. Integrated Digital Investigation Process(IDIP)
C. Road Map for Digital Forensic Research (RMDFR)
D. Abstract Digital Forensic Model (ADFM)
Ans: B

27. Which of the following is not a property of computer evidence? A.


Authentic and Accurate.
B. Complete and Convincing.
C. Duplicated and Preserved.
D. Conform and Human Readable. Ans. D

28. _______can makes or breaks investigation.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D

29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A

30. Which of following are general Ethical norms for Investigator? A.


To contribute to society and human being.
B. To avoid harm to others.
C. To be honest and trustworthy.
D. All of above
E. None of above
Ans: D

31. Which of following are Unethical norms for Investigator? A.


Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. All of above
E. None of above
Ans: D

32. Which of following is not general ethical norm for Investigator? A.


To contribute to society and human being.
B. Uphold any relevant Evidence.
C. To be honest and trustworthy.
D. To honor confidentially.
Ans: B

33. Which of following is a not unethical norm for Digital Forensics Investigation? A.
Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others. Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography. C. Live analysis
D. Hashing.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Ans: A

35. Which term refers for modifying a computer in a way which was not originally intended to
view Information? A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C

36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C

37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM C. ROM.
D.EMMC chip
Ans: D

38. Using what, data hiding in encrypted images be carried out in digital forensics? A.
Acquisition.
B. Steganography. C.
Live analysis
D. Hashing.
And: B

39. Which of this is not a computer crime?


A. e-mail harassment B.
Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D

40. Which file is used to store the user entered password?


A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and analysis
on user input. A. Data mining

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B. Data carving
C. Meta data D. Data Spoofing.
Ans: A

42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data D. Data Spoofing.
Ans: B

43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C

Happy Learning!
www.cwipedia.in

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


EMERGING

TRENDS
MCQ'S
FROM THE TOPPERS OF MSBTE

UR ENGINEERING
FRIEND
Preface

The importance of Emerging Trends is well known in various engineering fields.


Overwhelming response to our last year exam sutra series inspired us to create this
book. This book is structure to cover the key aspects of the subject Emerging
Trends.

All the questions in the book are very important for the upcoming MSBTE summer
2020 exam. All care has been taken to make students comfortable in understanding the
basic concepts of the subject.

The most important part of this kit is, we are not only providing the books but the
exams too at three different levels (basic, intermediate & advanced). The students only
need to study the book and co-operate us till exam.

We wish to express our profound thanks to all those who helped in making this book
realty. Much needed moral support and encouragement is provided on numerous
occasions by our whole family. We wish to thank the entire team of Apni University
who has taken immense pain to get this book in time with this quality.

Any suggestion for the improvement of the books will be acknowledged and well
appreciated.
Question

WHO IS FATHER OF ARTIFICAL INTELLIGENCE?

a) JOHN McCARTHY
b) JOSE McCARTHY
c) Nicklaus Wirth
d) None of the above

Question

THE SCIENCE AND ENGINEERING OF MAKING INTELLIGENT MACHINES


CALLED AS?

a) MACHINE LEARNING
b) DEEP LEARNING
c) ARTIFICAL INTELLIGENT
d) NONE OF THE ABOVE

Question

WHICH IS THE FIRST CONCEPT OF AI?

a) DEEP LEARNING
b) NEURAL NETWORK
c) MACHINE LEARNING
d) NONE OF THE ABOVE

Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Question

WHICH IS THE 2 CONCEPT OF AI?

a) DEEP LEARNING
b) NEURAL NETWORK
c) MACHINE LEARNING
d) NONE OF THE ABOVE

Question

WHICH IS THE 3 CONCEPT OF AI?

a) DEEP LEARNING
b) NEURAL NETWORK
c) MACHINE LEARNING
d) NONE OF THE ABOVE

Question

IN WHICH FIELD THE SCOPE OF AI IS?


a) ROBOTICS
b) GAMES PLAYING
c) SPEECH RECOGNITION
d) ALL THE ABOVE

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


THOSE AI CAN BE USEFUL IN DEFENCE SYSTEM?

a) TRUE
b) FALSE

Question

HOW MANY APPROACHES ARE THERE IN AI?

a) 1
b) 2
c) 3
d) 4

Question

IS THINK WELL AN APPROACH OF AI?

a) TRUE
b) FALSE

Question

AI APPROACHES ARE?

a) THINKK WELL
b) ACT WELL
c) THINK LIKE HUMANS
d) ALL THE ABOVE

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


IS ACT WELL AN APPROACH OF AI?

a) TRUE
b) FALSE

Question

IN THINK LIKE HUMANS WHICH APPROACH IS USE?

a) CONGINITE SCIENCE
b) BEHAVIORIST APPROACH
c) A&B
d) NONE OF THE ABOVE

Question

WHICH TECHNIQUE IS USE IN THINK LIKE HUMANS?

a) HEURISTIC TECHNIQUE
b) GPS
c) CONGINITE SCIENCE
d) NONE OF THE ABOVE

Question

WHICH APPROACH/TECHNIQUE IS USED IS ACT WELL?

a) HEURISTIC
b) CONGINITIVE
c) BEHAVIORIST
d) NONE OF THE ABOVE

Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
WHICH APPROACH IS USE IN ACT LIKE HUMAN?

a) HEURISTIC
b) CONGINITIVE
c) BEHAVIORIST
d) NONE OF THE ABOVE

Question

WHAT IS THE RESULT OF ACT LIKE HUMAN LIKE?

a) JUST LIKE HUMAN


b) DISIMILAR LIKE HUMAN
c) BETTER THAN HUMAN
d) NONE OF THE ABOVE

Question

ELIZA A PROGRAM THAT SIMULATE A PSYCHOTHERAPIST WAS BASED


ON WHICH APPROACH?

a) THINL WELL
b) ACT WELL
c) THINK LIKE HUMAN
d) ACT LIKE HUMAN

Question

GPS IS AN EXAMPLE OF WHICH APPORACH?

a) THINK WELL
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
b) ACT WELL
c) ACT LIKE HUMAN
d) THINK LIKE HUMAN

Question

WHERE AS ELIZA CODE CODED?

a) HARVARD
b) MIIT
c) MIT
d) NONE OF THE ABOVE

Question

IN WHICH YEAR ELIZA WAS CREATED?

a) 1964-1966
b) 1964-1965
c) 1965-1966
d) 1966-97

Question

THE COMPONETS OF AI ARE DERIVED FROM?

a) LOGIC
b) CONGINITION
c) FUNCTION
d) ALL OF THE ABOVE

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

IN HOW MANY LEVEL THE COMPONENTS ARE DIVIDED?

a) 1
b) 4
c) 3
d) 2

Question

HOW MANY CORE COMPONET ARE THERE IN AI?

a) 19
b) 12
c) 13
d) 10

Question

TYPES OF LEVELS ARE?

a) LOGIC
b) INDUCTION
c) PROPOSTION
d) TAUTOLOGY

Question

TYPES OF LEVELS ARE?

a) CONHINITION
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
b) INDUCTION
c) PROPOSTION
d) TAUTOLOGY

Question

TYPES OF LEVELS ARE?

a) FUNCTIONAL
b) INDUCTION
c) PROPOSTION
d) TAUTOLOGY

Question

TYPES OF CORE ARE?

a) KNOWLEDGE
b) REASONING
c) INDUCTION
d) SEARCH

Question

TYPES OF CORE ARE?

a) KNOWLEDGE
b) REASONING
c) PROPOSITION
d) SEARCH

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

TYPES OF CORE ARE?

a) KNOWLEDGE
b) REASONING
c) TAUTOLOGY
d) SEARCH

Question

TYPES OF CORE ARE?

a) KNOWLEDGE
b) REASONING
c) SEARCH
d) MODEL LOGIC

Question

TYPES OF CORE ARE?

a) TEMPORAL
b) KNOWLEDGE
c) REASONING
d) SEARCH

Question

TYPES OF CORE ARE?

a) KNOWLEDGE
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
b) REASONING
c) SEARCH
d) LEARNING

Question

TYPES OF CORE ARE?

a) ADAPTATION
b) KNOWLEDGE
c) REASONING
d) SEARCH

Question

TYPES OF CORE ARE?

a) KNOWLEDGE
b) REASONING
c) SEARCH
d) SELF ORGANIZATION

Question

TYPES OF CORE ARE?

a) KNOWLEDGE
b) REASONING
c) SEARCH
d) MEMORY

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


TYPES OF CORE ARE?

a) KNOWLEDGE
b) PERCEPTION
c) SEARCH
d) REASONING

Question

IS COMPOUND A PART OF COMPONENT OF AI?

a) TRUE
b) FALSE

Question

TYPES OF COMPOUND IN COMPONENTS OF AI?

a) INDUCTION
b) KNOWLEDGE BASED SYSTEM
c) KNOWLEDGE
d) PROPOSITION

Question

TYPES OF COMPOUND IN COMPONENTS OF AI?

a) INDUCTION
b) KNOWLEDGE BASED SYSTEM
c) PROPOSITON
d) REASONING
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Question

TYPES OF COMPOUND IN COMPONENTS OF AI?


a) INDUCTION
b) CONTROL
c) PROPOSITON
d) KNOWLEDGE BASED SYSTEM

Question

TYPES OF COMPOUND IN COMPONENTS OF AI?

a) SEARCH
b) KNOWLEDGE BASED SYSTEM
c) PROPOSITON
d) SPEECH PROCESSING

Question

TYPES OF COMPOUND IN COMPONENTS OF AI?

a) INDUCTION
b) KNOWLEDGE BASED SYSTEM
c) BELIEF
d) PROPOSITION

Question

TYPES OF COMPOUND IN COMPONENTS OF AI?

a) INDUCTION
b) KNOWLEDGE BASED SYSTEM
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
c) PROPOSITON
d) INTENTION

Question

TYPES OF COMPOUND IN COMPONENTS OF AI?

a) INDUCTION
b) UTTERANCE
c) PROPOSITON
d) KNOWLEDGE BASED SYSTEM

Question

IS COARSE COMPONENTS PART OF COMPONENTS OF AI?


a) TRUE
b) FALSE

Question

TYPES OF COARSE COMPONENTS IN AI?

a) KNOWLEDGE BASED SYSTEM


b) KNOELEDGE
c) SEARCH
d) NONE OF THESE

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


TYPES OD COARSE COMPONENTS IN AI?

a) BELIEF
b) DESIRE
c) INTENTION
d) HEURISTIC SEARCH

Question

TYPES OF COARSE COMPONETS IN AI?

a) INDUCTION
b) TAUTOLOGY
c) THEOREM PROVING
d) NONE OF THESE

Question

TYPES OF COARSE COMPONRNTS IN AI?

a) UTTERANCE
b) MULTI AGENT SYSTEM
c) MEMORY
d) PERCEPTION

Question

TYPES OF COARSE COMPONENTS IN AI?

a) CO-OPERATION
b) KNOWLEDGE
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
c) SEARCH
d) NONE OF THESE

Question

TYPES OF COARSE COMPONENTS IN AI?

a) BELIEF
b) DESIRE
c) INTENTION
d) CO-ORDINATION

Question

TYPES OF COARSE COMOPONETS IN AI?

a) INDUCTION
b) TAUTOLOGY
c) AI PROGRAMMING
d) NONE OF THESE

Question

TYPES OF COARSE COMPONRNTS IN AI?

a) UTTERANCE
b) VISION
c) MEMORY
d) PERCEPTION

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


TYPES OF COARSE COMPONENTS IN AI?

a) BELIEF
b) DESIRE
c) INTENTION
d) NATURAL LANGUAGE

Question

TYPES OF COARSE COMPONENTS IN AI?

a) BELIEF
b) DESIRE
c) INTENTION
d) SPEECH PROGRAMMING

Question

INDUCTION, PROPOSITION, TAUTOLOGY & MODEL LOGIC OF CORE


ARE INCLUDED IN WHICH LEVEL?
a) COGNITION
b) FUNCTIONAL
c) LOGIC
d) NONE OF THESE

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


TEMPORAL, LEARNING, ADAPTION & SELF-ORGANIZATION ARE
INCLUDED IN WHICH LEVEL?

a) LOGIC
b) COGNITION
c) FUNCTIONAL
d) NONE OF THESE

Question

Machine can perform any task better than human with cognitive properties isknown
as AI.
A. Narrow AI

B. General AI

C. Super AI

D. None of above

Question

Ability to think, puzzle, make judgments, plan, learn, communication by its own is
known as AI.

A. Narrow AI

B. General AI

C. Super AI
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
D. None of above

Question

AI is hypothetical concept of AI.

A. NarrowAI

B. General AI

C. Super AI

D. None of above

Question

Which AI system not store memories or past experiences for future actions.
A. Reactive machine

B. Limited memory

C. Theory of mind

D. None of above

Question

Which machines only focus on current scenarios and react on it as per as


possiblebest action.
A. Reactive machine

B. Limited memory

C. Theory of mind
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
D. None of above

Question

IBM’s deep blue system isexampleof .


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above

Question

Google Alpha Go is example of .


a. Reactive machine
b. Limited memory
c. Theory of mind
d. None of above

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

IN HOW MANY DIMENSION THE AI IS DIVIDED?


A. 1
B. 3
C.5
D.2
Question

IN FIRST DIMENSION CORE WHICH THEORY IS USED?


A. COFNITION
B. KNOWLEDGE
C. INTERFACE
D. NONE OF THESE
Question

IN FIRST DIMENSION CORE WHICH THEORY IS USED?


A. KNOWLEDGE BASED
B. KNOWLEDGE
C. LOGIC
D. NONE OF THESE
Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


IN FIRST DIMENSION CORE WHICH THEORY IS USED?
A. COFNITION
B. KNOWLEDGE
C. BOTH A&B
D. COMPUTATION

Question

IN SECOND DIMENSION CORE WHICH THEORY IS USED?


A. INTERFACE
B. KNOWLEDGE
C. NLP
D. NONE OF THESE
Question

IN SECOND DIMENSION CORE WHICH THEORY IS USED?


A. KNOWLEDGE BASED
B. KNOWLEDGE
C. LOGIC
D. NONE OF THESE
Question

IN SECOND DIMENSION CORE WHICH THEORY IS USED?


