1)Hackers use resources as
a.Public computers at libraries, or kiosks
b.registered website
c.Authorized computer at reception
d.None of these
2)Deep learning is a subfield of
a.Human Learning
b.Machine Learning
c.Source Learning
d.None of these.
3)To determine what evidence to collect first, you should access evidences in____Order of Volatility.
a.Increasing
b.Decreasing
c.any
d.None of the above
4)Which of the following is not a best practice for minimizing security risk
a.Use of encrypted msg
b. Disable unused protocol
c.Use of right software
d. Injuction of malware in system
5)UNIX is
a.Uniplexed Information and computing service
b.Unique Information and computing service
c.User I nformation and computing service
d.Universal Information and computing
6)WebSocket APIs____network traffic and latency as there is no overhead for connection setup and
termination requests for each message.
a.reduce
b.increase
c.Both a and b
d. None of the above.
7)Most of the wireless vulnerability are in
a. 802.09 protocol
b.802.01 protocol
c. 802.11 protocol
d.802.10 protocol
8)A______is a device that alters the physical quantity as it can cause a mechanical component to
move after getting some input from the sensor.
a.Sensors
b.Actuators
c.Both a and b
d.None of the above.
9)Encrypted data can be impossible to view without the_____
a.Key
b.Password
c. Evidence
d.None of the mentioned
10)In EMCI Model_____is the phase during which crime is reported to some authority.
Awareness
Planning
Storage
Collection
11)When assessing security and responding to security incidents a network analyzer can help you
view anomalous networking traffic
Develope baseline of network activity
Track down a intruder
All of above
12)To determine what evidence to collect first, you should access evidences in_____Order of
Volatility.
Increasing
Decreasing
any
None of the above
13)_________data is a data that is lost if the power is switched off.
Non-volatile
Volatile
Primary
Secondary
14)An EMCI model follows______ as every activity occurs in sequence,
Agile Model
Spiral Model
Waterfall Model
None of these
15)Vulnerability is nothing but
Weakness of a system
Strong points of a system
Both a & b
None
16)Guidelines selecting hacking tools may consists of______
Study the user guide for commercial tools
Detailed reports on the discovered vulnerabilities
updates and supports when needed
All of these
17)Digital evidences must follow the requirements of the______
Ideal Evidence rule
BestEvidence Rule
Exchange Rule
aIl of the mentioned
18)use of Ping sweep is
Identify live systems
Locate live systems
Identify open ports
Locate firewall
19)Enemies of information security are
Security researchers
Hackti vists
Cyber Terrorists
all of these
20)Network analyzer performs
Captures all networking traffic
Display it all in chronological order
Decode what is found in human readable format
All of above
21)DMZ stands for
DeMiliterized Zone
DeMa1'l Zone
DoMain Zone
None
22)Devices that transforms electrical signals into physical movements
Sensors
Actuators
Switches
display
23)Which obstacle will be handled by Investigation while achieving the goal of DFI
Handle & locate valid data from large storage
If file is secured, investigator must find way to read the protected data in an unauthorized manner.
Every case is different,identifying the techniques and tools will take long time
24)Ethical hacker does not requirefor effective operation.
Asset to be protected
Poten aI Threat Source
Support by Organization
development life cycle.
25)___jack allows connection of analog TVs and other similar output devices.
RCA
Audio out
USB
HDMI
26)____is competitor OS for Microsoft
Linux
Windows
Symbian
All of above
27)Which of the following is not community hacked port number
18
19
20
21
28)Forest Fire Detection is an example of
IOT Level 5
IOT Level 6
IOT Level 2
IOT Level 1
29)Keeping the software up to date is sign of
Good security
Bad security
A and B
None criteria
30) Key for handling of digital evidence is:
Proper protocol should be followed for acquisition of evidence
AIl material should be date and time stamped
All artifacts physical and digital should be collected and retained
All of the above
31)Which of the following is a part of social engineering life cycle?
Gaining a information
User identification
System monitoring
Shoulder surfing
32)A Chain of Custody form is used to document which of the following?
Investigator who has been in contact with evidence in a case
Anyone who has not been in contact with evidence in a case
An ne who has been in contact with idence in a case
33)___is one with very little knowledge about hacking but uses free tools and internet to perform
malicious act.
Ex Employee
Script Kiddies
Malicious Users
Gray Hat
34)Web server provide____as security mechanism
ACL
Root directory
Both A and B
None
35)____ tool is most versatile security tool for such security checks as port scanning & firewall testing
Ether peek
Ettercap
net cat
Nmap
36)Ethical hacker does not require____for effective operation.
Asset to be protected
PotentiaI Threat Source
Support by Organization
Development life cycle.