A. NPL
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
B. TCP
C.REASONING
D. LOGIC
Question

Self-driving car is example of .


a. Reactive machine
b. Limited memory
c. Theory of mind
d. None of above

Question

Which AI should understand the human emotions, people, and beliefs and be able to
interact socially like humans.
A. Reactive machine

B. Limited memory

C. Theory of mind

D. None of above

Question

Which machines will be smarter than human mind?


a. Reactive machine
b. Limited memory
c. Theory of mind
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
d. Self-Awareness

Question

machines will have their own consciousness and sentiments


a. Reactive machine
b. Theory of mind
c. Self-Awareness
d. Both B &C

Question

Which is not the commonly used programming language for AI?


A. PROLOG

B. LISP

C. Perl

D. Javascript

Question

What is Machine learning?


A.The autonomous acquisition of knowledge through the use of
computerprograms
B.The autonomous acquisition of knowledge through the use of manualprograms
C.The selective acquisition of knowledge through the use of computerprograms
D.The selective acquisition of knowledge through the use of manualprograms

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

is a branch of science that deals with programming the systems in such away
that they automatically learn and improve with experience
A. Machine Learning

B. Deep Learning

C. Neural Networks

D. None of these

Question

Classifying email as a spam, labeling web pages based on their content, voice
recognitionare the example of .
A. Supervised learning

B. Unsupervised learning

C. Machine learning

D. Deep learning

Question

K-means, self-organizing maps, hierarchical clustering are theexampleof .


A. Supervisedlearning

B. Unsupervised learning

C. Machinelearning

D. Deeplearning

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Question

Deep learning is a subfield of machine learning where concerned algorithms are


inspired by the structured and function of the brain called .
A. Machine learning

B. Artificial neural networks

C. Deep learning

D. Robotics

Question

Machine learning invent by .


A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizen baum
D. Arthur Samuel

Question

is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence

B. Internet of Things

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


C. Embedded System

D. Cyber Security

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Computer programs that mimic the way the human brain processes information is
called as
A. Machine Learning

B. Deep Learning

C. Neural Networks

D. None of these

Question

A is a rule of thumb, strategy, trick, simplification, or any other kind of device


which drastically limits search for solutions in large problem spaces.
A. Heuristic

B. Critical

C. Value based

D. Analytical

Question

do not guarantee optimal/any solutions


A. Heuristic

B. Critical

C. Value based

D. Analytical

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Cognitive science related with


A. Act like human
B. ELIZA
C. Think like human
D. None of above

Question

Model should reflect how results were obtained.


E. Design model

F. Logic model

G. Computational model

H. None of above

Question

Communication between man and machine is relatedwith


I. LISP

J. ELIZA

K. All ofabove

L. None ofabove

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


ELIZA createdby
M. John McCarthy

N. Steve Russell

O. Alain Colmerauer

P. Joseph Weizenbaum

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

The concept derived from level are propositional logic, tautology,


predicate calculus, model, temporal logic.
A. Cognition level

B. Logic level

C. Functional level

D. All of above

Question

PROLOG is an AI programming language which solves problems with a form of


symbolic logic known as .
A. Propositional logic

B. Tautology

C. Predicate calculus

D. Temporal logic

Question

The level contains constituents at the third level which are knowledge based
system, heuristic search, automatic theorem proving, multi-agentsystem.
A. Cognitionlevel

B. Grosslevel

C. Functionallevel

D. All ofabove

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

PROLOG, LISP, NLP are thelanguageof _


a. ArtificialIntelligence
b. Machine Learning
c. Internet ofThings
d. DeepLearning

Question

is used for AI because it supports the implementation of software that computes with
symbols verywell.
A. LISP

B. ELIZA

C. PROLOG

D. NLP

Question

Symbols, symbolic expressions and computing with those is at the coreof


A.LISP
B.ELIZA
C.PROLOG
D.NLP

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

The core components are constituents of AI are derivedfrom


A.Concept oflogic
B. Cognition
C. Computation
D. All ofabove

Question

Aristotle’s theory of syllogism and Descartes and kant’s critic of pure


reasoning made knowledgeon .
A. Logic

B. Computationlogic

C. Cognitionlogic

D. All ofabove

Question

Charles Babbage and Boole who demonstrate the powerof


a. Logic
b. Computationlogic
c. Cognitionlogic
d. All ofabove

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

In 1960s, pushed the logical formalism to integrate reasoning


withknowledge.
A. Marvin Minsky
B. AlainColmerauer
C. John McCarthy
D. None of above

Question

Embedded systems are


A. General purpose

B. Special purpose

Question

Embedded system is
A. An electronic system

B. A pure mechanical system

C. An electro-mechanical system

D. (A) or(C)

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Which of the following is not true about embedded systems?


A. Built around specialized hardware

B. Always contain an operating system

C. Execution behavior may be deterministic

D. All of these

E. None of these

Question

Which of the following is not an example of a “small-scale embeddedsystem”?


A. Electronic Barbiedoll

B. Simplecalculator

C. Cell phone

D. Electronic toycar

Question

The first recognized modern embedded systemis


A. Applecomputer

B. Apollo Guidance Computer(AGC)

C. Calculator

D. Radio navigationsystem

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


The first mass produced embedded systemis
A. Minuteman-I

B. Minuteman-II

C. AutoneticsD-17

D. Apollo Guidance Computer(AGC)

Question

Which of the following is an (are) an intended purpose(s) of embedded systems?


A. Data collection

B. Data processing

C. Data communication

D. All of these

Question

Which of the following is (are) example(s) of embedded system for data


communication? USB Mass Storage device
A. Network router

B. Digital camera

C. Music player

D. All of these

E. None of these

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


What are the essential tight constraint/s related to the design metrics of an embedded
system?
A. Ability to fit on a single chip

B. Low power consumption

C. Fast data processing for real-time

operations
D. All of the above

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

A digital multi meter is an example of an embedded system for


A. Data communication

B. Monitoring

C. Control

D. All of these

Question

Which of the following is an (are) example(s) of an embedded system for signal


processing?
A. Apple iPOD (media player device)

B. SanDisk USB mass storage device

C. Both (A) and(B)

D. None of these

Question

The instruction set of RISC processors


A. Simple and lesser in number

B. Complex and lesser in number

C. Simple and larger in number

D. Complex and larger in number

Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Which of the following is true about CISC processors?
A. The instruction set is non-orthogonal

B. The number of general purpose registers is limited

C. Instructions are like macros in c language

D. All of these

Question

.Main processor chip in computers is


A. ASIC
B. ASSP

C. CPU

D. CPLD

Question

.Processors used in many microcontroller products need tobe


A. High power

B. low power

C. low interrupt response

D. low code density

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question
system is a microcontroller or microprocessor based system which

is designed to perform a specific task


A. emededded
B. IOT
C. Processors
D. Both a&b

Question

where are embedded system used?

A. Electronics
B. Home
C. Telecommunication
D. All of the above

Question

Embedded system is designed to accomplished the purpose of combination of


following task?

A. Data collection
B. Data communication
C. Data processing
D. All the above

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Embedded system is designed to accomplished the purpose of combination of


following task?

A. Monitoring the performance of embedded system


B. Control the embedded system
C. Application specific user interface
D. All the above

Question

Architecture of embedded system consist of?

A. Timers
B. Interrupt
C. Sensor
D. All of the above

Question

Architecture of embedded system consist of?

A. Timers
B. Interrupt
C. A-D convertor
D. All of the above

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Architecture of embedded system consist of?

A. Timers
B. Interrupt
C. Processor and ASIC
D. All of the above

Question

Architecture of embedded system consist of?

A. Timers
B. Interrupt
C. D-A Convertor
D. All of the above

Question

Architecture of embedded system consist of?

A. Timers
B. Interrupt
C. Memory

Is this Architecture diagram right or wrong for embedded system?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. True
B. False

Question

For which purpose the sensor is used?

A. Measure the physical quantity


B. To coverts an electric signal
C. To read electric signal
D. All of the above

Question

Which architecture is followed by general purposemicroprocessors?


A. Harvardarchitecture

B. Von Neumannarchitecture

C. None of thementioned

D. All of thementioned

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Which architecture involves both the volatile and the non-volatilememory?
A. Harvardarchitecture

B. Von Neumannarchitecture

C. None of thementioned

D. All of thementioned

Question

Which architecture provides separate buses for program and datamemory?


A. Harvardarchitecture

B. Von Neumannarchitecture

C. None of thementioned

D. All of thementioned

Question

Harvard architecture allows:


A. Separate program and data memory

B. Pipe-ling

C. Complexarchitecture

D. All of thementioned

Question

Which of the following processor architecture supports easier instructionpipelining?


Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
A. Harvard

B. VonNeumann

C. Both ofthem

D. None ofthese

Question

Which of the following is an example for wireless communicationinterface?


A. RS-232C

B. Wi-Fi

C. Bluetooth

D. EEE1394

E. Both (B) and(C)

. Question

ARM standsfor
A. Advanced RISCMachine

B. Advanced RISCMethodology

C. Advanced ReducedMachine

D. Advanced ReducedMethodology

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


The work of A-D converter is?

A. Process signal

B. Convert digital to Analog

C. Both a&b

D. None of these

Question

The embedded system hardware is right or wrong?

A. True

B. False

Question

was developed in the year 1996 by ATMELCorporation


A. PIC

B. AVR

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


C. ARM

D. ASIC

Question

.AVRstandsfor .
A. Advanced VirtualRISC.

B. Alf-EgilBogen and Vegard WollanRISC

C. Both A &B

D. None of theabove

. Question

AVR microcontroller executes most of theinstructionin .


A. Single executioncycle.

B. Double executioncycle.

C. Both A&B

D. None of theabove.

Question

Term "the Internet of things" was coinedby


A. Edward L. Schneider

B. KevinAshton

C. John H.

D. Charles Anthony

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

The huge numbers of devices connected to the Internet of Things have to


communicate automatically, not via humans, what is this called?
A. Bot to Bot(B2B)

B. Machine to Machine(M2M)

C. InterCloud

D. Skynet

Question

What does “Things” in IoT refers to?


A. General device

B. Information

C. IoT devices

D. Object

Question

Interconnection of Internet and computing devices embedded in everyday objects,


enabling them to send and receive data is called
A. Internet of Things

B. Network Interconnection

C. Object Determination

D. None of these

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

is a computing concept that describes the idea of everyday physical objects


being connected to the internet.
A. IOT (Internet of Things)

B. MQTT

C. COAP

D. SPI

Question

devices may support a number of interoperable communication


protocols and communicate with other device and also within frastructure.
A. Artificial Intelligence

B. Machine Learning

C. Internet of Things

D. None of above

Question

Which one is not element of IOT?


A. Process

B. People

C. Security

D. Things

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

IIOT stands for


A. Information Internet of Things

B. Industrial Internet of Things

C. Innovative Internet of Things

D. None of above

Question

Name of the IOT device which is first recognized?


A. Smart Watch

B. ATM

C. Radio

D. Videogame

Question

is used by IOT
A. Radio information technology

B. Satellite

C. Cable

D. Broadband

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

consists of communication protocols for electronic devices, typically a mobile


device and a standard device.
A. RFID

B. MQTT

C. NFC

D. None of above

Question

Refers to establish a proper connection between all the things of IOT.


A. Connectivity

B. Analyzing

C. Sensing

D. Active Engagement

Question

IOT devices which have unique identities and can perform .


A. Remote sensing

B. Actuating

C. Monitoring capabilities

D. All of the above

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

The sensed data communicated .


A. Cloud-based servers/storage.

B. I/Interfaces.

C. Internet connectivity.

D. None of the above

Question

IOT devices are various types, for instance .


A. Wearable sensors.

B. Smart watches.

C. LED lights.

D. All of the above

Question

is a collection of wired Ethernet standard for the link layer.


A. IEEE802.3

B. IEEE802.11

C. IEEE802.16

D. IEEE 802.15.4

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


is a collection of WLAN communication standards.
A. IEEE802.3

B. IEEE802.11

C. IEEE802.16

D. IEEE 802.15.4

Question

is a collection of wireless broadband standards(WiMax).


A. IEEE802.3

B. IEEE802.11

C. IEEE802.16

D. IEEE 802.15.4
Question

is a collection of standards for LR-WPANs.


A. IEEE802.3

B. IEEE802.11

C. IEEE802.16

D. IEEE 802.15.4

Question

LR-WPANs standards from basis of specifications for high level communication


protocol such as .
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
A. Zigbee

B. Allsean

C. Tyrell

D. Microsoft’s Azure

Question

includes GSM and CDMA.


A. 2G

B. 3G

C. 4G

D. None of above

Question

include UMTS andCDMA2000.


A. 2G

B. 3G

C. 4G

D. None of above

Question

layer protocols determine how the data is physically sent over


the network’s physical layer or medium.
A. Application layer

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


B. Transport layer

C. Network layer

D. Link layer

Question

layer perform the host addressing and packet routing.


A. Application layer

B. Transport layer

C. Network layer

D. Link layer

Question

protocols provide end to end message transfer capability independent of the


underlying network.
A. Network layer

B. Transport layer

C. Application layer

D. Link layer

Question

The protocols define how the applications interface with the lower layer protocol to
send the data over the network.
A. Application layer

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


B. Transport layer

C. Network layer

D. Link layer

Question

LOWPAN standsfor
A. 6 LOW Personal Area Network

B. IPv6 LOW Personal Area Network

C. IPv6 over Low power wireless personal area network

D. None of above

Question

Is the diagram of IoT Protocols is true??

A. True

B. False

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


802.3 is the standard for 10BASE5 Ethernet that uses cable as shared
medium.
A. Twisted pair cable

B. Coaxial cable

C. Fiber optic cable

D. None of theabove

Question

IEEE 802.11 standards provide data rates


A. 10Gbit/s.

B. 1 Gbit/s

C. 1 Mb/s to up to 6.75Gb/s

D. 250 Kb/s

Question

of the following is a protocol related to IOT


A. Zigbee

B. 6LoWPAN

C. CoAP

D. All of the above

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP

B. UDP

C. Transport layer

D. None of the above.

Question

protocol uses Universal Resource Identifiers (URIs) to identify HTTP


resources.
A. HTTP

B. COAP

C. Web Socket

D. MQTT

Question

The 10/100Mbit Ethernet support enables the board to connector


A. LAN

B. MAN

C. WAN

D. WLAN

Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Which one out of these is not a data link layer technology?
A. Bluetooth

B. UART

C. Wi-Fi

D. HTTP

Question

What is size of the IPv6Address?


A. 32bits

B. 64bits

C. 128bits

D. 256bits

Question

MQTT stands for


A. MQ Telemetry Things

B. MQ Transport Telemetry

C. MQ Transport Things

D. MQ Telemetry Transport

Question

MQTT is better than HTTP for sending and receiving data.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. True

B. False

Question

MQTT is protocol.
A. Machine to Machine

B. Internet of Things

C. Machine to Machine and Internet of Things

D. Machine Things

Question

Which protocol is lightweight?


A. MQTT

B. HTTP

C. CoAP

D. SPI

Question

MQTT is:
A. Based on client-server architecture

B. Based on publish-subscribe architecture

C. Based on both of the above

D. Based on none of the above


Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Question

XMPP is used for streaming which type of elements?


A. XPL

B. XML

C. XHL

D. MPL

Question

XMPP creates identity.


A. Device

B. Email

C. Message

D. Data

Question

XMPPuses architecture.
A. Decentralized client-server

B. Centralized client-server

C. Message

D. Public/subscriber

Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
What does HTTP do?
A. Enables network resources and reduces perception of latency

B. Reduces perception of latency and allows multiple concurrency exchange

C. Allows multiple concurrent exchange and enables network resources

D. Enables network resources and reduces perception of latency and Allows

multiple concurrent exchange.

Question

HTTP expands?
A. Hyper Text Transfer Protocol

B. Hyper Terminal Transfer Protocol

C. Hyper Text Terminal Protocol

D. Hyper Terminal Text Protocol

Question

CoAP is specialized in
A. Internet applications

B. Device applications

C. Wireless applications

D. Wired applications

Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Which protocol is used to link all the devices in the IoT?
A. TCP/IP

B. Network

C. UDP

D. HTTP

Question

Data in network layer is transferred in the form of


A. Layers

B. Packets

C. Bytes

D. Bits

Question

Services provided by application layer?


A. Web chat

B. Error control

C. Connection services

D. Congestion control

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


TCP and UDP are called?
A. Application protocols

B. Session protocols

C. Transport protocols

D. Network protocols

Question

Security based connection is provided by which layer?


A. Application layer

B. Transport layer

C. Session layer

D. Network layer

Question

Name this diagram?

A. Request response communication model


B. Publish subscribe communication model
C. Push pull communication model
D. Fundamental block of IoT
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Question

Using which layer in transport layer data integrity can be assured?


A. Checksum

B. Repetition codes

C. Cyclic redundancy checks

D. Error correction codes

Question

Transport layer receives data in the form of?


A. Packets

B. Byte streams

C. Bits stream

D. both packet and Byte stream

Question

The network layer is considered as the ?


A. Backbone

B. packets

C. Bytes

D. bits

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


The network layer consists of which hardware devices?
A. Router

B. Bridges

C. Switches

D. All of the above

Question

Network layer protocol exits in ?


A. Host

B. Switches

C. Packets

D. Bridges

Question

Which protocol has a quality ofservice?


A. XMPP

B. HTTP

C. CoAP

D. MQTT

Question

Name this Communication Model?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. Request response communication model
B. Publish subscribe communication model
C. Push pull communication model
D. Fundamental block of IoT

Question

is a data-centric middleware standard for device-to-device and machine-to-


machine communication.
A. Data Distribution Serviced(DDS)

B. Advance Message Queuing Protocol(AMQP)

C. Extensible Messaging and Presence Protocol(XMPP)

D. Message Queue Telemetry Transport(MQTT)

Question

is a bi-directional, fully duplex communication model that uses a persistent


connection between client and server.
A. Request-Response

B. Publish-Subscriber

C. Push-Pull
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
D. Exclusive Pair

Question

is a stateful communication model and server is aware of all open connection.


A. Request-Response

B. Publish-Subscriber

C. Push-Pull

D. Exclusive Pair

Question

Which is not an IoT communication model.


A. Request-Response

B. Publish-Subscribe

C. Push-Producer

D. Exclusive Pair

Question

In Node MCU, MCU stands for .


A. Micro Control Unit

B. Micro Controller Unit

C. Macro Control Unit

D. Macro Controller Unit


Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Question

REST is acronymfor
A. Representational State Transfer

B. Represent State Transfer

C. Representational State Transmit

D. Representational Store Transfer

Question

WSN stands for


A. Wide Sensor Network

B. Wireless Sensor Network

C. Wired Sensor Network

D. None of these

Question

Benefit of cloud computing services


A. Fast

B. Anywhere access

C. Higher utilization

D. All of the above

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Does RPi have an internal memory?


A. True

B. False

Question

What do we use to connect TV to RPi?


A. Male HDMI

B. Female HDMI

C. Male HDMI and Adapter

D. Female HDMI and Adapter

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

PaaS stands for _


A. Platform as a Service

B. Platform as a Survey

C. People as a Service

D. Platform as a Survey

Question

as a Service is a cloud computing infrastructure that creates a


development environment upon which applications may be build.
A. Infrastructure

B. Service

C. Platform

D. All of the mentioned

Question

is a cloud computing service model in which hardware is virtualized in


the cloud.
A. IaaS

B. CaaS

C. PaaS

D. None of the mentioned

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Which of the following is the fundamental unit of virtualized client in an IaaS


deployment?
a) Work unit

b) workspace

c) workload

d) all of the mentioned

Question

offering provides the tools and development environment to deploy


applications on another vendor’s application.
A. PaaS

B. IaaS

C. CaaS

D. All of the mentioned

Question

is the most refined and restrictive service model.


A. IaaS

B. CaaS

C. PaaS

D. All of the mentioned

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

is suitable for IOT applications to have low latency or high throughput


requirements.
A. REST

B. Publish-Subscriber

C. Push-Pull

D. WebSocket

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

is a one of the most popular wireless technologies used byWSNs.


A. Zigbee

B. AllSean

C. Tyrell

D. Z-Wave

Question

Zigbee specification are based on .


A. 802.3
B.802.11
C. 802.16
D. 802.15.4

Question

is a transformative computing paradigm that involves delivering


applications and services over the internet.
A. WSN

B. Cloud Computing

C. Big Data

D. None of above

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


The process of collecting, organizing and collecting large sets of data called as
A. WSN

B. Cloud Computing

C. BigData

D. None of above

Question

Does Raspberry Pi need external hardware?


A. True

B. False

Question

. Name this Communication Model?

A. Request response communication model


B. Publish subscribe communication model
C. Push pull communication model
D. Fundamental block of IoT

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Which instruction set architecture is used in RaspberryPi?


A. X86

B. MSP

C. AVR

D. ARM

Question

Does micro SD card present in all modules?


A. True

B. False

Question

Which characteristics involve the facility the thing to respond in an intelligent


way to a particular situation?
A. Intelligence

B. Connectivity

C. Dynamic Nature

D. Enormous Scale

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Empowers IoT by bringing together everyday objects.
A. Intelligence

B. Connectivity

C. Dynamic Nature

D. Enormous Scale

Question

The collection of data is achieved with changes.


A. Intelligence

B. Connectivity

C. DynamicNature

D. EnormousScale

Question

The number of devices that need to be managed and that communicate with each other
will be much larger.
A. Intelligence

B. Connectivity

C. Dynamic Nature

D. Enormous Scale

Question

in IoT as one of the key characteristics, devices have different


hardware platforms and networks.
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
A. Sensors

B. Heterogeneity

C. Security

D. Connectivity

Question

Devices that transforms electrical signals into physical movements


A. Sensors

B. Actuators

C. Switches

D. Display

Question

Name the Communication model?

A. Request response communication model


B. Publish subscribe communication model
C. Push pull communication model
D. Fundamental block of IoT

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Name the Communication model?

A. Request response communication model


B. Publish subscribe communication model
C. Push pull communication model
D. Exclusive Pair communication model
Question

Which diagram is this?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. Request response model

B. Communication model

C. REST APIs

D. None of the these

Question

Which diagram is this?

A. Request response model

B. Communication model

C. REST APIs

D. None of the these

Question

Is the diagram of WedSocket APIs correct?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. True

B. False

Question

How many levels are there in IoT ?


A. 2

B. 6

C. 5

D. 4

Question

Which level diagram is this?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. Level 3

B. Level 4

C. Level 1

D. Level 6

Question

Which level diagram is this?

A. Level 2

B. Level 4

C. Level 1

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


D. Level 6

Question

Which level diagram is this?

A. Level 2

B. Level 4

C. Level 1

D. Level 3

Question

Which level diagram is this?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. Level 2

B. Level 4

C. Level 1

D. Level 3

Question

Which level diagram is this?

A. Level 2

B. Level 6

C. Level 5

D. Level 3

Question

Which level diagram is this?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. Level 2

B. Level 6

C. Level 5

D. Level 3

Question

Digital forensics is all of them except:


A. Extraction of computer data.

B. Preservation of computerdata.

C. Interpretation of computer data.

D. Manipulation of computer data.

Question

IDIP standsfor
A. Integrated Digital Investigation Process.

B. Integrated Data Investigator Process.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


C. Integrated Digital Investigator Process.

D. Independent Digital Investigator Process.

Question

Who proposed Road Map for Digital Forensic Research (RMDFR)


A. G.Gunsh.

B. S.Ciardhuain

C. J.Korn.

D. G.Palmar

Question

Investigator should satisfy following points:


A. Contribute to society and human being.

B. Avoid harm to others.

C. Honest and trustworthy.

D. All of the above

Question

In the past, the method for expressing an opinion has been to frame a question based
on available factual evidence.
A. Hypothetical

B. Nested

C. Challenging

D. Contradictory

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


More subtle because you are not aware that you are running these macros (the
document opens and the application automatically runs); spread via email
A. The purpose ofcopyright

B. Danger of macro viruses

C. Derivative works

D. computer-specific crime

Question

What is Digital Forensic?


A. Process of using scientific knowledge in analysis and presentation of evidence in

court
B. The application of computer science and investigative procedures for a legal

purpose involving the analysis of digital evidence after proper search


authority, chain of custody, validation with mathematics, use of validated
tools, repeatability, reporting, and possible expert presentation
C. process where we develop and test hypotheses that answer questions about

digital events
D. Use of science or technology in the investigation and establishment of

the factor evidence in a court of law

Question

Digital Forensics entails .


A. Accessing the system's directories viewing mode and navigating through the

various systems files and folders


B. Undulating and recovering lost files

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


C. Identifying and solving computer crimes

D. The identification, preservation, recovery, restoration and presentation of

digital evidence from systems and devices

Question

Which of the following is FALSE?


A. The digital forensic investigator must maintain absolute objectivity

B. It is the investigator’s job to determine someone’s guilt or innocence.

C. It is the investigator’s responsibility to accurately report the relevant facts of

case.
D. The investigator must maintain strict confidentiality, discussing the results of an

investigation on only a “need to know”

Question

What is the most significant legal issue in computer forensics?


A. Preserving Evidence

B. Seizing Evidence

C. Admissibility of Evidence

D. Discovery of Evidence

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

phase includes putting the pieces of a digital puzzle together and


developing investigative hypotheses
A. Preservation phase

B. Survey phase

C. Documentation phase

D. Reconstruction phase

E. Presentation phase

Question

In phase investigator transfers the relevant data from a venue out of physical
or administrative control of the investigator to a controlled location
A. Preservation phase

B. Survey phase

C. Documentation phase

D. Reconstruction phase

E. Presentation phase

Question

In phase investigator transfers the relevant data from a venue out of physical
or administrative control of the investigator to a controlled location
A. Preservation phase

B. Survey phase

C. Documentation phase

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


D. Reconstruction phase

E. Presentation phase

Question

Computer forensics do not involve activity.


A. Preservation of computer data.

B. Extraction of computer data.

C. Manipulation of computerdata.

D. Interpretation of computer data.

Question

A set of instruction compiled into a program that perform a particular task is known
as:
A. Hardware.
B.CPU
C. Motherboard

D. Software

Question

Which of following is not a rule of digital forensics?


A. An examination should be performed on the original data

B. A copy is made onto forensically sterile media. New media should

always be used if available.


Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
C. The copy of the evidence must be an exact, bit-by-bit copy

D. The examination must be conducted in such a way as to prevent any

modification of the evidence.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

To collect and analyze the digital evidence that was obtained from the physical
investigation phase, is the goal of which phase?
A. Physical crime investigation

B. Digital crime investigation.

C. Review phase.

D. Deployment phase.

Question

To provide mechanism to an incident to be detected and confirmed is


purpose of which phase?
A. Physical crime investigation

B. Digital crime investigation.

C. Reviewphase.

D. Deployment phase.

Question

Which phase entails a review of the whole investigation and identifies area of
improvement?
A. Physical crime investigation

B. Digital crime investigation.

C. Review phase.
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
D. Deployment phase

Question

is known as father of computerforensic.


A. Palmar

B. Korn

C. MichaelAnderson

D. S.Ciardhuain.

Question

is well established science where various contribution have beenmade


A. Forensic

B. Crime

C. Cybercrime

D. Evidence

Question

Who proposed End to End Digital Investigation Process (EEDIP)?


E. G.Palmar

F. Stephenson

G. MichaelAnderson

H. S.Ciardhuain

Question
Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend
Which model of Investigation proposed by Carrier ands afford?
A. Extended Model of Cybercrime Investigation (EMCI)
B. Integrated Digital Investigation Process(IDIP)
C. Road Map for Digital Forensic Research(RMDFR)
D. Abstract Digital Forensic Model (ADFM)

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

Which of the following is not a property of computer evidence?


A. Authentic and Accurate.
B. Complete and Convincing.
C. Duplicated and Preserved.
D. Conform and Human Readable.

Question

is software that blocks unauthorized users from connecting to your computer.


A. Firewall
B. Quick lauch
C. One Login
D. Gentrify

Question

Which of following are general Ethical norms for Investigator?


A. To contribute to society and human being.
B. To avoid harm to others.
C. To be honest and trustworthy.
D. All of above

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Which of following are Unethical norms for Investigator?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. All of above

Question

Which of following is not general ethical norm for Investigator?


A. To contribute to society and human being.
B. Uphold any relevant Evidence.
C. To be honest and trustworthy.
D. To honor confidentially.

Question

Which of following is a not unethical norm for Digital Forensics Investigation?


A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

What is called as the process of creation a duplicate of digital media for


purpose of examining it?
A. Acquisition.

B. Steganography.

C. Liveanalysis

D. Hashing.

Question

Which term refers for modifying a computer in a way which was not originally
intended to view Information?
A. Metadata

B. Live analysis

C. Hacking

D. Bit Copy

Question

The ability to recover and read deleted or damaged files from a criminal’s
computer isan example of a law enforcement specialty called?
A. Robotics

B. Simulation

C. Computer Forensics

D. Animation

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question

What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D. EMMC
chip

Question

Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.

Question
Which of this is not a computer crime?
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data

Question
Which file is used to store the user entered password?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


A. .exe
B. .txt
C. .iso
D. .sam

Website : www.apniuniversity.in YouTube Channel : Ur Engineering Friend


Question
is the process of recording as much data as possible to create reports and
analysis on user input.
A. Data mining

B. Data carving

C. Metadata

D. Data Spoofing.

Question

Searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.

Question

What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
. Question

Which of the following statements best describes a white-hat hacker?

A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker

Question

A security audit performed on the internal network of an organization by the


network administration is also known as ___________.

A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing

Question

What is the first phase of hacking?


A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
E. Scanning
Question

What type of ethical hack tests access to the physical infrastructure?

A. Internal network
B. Remote network
C. External network
D. Physical access

Question

The security, functionality, and ease of use triangle illustrate which concept?

A. As security increases, functionality and ease of use increase.


B. As security decreases, functionality and ease of use increase.
C. As security decreases, functionality and ease of use decrease.
D. Security does not affect functionality and ease of use.

Question

Which type of hacker represents the highest risk to your network?

A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
D. Script kiddies
Question

What are the three phases of a security evaluation plan? (Choose three
answers.)

A. Conduct Security Evaluation


B. Preparation
C. Conclusion
D. Final
E. Reconnaissance
F. Design Security
G. Vulnerability Assessment
.

Question

Hacking for a cause is called __________________.

A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
.

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Which federal law is most commonly used to prosecute hackers?

A. Title 12
B. Title 18
C. Title 20
D. Title 2

Question

When a hacker attempts to attack a host via the Internet it is known as what
type of attack?

A. Remote attack
B. Physical access
C. Local access
D. Internal attack

Question

Which are the four regional Internet registries?

A. APNIC, PICNIC, NANIC, RIPE NCC


B. APNIC, MOSTNIC, ARIN, RIPE NCC
C. APNIC, PICNIC, NANIC, ARIN
D. APNIC, LACNIC, ARIN, RIPE NCC

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

Which of the following is a tool for performing footprinting undetected?

A. Whois search
B. Traceroute
C. Ping sweep
D. Host scanning

. Question

Which of the following tools are used for foot printing? (Choose 3 answers.)

A. Whois
B. Sam Spade
C. NMAP
D. SuperScan
E. Nslookup

Question

What is the next step to be performed after footprinting?

A. Scanning
B. Enumeration

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
C. System hacking
D. Active information gathering

Question

How does trace route work?

A. It uses an ICMP destination-unreachable message to elicit the name of a


router.
B. It sends a specially crafted IP packet to a router to locate the number of
hops from the sender to the destination network.
C. It uses a protocol that will be rejected by the gateway to determine the
location.
D. It uses the TTL value in an ICMP message to determine the number of
hops from the sender to the router.

Question

What is foot printing?

A. Measuring the shoe size of an ethical hacker


B. Accumulation of data by gathering information on a target
C. Scanning a target network to detect operating system types
D. Mapping the physical layout of a target’s network

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

Nslookup can be used to gather information regarding which of the


following?

A. Host names and IP addresses


B. Whois information
C. DNS server locations
D. Name server types and operating systems

Question

Which of the following is a type of social engineering?

A. Shoulder surfing
B. User identification
C. System monitoring
D. Face-to-face communication

Question

Which is an example of social engineering?

A. A user who holds open the front door of an office for a potential hacker
B. Calling a help desk and convincing them to reset a password for a user

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
account
C. Installing a hardware key logger on a victim’s system to capture passwords
D. Accessing a database with a cracked password

Question

What is the best way to prevent a social-engineering attack?

A. Installing a firewall to prevent port scans


B. Configuring an IDS to detect intrusion attempts
C. Increasing the number of help-desk personnel
D. Employee training and education

Question

Which of the following is the best example of reverse social engineering?

A. A hacker pretends to be a person of authority in order to get a user to give


them information.
B. A help-desk employee pretends to be a person of authority.
C. A hacker tries to get a user to change their password.
D. A user changes their password.

Question

Using pop-up windows to get a user to give out information is which type of

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
social engineering attack?

A. Human-based
B. Computer-based
C. Nontechnical
D. Coercive

Question

What is it called when a hacker pretends to be a valid user on the system?

A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user

Question

What is the best reason to implement a security policy?

A. It increases security.
B. It makes security harder to enforce.
C. It removes the employee’s responsibility to make judgments.
D. It decreases security.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

Faking a website for the purpose of getting a user’s password and username is
which type of social engineering attack?

A. Human-based
B. Computer-based
C. Web-based
D. User-based

Question

Dumpster diving can be considered which type of social engineering attack?

A. Human-based
B. Computer-based
C. Physical access
D. Paper-based

Question

What port number does FTP use?

A. 21
B. 25
C. 23
D. 80
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question

What port number does HTTPS use?

A. 443
B. 80
C. 53
D. 21

Question

What is war dialing used for?

A. Testing firewall security


B. Testing remote access system security
C. Configuring a proxy filtering gateway
D. Configuring a firewall

Question

Banner grabbing is an example of what?

A. Passive operating system fingerprinting


B. Active operating system fingerprinting
C. Footprinting

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
D. Application analysis

Question

What are the three types of scanning?

A. Port, network, and vulnerability


B. Port, network, and services
C. Grey, black, and white hat
D. Server, client, and network

Question

What is the main problem with using only ICMP queries for scanning?

A. The port is not always available.


B. The protocol is unreliable.
C. Systems may not respond because of a firewall.
D. Systems may not have the service running.

Question

What does the TCP RST command do?

A. Starts a TCP connection


B. Restores the connection to a previous state

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
C. Finishes a TCP connections
D. Resets the TCP connection

Question

What is the proper sequence of a TCP connection?

A. SYN-SYN ACK-ACK
B. SYN-ACK-FIN
C. SYN-SYNACK-ACK
D. SYN-PSH-ACK

Question

A packet with all flags set is which type of scan?

A. Full Open
B. Syn scan
C. XMAS
D. TCP connect

Question

What is the proper command to perform and NMAP SYN scan every 5
minutes?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
A. nmap -ss – paranoid
B. nmap -Ss -paranoid
C. nmap -Ss -fast
D. namp -Ss -sneaky

Question

In order to prevent a hacker from using SMB session hijacking, which TCP
and UDP ports would you block at the firewall?

A. 167 and 137


B. 80 and 23
C. 139 and 445
D. 1277 and 1270

Question

Why would an attacker want to perform a scan on port 137?

A. To locate the FTP service on the target host


B. To check for file and print sharing on Windows systems
C. To discover proxy servers on a network
D. To discover a target system with the NetBIOS null session vulnerability

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
SNMP is a protocol used to manage network infrastructure devices. What is
the SNMP read/write community name used for?

A. Viewing the configuration information


B. Changing the configuration information
C. Monitoring the device for errors
D. Controlling the SNMP management station

Question

Why would the network security team be concerned about ports 135–139
being open on a system?

A. SMB is enabled, and the system is susceptible to null sessions.


B. SMB is not enabled, and the system is susceptible to null sessions.
C. Windows RPC is enabled, and the system is susceptible to Windows
DCOM remote sessions.
D. Windows RPC is not enabled, and the system is susceptible to Windows
DCOM remote sessions.

Question

Which step comes after enumerating users in the CEH hacking cycle?

A. Crack password
B. Escalate privileges
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
C. Scanning
D. Covering tracks

Question

What is enumeration?

A. Identifying active systems on the network


B. Cracking passwords
C. Identifying users and machine names
D. Identifying routers and firewalls

Question

What is a command-line tool used to look up a username from a SID?

A. UsertoSID
B. Userenum
C. SID2User
D. Getacct

Question

Which tool can be used to perform a DNS zone transfer on Windows?

A. nslookup

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
B. DNSlookup
C. whois
D. ipconfig

Question

What is a null session?

A. Connecting to a system with the administrator username and password


B. Connecting to a system with the admin username and password
C. Connecting to a system with a random username and password
D. Connecting to a system with no username and password

Question

What is a countermeasure for SNMP enumeration?

A. Remove the SNMP agent from the device.


B. Shut down ports 135 and 139 at the firewall.
C. Shut down ports 80 and 443 at the firewall.
D. Enable SNMP read-only security on the agent device.

Question

What is the process of hiding text within an image called?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
A. Steganography
B. Encryption
C. Spyware
D. Keystroke logging

Question

What is a rootkit?

A. A simple tool to gain access to the root of the Windows system


B. A Trojan that sends information to an SMB relay
C. An invasive program that affects the system files, including the kernel and
libraries
D. A tool to perform a buffer overflow

Question

Why would hackers want to cover their tracks?

A. To prevent another person from using the programs they have installed on
a target system
B. To prevent detection or discovery
C. To prevent hacking attempts
D. To keep other hackers from using their tools

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
What is privilege escalation?

A. Creating a user account with higher privileges


B. Creating a user account with Administrator privileges
C. Creating two user accounts: one with high privileges and one with lower
privileges
D. Increasing privileges on a user account

Question

What are two methods used to hide files? (Choose all that apply.)

A. NTFS file streaming


B. Attrib command
C. Steganography
D. Encrypted File System

Question

What is the recommended password-change interval?

A. 30 days
B. 20 days
C. 1 day
D. 7 days

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

What type of password attack would be most successful against the password
T63k#s23A?

A. Dictionary
B. Hybrid
C. Password guessing
D. Brute force

Question

Which of the following is a passive online attack?

A. Password guessing
B. Network sniffing
C. Brute-force attack
D. Dictionary attack

Question

Why is it necessary to clear the event log after using the auditpol command to
turn off logging?

A. The auditpol command places an entry in the event log.


B. The auditpol command doesn’t stop logging until the event log has been
cleared.
C. auditpol relies on the event log to determine whether logging is taking
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
place.
D. The event log doesn’t need to be cleared after running the auditpol
command.

Question

What is necessary in order to install a hardware key logger on a target system?

A. The IP address of the system


B. The Administrator username and password
C. Physical access to the system
D. Telnet access to the system

Question

What is a wrapper?

A. A Trojan system
B. A program used to combine a Trojan and legitimate software into a single
executable
C. A program used to combine a Trojan and a backdoor into a single
executable
D. A way of accessing a Trojan system

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
What is the difference between a backdoor and a Trojan?

A. A Trojan usually provides a backdoor for a hacker.


B. A backdoor must be installed first.
C. A Trojan is not a way to access a system.
D. A backdoor is provided only through a virus, not through a Trojan.

Question

What port does Tini use by default?

A. 12345
B. 71
C. 7777
D. 666

Question

Which is the best Trojan and backdoor countermeasure?

A. Scan the hard drive on network connection, and educate users not to install
unknown software.
B. Implement a network firewall.
C. Implement personal firewall software.
D. Educate systems administrators about the risks of using systems without
firewalls.
E. Scan the hard drive on startup.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

How do you remove a Trojan from a system?

A. Search the Internet for freeware removal tools.


B. Purchase commercially available tools to remove the Trojan.
C. Reboot the system.
D. Uninstall and reinstall all applications.

Question

What is ICMP tunneling?

A. Tunneling ICMP messages through HTTP


B. Tunneling another protocol through ICMP
C. An overt channel
D. Sending ICMP commands using a different protocol

Question

What is reverse WWW shell?

A. Connecting to a website using a tunnel

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
B. A Trojan that connects from the server to the client using HTTP
C. A Trojan that issues command to the client using HTTP
D. Connecting through a firewall

Question

What is a covert channel?

A. Using a communications channel in a way that was not intended


B. Tunneling software
C. A Trojan removal tool
D. Using a communications channel in the original, intended way

Question

What is the purpose of system-file verification?

A. To find system files


B. To determine whether system files have been changed or modified
C. To find out if a backdoor has been installed
D. To remove a Trojan

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Which of the following is an example of a covert channel?

A. Reverse WWW shell


B. Fire walking
C. SNMP enumeration
D. Steganography

Question

What is the difference between a virus and a worm?

A. A virus can infect the boot sector but a worm cannot.


B. A worm spreads by itself but a virus must attach to an e-mail.
C. A worm spreads by itself but a virus must attach to another program.
D. A virus is written in C++ but a worm is written in shell code.

Question

What type of virus modifies itself to avoid detection?

A. Stealth virus
B. Polymorphic virus
C. Multipartite virus
D. Armored virus

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Which virus spreads through Word macros?

A. Melissa
B. Slammer
C. Sobig
D. Blaster

Question

Which worm affects SQL servers?

A. Sobig
B. SQL Blaster
C. SQL Slammer
D. Melissa

Question

Armored viruses are ___________.

A. Hidden
B. Tunneled
C. Encrypted
D. Stealth

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

What are the three methods used to detect a virus?

A. Scanning
B. Integrity checking
C. Virus signature comparison
D. Firewall rules
E. IDS anomaly detection
F. Sniffing

Question

What components of a system do viruses infect?

A. Files
B. System sectors
C. Memory
D. CPU
E. DLL files

Question

All anomalous behavior can be attributed to a virus.

A. True
B. False
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question

A virus that can cause multiple infections is know as what type of virus?

A. Multipartite
B. Stealth
C. Camouflage
D. Multi-infection

Question

A way to evade an antivirus program is to do what?

A. Write a custom virus script.


B. Write a custom virus signature.
C. Write a custom virus evasion program.
D. Write a custom virus detection program.

Question

What is sniffing?

A. Sending corrupted data on the network to trick a system


B. Capturing and deciphering traffic on a network
C. Corrupting the ARP cache on a target system
D. Performing a password-cracking attack

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

What is a countermeasure to passive sniffing?

A. Implementing a switched network


B. Implementing a shared network
C. ARP spoofing
D. Port-based security

Question

What type of device connects systems on a shared network?

A. Routers
B. Gateways
C. Hubs
D. Switches

Question

Which of the following is a countermeasure to ARP spoofing?

A. Port-based security
B. WinTCPkill
C. Ethereal
D. MAC-based security
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question

What is dsniff?

A. A MAC spoofing tool


B. An IP address spoofing tool
C. A collection of hacking tools
D. A sniffer

Question

At what layer of the OSI model is data formatted into packets?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

Question

What is snort?

A. An IDS and packet sniffer


B. Only an IDS
C. Only a packet sniffer
D. Only a frame sniffer

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

What mode must a network card operate in to perform sniffing?

A. Shared
B. Unencrypted
C. Open
D. Promiscuous

Question

The best defense against any type of sniffing is ____________.

A. Encryption
B. A switched network
C. Port-based security
D. A good security training program

Question

For what type of traffic can winsniffer capture passwords? (Choose all that
apply.)

A. POP3
B. SMTP

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
C. HTTP
D. HTTPS

Question

Which is a method to prevent Denial of Service attacks?

A. Static routing
B. Traffic filtering
C. Firewall rules
D. Personal firewall

Question

What is a zombie?

A. A compromised system used to launch a DDoS attack


B. The hacker’s computer
C. The victim of a DDoS attack
D. A compromised system that is the target of a DDoS attack

Question

The Trinoo tool uses what protocol to perform a DoS attack?

A. TCP

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
B. IP
C. UDP
D. HTTP

Question

What is the first phase of a DDoS attack?

A. Intrusion
B. Attack
C. DoS
D. Finding a target system

Question

Which tool can run eight different types of DoS attacks?

A. Ping of Death
B. Trinoo
C. Targa
D. TFN2K

Question

What is a smurf attack?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
A. Sending a large amount of ICMP traffic with a spoofed source address
B. Sending a large amount of TCP traffic with a spoofed source address
C. Sending a large number of TCP connection requests with a spoofed source
address
D. Sending a large number of TCP connection requests

Question

What is a LAND attack?

A. Sending oversized ICMP packets


B. Sending packets to a victim with a source address set to the victim’s IP
address
C. Sending packets to a victim with a destination address set to the victim’s IP
address
D. Sending a packet with the same source and destination address

Question

What is the Ping of Death?

A. Sending packets that, when reassembled, are too large for the system to
understand
B. Sending very large packets that cause a buffer overflow
C. Sending packets very quickly to fill up the receiving buffer
D. Sending TCP packet with the fragment offset out of bounds

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

How does a Denial of Service attack work?

A. Cracks passwords, causing the system to crash


B. Imitates a valid user
C. Prevents a legitimate user from using a system or service
D. Attempts to break the authentication method

Question

What is the goal of a Denial of Service attack?

A. Capture files from a remote system


B. Incapacitate a system or network
C. Exploit a weakness in the TCP/IP stack
D. Execute a Trojan using the hidden shares

Question

Which of the following tools is only for Sun Solaris systems?

A. Juggernaut
B. T-Sight
C. IP Watcher
D. TTYWatcher

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

What is a sequence number?

A. A number that indicates where a packet falls in the data stream


B. A way of sending information from the sending to the receiving station
C. A number that the hacker randomly chooses in order to hijack a session
D. A number used in reconstructing UDP session

Question

What type of information can be obtained during a session-hijacking attack?


(Choose all that apply.)

A. Passwords
B. Credit card numbers
C. Confidential data
D. Authentication information

Question

Which of the following is essential information to a hacker performing a


session-hijacking attack?

A. Session ID
B. Session number
C. Sequence number
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
D. Source IP address

Question

Which of the following is a session-hijacking tool that runs on Linux


operating systems?

A. Juggernaut
B. Hunt
C. TTYWatcher
D. TCP Reset Utility

Question

Which of the following is the best countermeasure to session hijacking?

A. Port filtering firewall


B. Encryption
C. Session monitoring
D. Strong passwords

Question

Which of the following best describes sniffing?

A. Gathering packets to locate IP addresses, in order to initiate a session-

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
hijacking attack
B. Analyzing packets in order to locate the sequence number to start a session
hijack
C. Monitoring TCP sessions in order to initiate a session-hijacking attack
D. Locating a host susceptible to a session-hijack attack

Question

What is session hijacking?

A. Monitoring UDP session


B. Monitoring TCP sessions
C. Taking over UDP sessions
D. Taking over TCP sessions

Question

What types of packets are sent to the victim of a session-hijacking attack to


cause them to close their end of the connection?

A. FIN and ACK


B. SYN or ACK
C. SYN and ACK
D. FIN or RST

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
What is an ISN?

A. Initiation Session Number


B. Initial Sequence Number
C. Initial Session Number
D. Indication Sequence Number

Question

Which of the following are types of HTTP web authentication? (Choose all
that apply.)

A. Digest
B. Basic
C. Windows
D. Kerberos

Question

Which of the following is a countermeasure for a buffer overflow attack?

A. Input field length validation


B. Encryption
C. Firewall
D. Use of web forms

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

A hardware device that displays a login that changes every 60 seconds is


known as
a/an _________.

A. Login finder
B. Authentication server
C. Biometric authentication
D. Token

Question

Which is a common web server vulnerability?

A. Limited user accounts


B. Default installation
C. Open shares
D. No directory access

Question

A password of P@SSWORD can be cracked using which type of attack?

A. Brute force
B. Hybrid
C. Dictionary
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
D. Zero day exploit

Question

Which of the following is a countermeasure for authentication hijacking?

A. Authentication logging
B. Kerberos
C. SSL
D. Active Directory

Question

Why is a web server more commonly attacked than other systems?

A. Always accessible
B. Does not require much hacking ability
C. Difficult to exploit
D. Simple to exploit

Question

A client-server program that resides on a web server is called a/an


____________.

A. Internet program

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
B. Web application
C. Patch
D. Configuration file

Question

Which is a countermeasure to a directory-traversal attack?

A. Enforce permissions to folders.


B. Allow everyone access to the default page only.
C. Allow only registered users to access the home page of a website.
D. Make all users log in to access folders.

Question

What is it called when a hacker inserts programming commands into a web


form?

A. Form tampering
B. Command injection
C. Buffer overflow
D. Web form attack

Question

Entering Password::blah’ or 1=1- into a web form in order to get a password

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
is an example of what type of attack?

A. Buffer overflow
B. Heap-based overflow
C. Stack-based overflow
D. SQL injection

Question

Replacing NOPs with other code in a buffer-overflow mutation serves what


purpose?

A. Bypassing an IDS
B. Overwriting the return pointer
C. Advancing the return pointer
D. Bypassing a firewall

Question

Which of the following is used to store dynamically allocated variables?

A. Heap overflow
B. Stack overflow
C. Heap
D. Stack

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
What is the first step in a SQL injection attack?

A. Enter arbitrary commands at a user prompt.


B. Locate a user input field on a web page.
C. Locate the return pointer.
D. Enter a series of NOPs.

Question

What command is used to retrieve information from a SQL database?

A. INSERT
B. GET
C. SET
D. SELECT

Question

Which of the following is a countermeasure for buffer overflows?

A. Not using single quotes


B. Securing all login pages with SSL
C. Bounds checking
D. User validation

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

What does NOP stand for?

A. No Operation
B. Network Operation Protocol
C. No Once Prompt
D. Network Operation

Question

A hacker needs to be familiar with the memory address space and techniques
of buffer overflows
in order to launch a buffer overflow attack.

A. True
B. False

Question

Why are many programs vulnerable to SQL injection and buffer overflow
attacks?

A. The programs are written quickly and use poor programming techniques.
B. These are inherent flaws in any program.
C. The users have not applied the correct service packs.
D. The programmers are using the wrong programming language.
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question

Which command would a hacker enter in a web form field to obtain a


directory listing?

A. Blah’;exec master..xp_cmdshell “dir *.*”–


B. Blah’;exec_cmdshell “dir c:\*.* /s >c:\directory.txt”–
C. Blah’;exec master..xp_cmdshell “dir c:\*.* /s >c:\directory.txt”–
D. Blah’;execcmdshell “dir c:\*.* “–

Question

What are two types of buffer overflow attacks?

A. Heap and stack


B. Heap and overflow
C. Stack and memory allocation
D. Injection and heap

Question

Which of the following security solutions uses the same key for both
encryption and authentication?

A. WPA
B. WPA2
C. WEP
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
D. 802.11i

Question

WEP stands for what?

A. Wireless Encryption Protocol


B. Wired Equivalent Privacy
C. Wireless Encryption Privacy
D. Wired Encryption Protocol

Question

What makes WEP crackable?

A. Same key used for encryption and authentication


B. Length of the key
C. Weakness of IV
D. RC4

Question

Which form of encryption does WPA use?

A. AES
B. TKIP

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
C. LEAP
D. Shared key

Question

Which form of authentication does WPA2 use?

A. Passphrase only
B. 802.1x/EAP/RADIUS
C. Passphrase or 802.1x/EAP/RADIUS
D. AES

Question

802.11i is most similar to which wireless security standard?

A. WPA2
B. WPA
C. TKIP
D. AES

Question

Which of the following is a layer 3 security solution for WLANs?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
A. MAC filter
B. WEP
C. WPA
D. VPN

Question

A device that sends deauth frames is performing which type of attack against
the WLAN?

A. Denial of Service
B. Cracking
C. Sniffing
D. MAC spoofing

Question

The most dangerous type of attack against a WLAN is _______________.

A. WEP cracking
B. Rogue access point
C. Eavesdropping
D. MAC spoofing

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
802.11i is implemented at which layer of the OSI model?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 7

Question

Who is responsible for implementing physical security? (Choose all that


apply.)

A. The owner of the company


B. Chief information officer
C. IT managers
D. Employees

Question

What factor does impact physical security?

A. Encryption in use on the network


B. Flood or fire
C. IDS implementation
D. Configuration of firewall

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Which of the following is an example of a physical security breach?

A. Capturing a credit card number from a web server application


B. Hacking a SQL server in order to locate a credit card number
C. Stealing a laptop to acquire credit card numbers
D. Sniffing a credit card number from packets sent on a wireless hotspot

Question

What type of attack can be performed once a hacker has physical access?

A. Finding passwords by dumpster diving


B. Stealing equipment
C. Performing a DoS attack
D. Session hijacking

Question

What does LKM stand for?

A. Linux Kernel Module


B. Linux Kernel Mode
C. Linked Kernel Module
D. Last Kernel Mode

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

What GCC command is used to compile a C++ file called source into an
executable file called game ?

A. g++ source.c –o game


B. gccsource.c –o game
C. gcc make source.cpp –o game
D. g++ source.cpp –o game

Question

What is the command to deny all users access from the network?

A. Cat “All:All”>> /etc/hosts.deny


B. Set “All:All”>> /etc/hosts.deny
C. IP deny “All:All”
D. Cat All:All deny

Question

Of the following, which are common commercial Linux distributions?

A. SUSE, Knark, and Red Hat


B. SUSE, Adore, Debian, and Mandrake
C. SUSE, Debian, and Red Hat
D. SUSE, Adore, and Red Hat
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question

What is a Linux live CD?

A. A Linux operating system that runs from CD


B. A Linux operating system installed from a CD onto a hard drive
C. A Linux tool that runs applications from a CD
D. A Linux application that makes CDs

Question

What type of attack can be disguised as an LKM?

A. DoS
B. Trojan
C. Spam virus
D. Rootkit

Question

Which of the following is a reason to use Linux?

A. Linux has no security holes.


B. Linux is always up to date on security patches.
C. No rootkits can infect a Linux system.
D. Linux is flexible and can be modified.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
Question

Which of the following is not a way to harden Linux?

A. Physically secure the system.


B. Maintain a current patch level.
C. Change the default passwords.
D. Install all available services.

Question

What type of file is used to create a Linux live CD?

A. ISO
B. CD
C. LIN
D. CDFS

Question

Why is it important to use a known good distribution of Linux?

A. Source files can become corrupt if not downloaded properly.


B. Only certain distributions can be patched.
C. Source files can be modified, and a Trojan or backdoor may be included in
the source binaries of some less-known or free distributions of Linux.

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
D. Only some versions of Linux are available to the public.

Question

A system that performs attack recognition and alerting for a network is what?

A. HIDS
B. NIDS
C. Anomaly detection HIDS
D. Signature-based NIDS

Question

Which of the following tools bypasses a firewall by sending one byte at a


time in the IP header?

A. Honeyd
B. Nessus
C. Covert_TCP
D. 007 shell
E. TCP to IP hide

Question

Which of the following is a honeypot-detection tool?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
A. Honeyd
B. Specter
C. KFSensor
D. Sobek

Question

Which of the following is a system designed to attract and identify hackers?

A. Honeypot
B. Firewall
C. Honeytrap
D. IDS

Question

Which of the following is a tool used to modify an attack script to bypass an


IDS’s signature detection?

A. ADMutate
B. Script mutate
C. Snort
D. Specter

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
What is a reverse WWW shell?

A. A web server making a reverse connection to a firewall


B. A web client making a connection to a hacker through the firewall
C. A web server connecting to a web client through the firewall
D. A hacker connecting to a web server through a firewall

Question

A reverse WWW shell connects to which port on a hacker’s system?

A. 80
B. 443
C. 23
D. 21

Question

What is the command to install and run Snort?

A. snort –l c:\snort\log –c C:\snort\etc\snoft.conf –A console


B. snort –c C:\snort\etc\snoft.conf –A console
C. snort –c C:\snort\etc\snoft.conf console
D. snort –l c:\snort\log –c –A

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
What type of program is Snort?

A. NIDS
B. Sniffer, HIDS, and traffic-logging tool
C. Sniffer and HIDS
D. NIDS and sniffer

Question

What are the ways in which an IDS is able to detect intrusion attempts?
(Choose all that apply.)

A. Signature detection
B. Anomaly detection
C. Traffic identification
D. Protocol analysis

Question

How many keys exist is in a public/private key pair?

A. 1
B. 2
C. 3
D. 4
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question

How many keys are needed for symmetric key encryption?

A. 1
B. 2
C. 3
D. 4

Question

Which of the following key lengths would be considered uncrackable?


(Choose all that apply.)

A. 512
B. 256
C. 128
D. 64

Question

What algorithm outputs a 128-bit message digest regardless of the length of


the input?

A. SHA
B. MD5
C. RC4
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
D. RC6

Question

What algorithm outputs a 160-bit key with variable-length input?

A. SHA
B. MD5
C. RC4
D. RC6

Question

Which algorithm is used in the digital signature process?

A. RC4
B. RC5
C. Blowfish
D. MD5

Question

What is cryptography?

A. The study of computer science


B. The study of mathematics

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
C. The study of encryption
D. The creation of encryption algorithms

Question

What is the process of replacing some characters with others in an encryption


key?

A. Transposition
B. Subtraction
C. Substitution
D. Transrelation

Question

Data encrypted with the server’s public key can be decrypted with which key?

A. Server’s public key


B. Server’s private key
C. Client’s public key
D. Client’s private key

Question

Which type of encryption is the fastest to use for large amounts of data?

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
A. Symmetric
B. Public
C. Private
D. Asymmetric

Question

What is the purpose of a pen test?

A. To simulate methods that intruders take to gain escalated privileges


B. To see if you can get confidential network data
C. To test the security posture and policies and procedures of an organization
D. To get passwords

Question

Security assessment categories include which of the following? (Choose all


that apply.)

A. White-hat assessments
B. Vulnerability assessments
C. Penetration testing
D. Security audits
E. Black-hat assessments

Question

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
What type of testing is the best option for an organization that can benefit
from the experience of a security professional?

A. Automated testing tools


B. White-hat and black-hat testing
C. Manual testing
D. Automated testing

Question

Which type of audit tests the security implementation and access controls in
an organization?

A. A firewall test
B. A penetration test
C. An asset audit
D. A systems audit

Question

What is the objective of ethical hacking from the hacker’s prospective?

A. Determine the security posture of the organization.


B. Find and penetrate invalid parameters.
C. Find and steal available system resources.
D. Leave marks on the network to prove they gained access
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
Question

What is the first step of a pen test?

A. Create a map of the network by scanning.


B. Locate the remote access connections to the network.
C. Sign a scope of work, NDA, and liability release document with the client.
D. Perform a physical security audit to ensure the physical site is secure.

Question

Which tools are not essential in a pen tester’s toolbox?

A. Password crackers
B. Port scanning tools
C. Vulnerability scanning tools
D. Web testing tools
E. Database assessment tools
F. None of the above

Question

What are not the results to be expected from a pre-attack passive


reconnaissance phase? (Choose all that apply.)

A. Directory mapping
B. Competitive intelligence gathering
Website : www.apniuniversity.in YouTube Channel : Ur Engineering
Friend
C. Asset classification
D. Acquiring the target
E. Product/service offerings
F. Executing, implanting, and retracting
G. Social engineering

Question

Once the target has been acquired, what is the next step for a company that
wants to confirm the vulnerability was exploited? (Choose all that apply.)

A. Use tools that will exploit a vulnerability and leave a mark.


B. Create a report that tells management where the vulnerability exists.
C. Escalate privileges on a vulnerable system.
D. Execute a command on a vulnerable system to communicate to another
system on the network and leave a mark.

Question

An assessment report for management may include suggested fixes or


corrective measures.

A. True
B. False

Website : www.apniuniversity.in YouTube Channel : Ur Engineering


Friend
This is not the End, but the Beginning

Thank You

Social Media Handle:

Website : www.apniuniversity.in

YouTube Channel Name – Ur Engineering Friend


Instagram – www.instagram.com/ur.engineering.friend
WhatsApp - +91 9142768230
lOMoARcPSD|14293917

MCQ for Class Test 2 - Eti

electronincs and communication (Maharaja Surajmal Brij University)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)
lOMoARcPSD|14293917

______ comprise of large portion of hacker attacks simply because every


computer has one and so well know exploits can be used against them
A) Nontechnical attacks
B) Network infrastructure attack
C) Operating system attack
D) Application and other specialized attack
ANSWER: C

______ Exploits that involves manipulating people and user even your self
are the greatest vulnerability within any computer
A) Nontechnical attacks
B) Network infrastructure attack
C) Operating system attack
D) Application and other specialized attack
ANSWER: A

______ is the art of exploiting the human elements to gain access to the
authorized user.
A) Social Engineering.
B) IT Engineering.
C) Ethical Hacking.
D) None of the above.
ANSWER: A

______ should be done before ethical hacking process.


A) Data gathering.
B) Attacking
C) Planning
D) Research
ANSWER: C

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

_______ are part of organized crime on internet.


A) Criminal
B) Antinationalist
C) Hacker for hire
D) None of the above
ANSWER: C

_______ is a person who find and exploits the weakness in computer system.
A) Victim
B) Hacker
C) Developer
D) None of the above.
ANSWER: B

___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
A) Automated apps
B) Database software
C) Malware
D) Worms
ANSWER: C

_______can create false feeling of safety


A) Firewall
B) Encryption
C) VNPs
D) All the above
ANSWER: D

Which tool is used to crack the password?

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A) Nmap
B) LC4
C) ToneLOC
D) Nessus
ANSWER: B

A black hat hacker is the one who _______


A) Fix identifies weakness
B) Steal the data
C) Identifies the weakness and leave message to owner
D) None of the above.
ANSWER: B

A grey hat hacker is the one who_______


A) Fix identifies weakness
B) Steal the data
C) Identifies the weakness and leave message to owner
D) None of the above
ANSWER: C

A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
A) privacy and security
B) rules and regulations
C) hacking techniques
D) ethics to talk to seniors
ANSWER: A

A white hat hacker is the one who _____


A) Fix identifies weakness

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B) Steal the data


C) Identifies the weakness and leave message to owner
D) None of the above
ANSWER: A

Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
A) Know the nature of the organization
B) Characteristics of work done in the firm
C) System and network
D) Type of broadband company used by the firm
ANSWER: D

Computer Hackers have been in existence for more than a____.


A) Decade.
B) Year.
C) Century
D) Era.
ANSWER: C

Connecting into network through a rogue modem attached to computer


behind a firewall is an example of ____
A) Nontechnical attacks
B) Network infrastructure attack
C) Operating system attack
D) Application and other specialized attack
ANSWER: B

Ethical hacking consist of _______


A) Penetration testing.
B) Intrusion testing.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C) Red teaming.
D) All of the above.
ANSWER: D

Ethical Hacking is also known as _____


A) Black Hat Hacking.
B) White Hat Hacking.
C) Encryption.
D) None of these.
ANSWER: B

Ethical hacking will allow to____ all the massive security breaches.
A) Remove.
B) Measure.
C) Reject.
D) None of these.
ANSWER: B

Hackers do hack for?


A) Fame.
B) Profit.
C) Revenge.
D) All the above
ANSWER: D

Malicious attacker often think like?


A) Thieves
B) Kidnapper
C) Both A &amp;amp; B
D) None of the above

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

ANSWER: C

Performing a shoulder surfing in order to check other’s password is


____________ ethical practice.
A) a good
B) not so good
C) very good social engineering practice
D) a bad
ANSWER: D

Security audits are usually based on___


A) Entries.
B) Checklists.
C) Both A &amp;amp; B
D) None of the above
ANSWER: B

The intent of ethical hacker is to discover vulnerabilities from a_____ point of


view to better secure system.
A) Victims.
B) Attackers.
C) Both A &amp;amp; B
D) None of these.
ANSWER: B

The legal risks of ethical hacking include lawsuits due to __________ of


personal data.
A) stealing
B) disclosure
C) deleting
D) hacking

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

ANSWER: B

The term cracker refers to_____


A) Black hat hacker.
B) White hat hacker.
C) Grey hat hacker.
D) None of the above.
ANSWER: A

To catch a thief, think like _____


A) Police
B) Forensics
C) Thief
D) Hacker
ANSWER: C

Tool(s) used by ethical hacker_____.


A) Scanner
B) Decoder
C) Proxy
D) All of these.
ANSWER: D

Vulnerability scanning in Ethical hacking finds_____.


A) Strengths.
B) Weakness.
C) A &amp;amp;B
D) None of these.
ANSWER: B

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Which hacker refers to ethical hacker?


A) Black hat hacker.
B) White hat hacker.
C) Grey hat hacker.
D) None of the above.
ANSWER: B

Which hacker try to distribute political or social message through their


work?
A) Black hat hacker
B) Hactivist
C) Script kiddes
D) White hat hacker
ANSWER: B

Which magazines releases the latest hacking methods?


A) 2600
B) Hackin9
C) PHRACK
D) All the above
ANSWER: D

Which permission is necessary before ethical hacking?


A) Written permission.
B) Decision maker permission
C) Privacy permission
D) Risk permission.
ANSWER: A

Which tool is used for depth analysis of a web application?

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A) Whisker
B) Super scan
C) Nikto
D) Kismet
ANSWER: A

Which tool is used to encrypt Email?


A) WebInspect
B) QualyGuard
C) PGP (pretty good privacy)
D) None of the above.
ANSWER: C

Who described a dissertation on fundamentals of hacker’s attitude?


A) G. Palma.
B) Raymond.
C) Either.
D) Jhon Browman.
ANSWER: B

____ attack, which can take down your Internet connection or your entire
network.
A) MAC
B) DOS
C) IDS
D) None of above
ANSWER: B

____ include phishing, SQL injection, hacking, social engineering,


spamming, denial of service attacks, Trojans, virus and worm attacks.
A) Operating system vulnerabilities

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B) Web vulnerabilities
C) Wireless network vulnerabilities
D) Network infrastructure vulnerabilities
ANSWER: D

_____ generally refers to unauthorized intrusion into a computer or a


network.
A) Hacking
B) Evidence
C) Tracing
D) None of above
ANSWER: A

_____ is used for searching of multiple hosts in order to target just one
specific open port.
A) Ping Sweep
B) Port scan
C) Ipconfig
D) Spamming
ANSWER: A

_____ protocol is used for network monitoring.


A) FTP
B) SNMP
C) RELNET
D) ARP
ANSWER: A

________ is a popular tool used for network analysis in multiprotocol diverse


network
A) Snort

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B) SuperScan
C) Burp Suit
D) EtterPeak
ANSWER: D

_________ is not a function of network analyser tool.


A) Captures all network traffic
B) Interprets or decodes what is found into a human-readable format.
C) Displays it all in chronological order.
D) Banner grabbing
ANSWER: D

__________ is a popular IP address and port scanner.


A) Cain and Abel
B) Snort
C) Angry IP Scanner
D) Ettercap
ANSWER: C

___________ scans TCP ports and resolves different hostnames.


A) SuperScan
B) Snort
C) Ettercap
D) QualysGuard .
ANSWER: A

______________ framework made cracking of vulnerabilities easy like point


and click.
A) Net

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B) Metasploit
C) Zeus
D) Ettercap
ANSWER: B

_________is a popular tool used for discovering network as well as security


auditing.
A) Ettercap
B) Metasploit
C) Nmap
D) Burp Suit
ANSWER: C

A type of attack that overloads the resources of a single system to cause it to


crash or hang.
A) Resource Starvation
B) Active Sniffing
C) Passive Sniffing
D) Session Hijacking
ANSWER: C

Air cracking is used for ____________


A) Firewall bypassing
B) Wi-Fi attacks
C) Packet filtering
D) System password cracking
ANSWER: B

An attacker can create an________attack by sending hundreds or thousands


of e-mails a with very large attachments.
A) Connection Attack

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B) Auto responder Attack


C) Attachment Overloading Attack
D) All the above
ANSWER: B

ARP spoofing is often referred to as_____


A) Man in the Middle attack
B) Denial of Service attack
C) Sniffing
D) Spoofing
ANSWER: A

Attempting to gain access to a network using an employee’s credentials is


called the _____________ mode of ethical hacking.
A) Local networking
B) Social engineering
C) Physical entry
D) Remote networking
ANSWER: A

Banner grabbing is used for


A) White Hat Hacking
B) Black Hat Hacking
C) Grey Hat Hacking
D) Script Kiddies
ANSWER: A

DOS stands for


A) Detection of system
B) Denial of Service

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

C) Detection of service
D) None of above
ANSWER: B

Enumeration is part of what phase of ethical hacking?


A) Reconnaissance
B) Maintaining Access
C) Gaining Access
D) Scanning
ANSWER: C

Hacking for a cause is called______


A) hacktivism
B) black-hat hacking
C) active hacking
D) activism
ANSWER: A

IDS stands for ____


A) Intrusion detection system
B) Information documentation service
C) Intrusion documentation system
D) None of above
ANSWER: A

In computer networking, ____ is any technical effort to manipulate the


normal behavior of network connections and connected systems.
A) Hacking
B) Evidence
C) Tracing

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D) None of above
ANSWER: A

Key loggers are form of


A) Spyware
B) Shoulder surfing
C) Trojan
D) Social engineering
ANSWER: A

Network consist devices such as routers, firewalls, hosts that you must
assess as a part of ______ process.
A) Prackers
B) Black hat hacking
C) Grey hat hacking process
D) Ethical hacking process.
ANSWER: D

Network infrastructure vulnerabilities are the foundation for most technical


security issues in your information systems.
A) Operating system vulnerabilities
B) Web vulnerabilities
C) Wireless network vulnerabilities
D) Network infrastructure vulnerabilities
ANSWER: D

Performing hacking activities with the intent on gaining visibility for an


unfair situation is called ________.
A) Cracking
B) Analysis
C) Hacktivism

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D) Exploitation
ANSWER: C

Phishing is a form of ____________________.


A) Spamming
B) Identify Theft
C) Impersonation
D) Scanning
ANSWER: C

Services running on a system are determined by _____________.


A) The system’s IP address
B) The Active Directory
C) The system’s network name
D) The port assigned
ANSWER: D

Sniffing is used to perform ______________ fingerprinting.


A) Passive stack
B) Active stack
C) Passive banner grabbing
D) Scanned
ANSWER: A

SNMP stands for_____


A) Simple Network Messaging Protocol
B) Simple Network Mailing Protocol
C) Simple Network Management Protocol
D) Simple Network Master Protocol
ANSWER: C

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

SSL stands for_____


A) Secure Sockets Layer
B) Software Security Layer
C) Socket security layer
D) System software layer
ANSWER: A

The first phase of hacking an IT system is compromise of which foundation


of security?
A) Availability
B) Confidentiality
C) Integrity
D) Authentication
ANSWER: B

We can eliminate many well-known network vulnerabilities by simply patch-


ing your network hosts with their latest ______and______.
A) Hckers and Prackers
B) Vendor software and firmware patches
C) Software amd Hardware
D) None of above
ANSWER: B

What are the forms of password cracking technique?


A) Attack syllable
B) Attack brute forcing
C) Attacks hybrid
D) All the above
ANSWER: D

What are the port states determined by Nmap?

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

A) Active, inactive, standby


B) Open, half-open, closed
C) Open, filtered, unfiltered
D) Active, closed, unused
ANSWER: C

What are the some of the most common vulnerabilities that exist in a
network system?
A) Changing manufacturer, or recommended settings of newly installed
application.
B) Additional unused feature on commercial software package.
C) Utilizing open source application code.
D) Balancing security and ease of use of system.
ANSWER: B

What are the types of scanning?


A) Port, network, and services
B) Network, vulnerability, and port
C) Passive, active, and interactive
D) Server, client, and network
ANSWER: B

What are the types of scanning?


A) Port, network, and services
B) Network, vulnerability, and port
C) Passive, active, and interactive
D) Server, client, and network
ANSWER: B

What is purpose of Denial of Service attacks?


A) Exploit weakness in TCP/IP attack.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B) To execute a trojan horse on a system.


C) To overload a system so it is no longer operational.
D) To shutdown services by turning them off.
ANSWER: C

What is the attack called “evil twin”?


A) rouge access point
B) ARP poisoning
C) session hijacking
D) MAC spoofing
ANSWER: A

What is the most important activity in system cracking?


A) Information gathering
B) Cracking password
C) Escalating privileges
D) Covering tracks
ANSWER: B

What is the primary goal of an ethical hacker?


A) avoiding detection
B) testing security controls
C) resolving security vulnerabilities
D) determining return on investment for security measures
ANSWER: C

What port does Telnet use?


A) 22
B) 80
C) 20

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D) 23
ANSWER: D

What tool can be used to perform SNMP enumeration?


A) DNSlookup
B) Whois
C) Nslookup
D) IP Network Browser
ANSWER: D

When a hacker attempts to attack a host via the internet it is known as


what type of attack?
A) local access
B) remote attack
C) internal attack
D) physical access
ANSWER: B

Which Nmap scan is does not completely open a TCP connection?


A) SYN stealth scan
B) TCP scan
C) XMAS tree scan
D) ACK scan
ANSWER: A

Which of the following is not a characteristic of ethical hacker?


A) Excellent knowledge of Windows.
B) Understands the process of exploiting network vulnerabilities.
C) Patience, persistence and perseverance.
D) Has the highest level of security for the organization.

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

ANSWER: D

Which of the following tool is used for Network Testing and port
Scanning______
A) NetCat
B) SuperScan
C) NetScan
D) All of above
ANSWER: D

Which of the following tool is used for security checks as port scanning and
firewall testing?
A) Netcat
B) Nmap
C) Data communication
D) Netscan
ANSWER: A

Which of the following tool is used for Windows for network queries from
DNS lookups to trace routes?
A) Sam Spade
B) SuperScan
C) NetScan
D) Netcat
ANSWER: A

Which of the following will allow foot printing to be conducted without


detection?
A) PingSweep
B) Traceroute
C) War Dialers

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

D) ARIN
ANSWER: D

Which of this Nmap do not check?


A) Services different hosts are offering
B) On what OS they are running.
C) What kind of firewall in use?
D) What type of antivirus in use?
ANSWER: D

Which phase of hacking performs actual attack on a network or system?


A) Reconnaissance
B) Maintaining Access
C) Scanning
D) Gaining Access
ANSWER: D

Which protocols are in use is vulnerable


A) TCL
B) SSL
C) FTP
D) SMTP
ANSWER: B

Which tool is used for ping sweeps and port scanning?


A) Netcat
B) SamSpade
C) SuperScan
D) All the above
ANSWER: C

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

Which type of hacker represents the highest risk to your network?


A) black-hat hackers
B) grey-hat hackers
C) script kiddies
D) disgruntled employees
ANSWER: D

Who invent worm attack ___


A) Brightn Godfrey
B) Alan yeung
C) Robert Morris
D) None of above
ANSWER: C

Why would a hacker use a proxy server?


A) To create a stronger connection with the target.
B) To create a ghost server on the network.
C) To obtain a remote access connection
D) To hide malicious activity on the network
ANSWER: A

Why would a ping sweep be used?


A) To identify live systems
B) To locate live systems
C) To identify open ports
D) To locate firewalls
ANSWER: A

Wireshark is a ____________ tool.


A) network protocol analysis

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


lOMoARcPSD|14293917

B) network connection security


C) connection analysis
D) defending malicious packet-filtering
ANSWER: A

Downloaded by Prathamesh Patil CO 52 (madeforcollegeonly@gmail.com)


1] The Y dimension of Al philosophy ina 3 Dimensional representation consists of

a) Cognition

b) logic

c) interface

d) computation

2] Is a tool for ethical hacking of web application

a) Netsparker

b) burpsuite

c) Angry IP Scanner

d) GFI LanGuard

3] which of the following is not network analyzer detection tool

a) sniffelet

b) PromiscDetect

c) Netflow traffic analyzer

d) All of above

4] __ is a tool that scan vulnerability in web application

a) GFI LanGuard

b) Probely

c) Burpsuite

d) Angry IP Scanner
5] Which of the following hold the highest value of evidence in the court?

a) Documentary

b) Demonstrative

c) Testimonial

d) Real

6] Banners are intended for

a) Networking administration

b) White hat Hacking

c) both a and b

d) None of above

7] ___ is not one of the different stages of hacking

a) Reconnaissance

b) Scanning

c) Compiling

d) Maintaining access

8] ___ tool is used for Ping Sweeps and port scaning

a) Sam spade

b) Superscan

c) both a and b

d) none
9] Foot-printing Is

a) Measuring the shoe size of an ethical hacker

b) Accumulation of data by gathering information on a target

c) Scanning a target network to detect operating system types

d)

10] To Examine Intelligently while gathering information about the target Is

a) Investigation

b) Scanning

c) Tracing

d) Intelligent

11] Hosting Obscene Profiles and Creating Fake Profile comes under section of law ___

a) 66 of Information Technology Act

b) 67 of Information Technology Act

c) 68 of Information Technology Act

d) None of the above

12] The evidence or proof that is obtained from the electronic source is called as __

a) digital evidence

b) Explainable evidence

c) demonstrative evidence

d) substantial evidence
13] ___ norm should not satisfy by Investigator

a) To be Honest and Trustworthy

b) Avoid harm to others

c) To declare any confidential matters or knowledge

d) To respect privacy of others

14] Which one Is the characteristic of digital evidence rule

a) Admissible

b) Complete

c) Authentic

d) All of the above

15] Hash test analysis on digital evidence ensures that the data obtained from bit-by-bit copy

procedure Is ___ and reflects the nature of original evidence

a) not corrupt

b) not correct

c) admissible

d) reliable

16] In terms of digital evidence, the Internet is an example of

a) Open computer systems

b) Communication systems

c) Embedded computer systems

d) None of the above


17] The criminlogical principle states that contact between two Items will result in an exchange is

a) Locard's Exchange Principle

b) Differential Association Theory

c) Beccaria's Social Contract

d) None of the above

18] In forensic investigation, in which format the computer and data would be, during the acquisition of
the media

a) protected

b) protected

c) partially protected

d) hidden

19] which of the following is not a email bomb attack

a) attachment overloading attack

b) connection attack

c) DoS

d) Autoresponder Attack
1] An examiner needs to get to the ___ immediately and extract that evidence before it is lost

a) Disk

b) Network Topology

c) Temporary file systems

d) Cache and register

2] ___ deals with learning a function from available training data

a) Artificial Intelligence

b) Deep Learning

c) Neural Network

d) Supervised Learning

3] In ___ the goal is for the software to use what it has learned in one area to solve problems in other
areas

a) Deep learning

b) Machine learning

c) Neural Network

d) Artificial Intelligence

4] ___ is defined as symbols that represent properties of objects events and their environment

a) Data

b) Information

c) Knowledge

d) Intelligence
5] ____ can recognize the shapes of the letters and convert it into editable text

a) Handwriting Recognition System

b) Voice Recognition System

c) Text Recognition System

d) Speech Recognition Systems

6] Natural Language Understanding is used in ___

a) Natural Language Interfaces

b) System for understanding text

c) Natural Language Front end

d) All of the above

7] ____ allow bi-directional, full duplex communication between clients and servers

a) Communication with REST APIs

b) Websocket APIs

c) Both a and b

d) None of the above

8] The application data, typically in files, is encoded by the ___ protocol and encapsulated in the ___
protocol which provides connection or transaction oriented communication over the network

a) Application layer, Transport layer

b) Transport layer, Application layer

c) Network layer,Link layer

d) Link layer,Network layer


9] In IDIP model, The purpose of ____ phase is to provide a mechanism for an incident to be

detected and confirmed

a) Readiness

b) Digital Crime Investigation

c) Review

d) Deployment

10] Dried blood and fingerprints are ___ type of evidence

a) Substantial Evidence

b) Illustrative evidence

c) Electronic evidence

d) Documented evidence
1] The difference between machine and human intelligence is that the human ___ compare to machine

a) breath / sleep

b) think / act rationally

c) walk / talk

d) eat / drink

2] ___ is the process of collecting, organizing and analyzing large sets of data to discover patterns and
other useful information

a) WSN

b) Cloud computing

c) Big Data Analytics

d) All of the above

3] In EMCI Model,___ is impacted by information from within and outside the organization that will
affect the investigation

a) Planning

b) Awareness

c) Authorization

d) Transport

4] Digital forensics includes the following

a) Recovery

b) investigation

c) validation

d) All of the Above


5] The ___ is a computing concept that describes the idea of everyday physical objects being connected
to the internet and being able to identify themselves to other devices

a) Internet of Things

b) Embedded System

c) Intranet of Things

d) Microprocessor

6] ____ is most commonly used for clustering similar input into logical groups

a) Unsupervised Learning

b) Supervised learning

c) Deep Learning

d) Human and Machine Learning

7] In the 3 dimensional philosophy of Al, the X dimension is __

a) Reasoning

b) Knowledge

c) Computation

d) Vision

8] ___ systems are suitable for solutions where data are involved is big, however, the

primary analysis requirement is not computationally intensive and can be done locally itself

a) IOT Level 1

b) IOT Level 2

c) IOT Level 3

d) IOT Level 4
9] Computer programs that mimic the way human brain processes information is called ___

a) Computer Networks

b) Circuits Network

c) Neural Network

d) Human Network

10] ___ is not a network hacking tool

a) Telnet

b) Net Cat

c) CleanllsLog

d) both a and b

11] ___ is DC Motor that move in descrete steps

a) Servo Motor

b) Linear Actuator

c) Induction Motor

d) Stepper Motor

12] Digital forensics includes the following

a) Recovery

b) investigation

c) validation

d) all of the above


13] loT level which is used for Smart Irrigation System

a) Level-1

b) Level-2

c) Level-3

d) Level-4

14] ___ provides the users the ability to develop and deploy application in the cloud using the
development tools, application programming interfaces (APIs), software libraries and services provided
by the cloud service provider

a) IaaS

b) PaaS

c) SaaS

d) All of the above

15] Which does not comes under the characteristics of loT

a) Dynamic & Self-Adapting

b) Self-Configuring

c) Endpoint Management

d) Integrated into Information Network


16] The ability to sense the environment, to make decisions and to control action is called ___

a) Data

b) Information

c) Knowledge

d) Intelligence

17] ___ can recognize the shapes of the letters and convert it into editable text

a) Handwriting Recognition System

b) Voice Recognition System

c) Text Recognition System

d) Speech Recognition Systems

18] Most commonly used units for ___ measurement are relative humidity (RH), dew/frost point (D/F
PT) and parts per million (PPM)

a) Temperature

b) Humidity

c) motion

d) All of the above

19] ___ is a program that simulated a psychotherapist interacting with a patient and

successfully passed the Turing Test

a) MAYA

b) ALEXA

c) MALISKA

d) ELIZA
20] BMP180 is a popular digital ___ sensor for use in mobile phones, PDAs, GPS navigation

devices and outdoor equipment

a) Pressure

b) Gas

c) Smoke

d) Image

21] ARM Microcontrollers supports for ___

a) Low level programming language

b) High Level Programming Language

c) Both a and b

d) None of the above

22] WebSocket-Based APIs allow__ communication between clients and servers

a) Bi-Directional, Full Duplex

b) Uni-Directional, Half Duplex

c) Bi-Directional, Half Duplex

d) Uni-Directional, Full Duplex

23] ____ensures reliable transmission of packets in- order and also provides error detection capability

so that duplicate packets can be discarded and lost packets are retransmitted

a) UDP

b) TCP

c) HTTP

d) CoAP
24] In UMDFPM, ___ phase is not there in this Model

a) Examine

b) Hypothesis

c) Analysis

d) Report

25] In EMCI Model,___ is the phase where nature of investigation has been identified

a) Awareness

b) Authorization

c) Planning

d) Collection

26] In IDIP model, The goal of ___ phase is to collect and analyze the digital evidence

a) Hypothesis

b) Deployment

c) Digital Crime Investigation

d) Review

27] An information which has a positive impact on the action occurred, such as the information

supporting an incident is an ___

a) Irrelevant Evidence

b) Relevant Evidence

c) Cannot say

d) All of the above


28] Embedded System consists of ___

a) Input Device, Microcontroller (The Brain) and Output Device

b) Hardware and software device

c) Transmitter and Receiver device

d) WiFi and Bluetooth

29] Digital evidences are used to establish a credible link between ___

a) Attacker and victim and the crime scene

b) Attacker and the crime scene

c) victim and the crime scene

d) Attacker and Information

30] State the purpose of Presentation phase in EEDIP model ?

a) To obtain and study digital evidence

b) To preserve the investigation and finding

c) To summerize the evidences found in the process of investigation

d) None of these

31] A logon record tells us that, at a specific time

a) An unknown person logged into the system using the account

b) The owner of a specific account logged into the system

c) The account was used to log into the system

d)
32] When assessing the reliability of digital evidence, the investigator is concerned with whether the

computer that generated the evidence was functioning normally, and

a) Whether chain of custody was maintained

b) Whether there are indications that the actual digital evidence was tampered with

c) Whether the evidence was properly secured in transit

d) Whether the evidence media was

33] Which of the following is likely to have highest knowledge about system vulnerabilities?

a) Gray Hat

b) White Hat

c) Malicious Users

d) Script kiddies

34] ___ is not one of the different stages of hacking

a) Reconnaissance

b) Scanning

c) Compiling

d) Maintaining access

35] Digital evidences must follow the requirements of the ___

a) Ideal Evidence rule

b) Best Evidence Rule

c) Exchange Rule

d) All of the mentioned


36] ___ Determines email server version information based on how the server responds to

mail formed SMTP request

a) Nmap scan

b) Tmap scan

c) Smtp scan

d) None

37] Workstations have ton of security vulnerabilities like weak passwords to unpatched security holes

to storage of WEP keys such workstations are

a) Default Workstations

b) Vulnerable workstations

c) Physical Workstations

d) None

38] Which of the following port no. is vulnerable to hacked HTTPs using TCP protocol

a) 441

b) 442

c) 443

d) 444

39] Social engineering is the art of

a) making online friends

b) exploiting the human elements to gain access to unauthorized resources

c) searching on internet for various things

d) helping others socially


40] _____ standards form the basis of specifications for high level communication protocols such as
ZigBee

a) IEEE 802.15.4

b) IEEE 802.3

c) IEEE 802.11

d) IEEE 802.16

41] ___ norm should not satisfy by Investigator

a) To be Honest and Trustworthy

b) Avoid harm to others

c) To declare any confidential matters or knowledge

d) To respect privacy of others

42] Some Arduino Board include ___ used for loading programs from the personal computer

a) USB

b) HDMI

c) RJ45

d) None of these

43] ____ is an actuator that creates motion in a straight line, in contrast to the circular motion of a

conventional electric motor

a) Relay

b) Solenoid

c) Linear Actuator

d) None of these
44] The authentication, authorization, message and content integrity, and data security are functions of
___functional block

a) service

b) Management

c) Security

d) Application

45]___ is a bi-directional, fully duplex communication model that uses a persistent

connection between the client and server

a) Request-Response

b) Publish Subscribe

c) Push-Pull

d) Exclusive Pair

46] The ARM architecture uses a ___ architecture which support separate data and

instruction buses for memories

a) Harvard

b) Von Neumann

c) Control ROM

d) Hardwired
47] ___analyzes the training data and produces an inferred function, which

can be used for mapping new examples

a) unsupervised learning algorithm

b) Deep Learning Algorithm

c) Supervised Learning Algorithm

d) Neural Learning Algorithm

48] Coordinator acts as a gateway that connect the ___ to the internet

a) WSN

b) Sensors

c) Actuator

d) TCP

49] ___deals with learning a function from available training data

a) Artificial Intelligence

b) Deep Learning

c) Neural Network

d) Supervised Learning

50] ___allow bi-directional, full duplex communication between clients and servers

a) Communication with REST APIs

b) Websocket APIs

c) Both a and b

d) None of the above


51] DDS uses ___ model where publishers (e.g. devices that generate data) create

topics to which subscribers (e.g., devices that want to consume data) can subscribe

a) request-response

b) publish-subscribe

c) push-pull

d) Exclusive pair

52] The WSN nodes are prone to ___

a) Malicious attacks

b) Eavesdropping

c) Interference

d) All of the above


The ai technique that allows computers to understand relationship between objects and events is called

a) Heuristic Processing

b) Cognitive science

c) Relative Symbolism

d) Pattern Matching

___ Protocols are 802.3 Ethernet, 802.16 WiMax,2G/3G/LTE-Cellular,802.11 WIFi,802.15.4-LRWPAN

a) Application Layer

b) Transport Layer

c) Network Layer

d) Link Layer

MQTT topics are ___

a) simple floating point

b) simple integer

c) simple symbol

d) simple string

Which of the following is not a computer networking device

a) Router

b) Firewall

c) Generic Host

d) sNone
Power Consumption of ASIC is ___

a) High

b) Low

c) Zero

d) None of the above

DoS Daniel of service attack means ___

a) Breaking file-system security

b) flooding a network with too many requests

c) Access to malicious software(s) from internet

d) exploiting specific protocol

Security assessments based around ethical hacking focus on ___

a) System vulnerabilities

b) hacking processes

c) password cracking

d) All of the above

An ethical hacker is a security professional who applies their hacking skills for ___ purposes on behalf of
the owners of information systems

a) Destructive

b) Defensive

c) Attacking

d) Analyzing
1] Hackers use resources as

a) public computers at libraries, or kiosks

b) registered website

c) authorized computer at reception

d) None of these

2] deep learning is a subfield of

a) human learning

b) machine learning

c) source learning

d) None of these

3] to determine what evidence to collect first,you should access evidences in ___ order of volatility

a) increasing

b) decreasing

c) any

d) None of these

4] Which of the following is not a best practice for minimizing security risk

a) Use of encrypted msg

b) Disable unused protocol

c) Use of right software

d) Injuction of malware in system


5] Unix is

a) Uniplexed Information and computing service

b) Unique Information and computing service

c) User Information and computing service

d) Universal information and computing

6] WebSocket APIs network traffic and latency as there is no overhead for connection setup and
termination requests for each message

a) reduce

b) increase

c) both a and b

d) none of the above

7] Most of the wireless vulnerability are in

a) 802.09 protocol

b) 802.01 protocol

c) 802.11 protocol

d) 802.10 protocol
8] A ___ is a device that alters the physicalquantity as it can cause a mechanical componentto move
after getting some input from the sensor

a) sensors

b) actuators

c) both a and b

d) none of the above

9] Encrypted data can be impossible to view without the

a) key

b) password

c) evidence

d) none of the above

10] In EMCI Model,____ Is the phase during which crime is reported to some authority

a) awareness

b) planning

c) storage

d) collection
11] When assessing security and responding to

security incidents a network analyzer can help you

a) View anomalous networking traffic

b) Develope baseline of network activity

c) Track down a intruder

d) all of the above

12] To determine what evidence to collect first, you

should access evidences in ___ Order of Volatility

a) increasing

b) Decreasing

c) any

d) none of the above

13] _____ data is a data that is lost if the power is switched off.

a) Non-volatile

b) Volatile

c) primary

d) secondary
14] An EMCI model follows ___ as every activity occurs in sequence

a) agile model

b) spiral model

c) waterfall model

d) none of these

15] Vulnerability is nothing but

a) Weakness of a system

b) Strong points of a system

c) both a and b

d) none of these

16] Guidelines selecting hacking tools may consists of

a) study the user guide for commercial tools

b) Detailed reports on the discovered vulnerabilities

c) updates and supports when needed

d) All of these

17] Digital evidences must follow the requirements of the ___

a) Ideal Evidence rule

b) Best Evidence Rule

c) Exchange Rule

d) All of these
18] Use of Ping sweep is

a) Identify live systems

b) Locate live systems

c) Identify open ports

d) Locate firewall

19] Enemies of information security are

a) Security researchers

b) Hacktivists

c) Cyber Terrorists

d) all of these

20] Network analyzer performs

a) Captures all networking traffic

b) Display it all in chronological order

c) Decode what is found in human readable format

d) all of above

21] DMZ stands for

a) DeMiliterized Zone

b) DeMail Zone

c) DoMain Zone

d) none
22] Devices that transforms electrical signals into

physical movements

a) Sensors

b) Actuators

c) Switches

d) display

23] Ethical hacker does not require ___for effective operation

a) Asset to be protected

b) Potential Threat Source

c) Support by Organization

d) development life cycle

24] __ Jack allows connection of analog TVs and

other similar output devices

a) RCA

b) Audio out

c) USB

d) HDMI

25] Which of the following is not community hacked port number

a) 18

b) 19

c) 20

d) 21
26] Forest Fire Detection is an example of

a) IOT level 5

b) IOT level 6

c) IOT level 2

d) IOT level 1

27] Which of the following is a part of social engineering life cycle?

a) Gaining ainformation

b) User identification

c) System monitoring

d) Shoulder surfing

28] A Chain of Custody form is used to document which of the following?

a) Investigator who has been in contact with evidence in a case

b) Anyone who has not been in contact with evidence in a case

c) Anyone who has been in contact with evidence in a case

29] ____ is one with very little knowledge about hacking but uses free tools and internet to

perform malicious act

a) Ex Employee

b) Script Kiddies

c) Malicious users

d) Gray hat
30] Web server provide ___ as security mechanism

a) ACL

b) Root directory

c) both a and b

d) none

31] ___ tool is Most versatile security tool for such

security checks as port scanning & firewall testing

a) Ether peek

b) Ettercap

c) net cat

d) Nmap

32] TCP is the most widely used __ protocol,that is used by web browsers (along with HTTP,

HTTPS application layer protocols), email programs (SMTP application layer protocol) and

file transfer (FTP)

a) Application Layer

b) Transport Layer

c) Network Layer

d) Link Layer
33] one of the example of hackers on basis of their work and mind set is ___

a) Evading an intrusion prevesion system

b) supporting security

c) promoting pollution in environment

d) none of these

34] IEEE 802.11 is a collection of wireless local area network (WLAN) communication standards,

including extensive description of the ____

a) Link layer

b) application layer

c) transport layer

d) network layer

35] SQLMap supports _____

a) open source and cross platforms

b) supports database engines

c) sniffing networks

d) all of these

36] Computer programs that mimic the way human brain processes information is called __

a) computer networks

b) circuits network

c) neural network

d) human network
37] Apache Mahout is used for training __

a) Support Vector Machines (SVMs)

b) self-organizing maps

c) hierarchical clustering

d) naive bayes classifier

38] Ethical behind training how to hack a system

a) Think like hacker

b) Hacking system without permission

c) To hack vulnerable networking

d) To corrupt software using malware

39] Hacking for a cause is called

a) active hacking

b) hacktivism

c) activism

d) Black hat hacking

40] ___ belong to Email attack

a) email bomb

b) banner

c) both a and b

d) none
41] A proof that is introduced in the form of physical object is referred as __

a) Electronic evidence

b) Documented evidence

c) substantial evidence

d) Explainable evidence

42] one of the example of hackers on basis of their work and mind set is ___

a) Evading an intrusion prevesion system

b) supporting security

c) promoting pollution in environment

d) none of these

43] Illustrative evidence is also called as

a) Demonstrative evidence

b) Explainable Evidence

c) Substantial evidence

d) Documented Evidence

44] The planning and reconnaissance phase of penetration testing in hacking __

a) defines Salary of hacker for testing

b) defines test goals and intellegence is gathered

c) avoids inspection in testing phase

d) implements Random process in penetration testing


45] Which of the following is not a computer networking device

a) Router

b) Firewall

c) Generic Host

d) None

46] Which is not the type of tool that is used by the Ethical hackers?

a) Nmap

b) .net Framework

c) Superscan

d) ToneLoc

47] The message transfer capability can be set up on connections, either using handshakes such as __ or
without handshakes/acknowledgements such as __

a) TCP,UDP

b) UDP,TCP

c) HTTP,CoAP

d) CoAP,HTTP

48] Piggybacking onto a network through an insecure wireless configuration is a

a) Default windows OS configuration

b) Weak SQL server administrator password

c) operating system attack

d) Network infrastructure attack


49] In forensic investigation, in which format the computer and data would be, during the

acquisition of the media

a) protected

b) non protected

c) partially protected

d) hidden

50] Which was the first FBI Regional computer Laboratory was recognized in 2000?

a) Multimedia Laboratory

b) Programming laboratory

c) Forensic Laboratory

d) Software Laboratory

51] In ———— multiple large messages can quickly fill the total storage capacity of an email server

a) storage overload

b) Bandwidth blocking

c) a and b

d) none

52] Digital evidences must follow the requirements of the __

a) Ideal Evidence rule

b) Best Evidence Rule

c) Exchange Rule

d) All of the mentioned


53] In ___ system has a single node as well as data is stored and analyzed in the cloud application is

cloud based

a) IOT Level 1

b) IOT Level 2

c) IOT Level 3

d) IOT Level 4

54] Which of the following is a part of social engineering life cycle?

a) Gaining a information

b) User identification

c) System monitoring

d) Shoulder surfing

55] ____ and ___ supports methods such as GET, PUT, POST, and DELETE

a) HTTP,CoAP

b) Websocket, MQTT

c) XMPP,AMQP

d) none of the above

56] Illustrative evidence is also called as ___

a) Demonstrative evidence

b) Explainable Evidence

c) Substantial evidence

d) Documented Evidence
57] The ARM micro-controller architecture is ___

a) Load-Store RISC Architecture

b) Load Store CISC Architecture

c) ROM Based Architecture

d) Hardwired Architecture

58] ___ tool is Most versatile security tool for such

security checks as port scanning & firewall testing

a) Ether peek

b) Ettercap

c) net cat

d) Nmap

59] ZigBee is one of the most popular wireless technologies used by ___

a) WSN

b) MANET

c) Both a and b

d) None of the above

60] ___ form the basis of various applications

a) Algorithms

b) Programs

c) Code

d) Testing
61] one of the example of hackers on basis of their work and mind set is __

a) Evading an intrusion prevesion system

b) supporting security

c) promoting pollution in environment

d) none of these

62] Scanning is performed in which phase of a pen test?

a) Pre-Attack

b) Attack

c) Post-attack

d) Reconnaissance

63] 802.15.4 also called as ___

a) Ethernet

b) Wifi

c) WiMax

d) LR-WPAN

64] In ___ system system has multiple nodes that perform local analysis. Data is stored in the cloud

and application is cloud based

a) IOT Level 3

b) IOT Level 4

c) IOT Level 5

d) IOT Level 6
65] To access the security of the system one must understand ___ of the hacker

a) Nature

b) Hobbies

c) Mindset

d) None of these

66] Do not store old sensitive or otherwise non public files on your web server is countermeasure for

a) Directory traversal attack

b) XSS

c) SQL injection

d) All of above

67] 6LOWPAN provides data transfer rates of ______

a) 250kb/s

b) 1.5 Mb/s

c) 100 Mbit/s

d) 1 Gbit/s

68] ALU of ARM Microcontroller is ___ bit

a) 8

b) 32

c) 64

d) 10
69] IBMs Watson supercomputer comes under

a) General AI

b) Super AI

c) Narrow AI

d) All of the above

70] The most difficult task for an evidence handler is to substantiate the ___ at the judicial proceedings

a) Copied Evidences

b) Persistent Evidence

c) Collected Evidence

d) Lost Evidences

71] The amateur in the field of hacking who don't have many skills about coding and in-depth working of

security and hacking tools are called

a) sponsored Hackers

b) Whistle Blowers

c) Hactivists

d) Script Kiddies

72] _____ sensors are used in smartphones, vehicles, aircrafts and other applications to detect
orientation of an object, shake, tap, tilt, motion, positioning, shock or vibration

a) IR

b) Accelerometer

c) Image

d) Proximity
73] loT level which is used for Forest Fire Detection

a) Level 3

b) Level 4

c) Level 5

d) Level 6

74] An loT device can collect various types of data from the on-board or attached sensors, such as

a) Temperature

b) Humidity

c) Motion

d) All of Above

75] Which of the following is a part of social engineering life cycle?

a) Gaining ainformation

b) User identification

c) System monitoring

d) Shoulder surfing

76] Which of the following tool cannot be use to crack password?

a) LC4

b) pwdump

c) john the Ripper

d) SuperScan
77] A couple of considerations are involved when dealing with digital evidence check, the incorrect

considerations involved

a) Work with the original evidence to develop procedures

b) Use clean collecting media

c) Document any extra scope

d) consider safety of personnel at the scene

78] Most of the wireless vulnerability are in

a) 802.09 protocol

b) 802.01 protocol

c) 802.11 protocol

d) 802.10 protocol

You might also like