37)Which of the following term suits more to WhiteHat Hackers?
Formar Black Hat
Former Gray Hat
Fame Gainer
Security Professional
38)I0T stands for
Internet of Technology
Intranet of Things
Internet of Things
Information of Things
39)TCP is the most widely used ______protocoli that is used by web browsers (along with HTTP,
HTTPS application layer protocols), email programs (SMTP application layer protocol) and file transfer
(FTP).
Application Layer
Transport Layer
Network Layer
Link Layer
40)Keeping the software up to date is sign of
Good security
Bad security
A and B
None
41)The correct procedure followed according to the chain of custody for electronic evidence is :
a-Save the original material
b.Take photos of physical evidence
c.Take screenshots Of digital evidence content
d,lniect a bit-for-bit clone of diaital evidence
-c-b-d-e-f
-a-d-f-e-b
-a-b-c-d
42)one of the example of hackers on basis of their work and mind set is___
Evading an intrusion prevesion system
supporting security
promoting pollution in environment
none of these
43)IEEE 802.11 is a collection of wireless local area network (WLAN) communication standards,
including extensive description of the____
Link Layer
Application Layer
Transport Layer
Network Layer
44)SQLMap supports________
open source and cross platforms
supports database engines
sniffing networks
All Of these
45)____ data is a data that is lost if the power is switched off.
Non-volatile
Volatile
Primary
Secondary
46)What is rootkit?
A Simple tool to gain access to the root of the windows system,
An invasive program that affects the system files, including the kernel and
Tool to perform a buffer overflow
A rootkit is an invasive program that affects the system files, including the kernel, and remains
hidden to maintain unauthorized access
47)Computer programs that mimic the way human brain processes information is called__
Computer Networks
Circuits Network
Neural Network
Human Network
48)Apache Mahout is used for training______
Support Vector Machines (SVMs)
seIf -organizjng maps
hierarchical clustering
Naive Bayes classifier
49)_____ data is a data that is lost if the power is switched off.
Non-volatile
Volatile
Primary
50)Which of the following application are hacking targets on your network
Messaging application
Email
A and B
None
51)Ethical behind training how to hack a system
Think like hacker
Hacking system without permission
TO hack vulnerable networking
To corrupt software using malware
52)Hacking for a cause is called____
Active hacking
Hacktivism
Activism
Blackk-hat hacking
53)____belong to Email attack
Email Bomb
Banner
Both A and B
None
54)Which obstacle will be handled by Investigation while achieving the goal of DFI
If file is secured, investigator must find way to read the protected data in an unauthorized manner.
"Every case is different, identifying the techniques and tools will take long time."
All of the Above
55)Encrypted data can be impossible to view without the____
Key
Password
Evidence
None of the mentioned
56)A proof that is introduced in the form of physical object is referred as_____
Electronic evidence
Documented evidence
substantial evidence
Explainable evidence
57)Which of the following term suits more to WhiteHat Hackers?
Formar Black Hat
Former Gray Hat
Fame Gainer
Security Professional
58)one of the example of hackers on basis of their work and mind set is________
Evading an intrusion prevesion system
supporting security
promoting pollution in environment
none of these
59)Encrypted data can be impossible to view without the___
key
Password
Evidence
None of the mentioned
60)Illustrative evidence is also called as____
Demonstrative evidence
Explainable Evidence
Substantial evidence
Documented Evidence
61)The planning and reconnaissance phase of penetration testing in hacking_____
defines Salary of hacker for testing
defines test goals and intellegence is gathered
avoids inspection in testing phase
implements Random process in nenetratinn testing
62)Which of the following term suits more to White Hat Hackers?
Formar Black Hat
Former Gray Hat
Fame Gainer
Security Professional
63)DMZ stands for
DeMiliterized Zone
DeMail Zone
DoMain Zone
None
64)Guidelines selecting hacking tools may consists of______
Study the user guide for commercial tools
Detailed reports on the discovered vulnerabilities
updates and supports when needed
All of these
65)Which of the fOllowing is not a computer networking device.
Router
Firewall
Generic Host
None
66)An EMCI model follows as every activity occurs in sequence,
Agile Model
Spiral Model
Waterfall Model
None of these
67)Which is not the type of tool that is used by the Ethical hackers?
Nmap
net Framework
Superscan
ToneLoc
68)The message transfer capability can be set up on connections, either using handshakes such as
__or without handshakes/acknowledgements such as___
TCP,UDP
UDP,TCP
HTTP,CoAP
CoAP .HTTP
69)What is rootkit?
A Trojan that sends information to an SMB relay.
A Simple tool to gain access to the root of the windows system.
An invasive program that affects the system files, including the kernel and libraries.
A rootkit is an invasive program that affects the system files, including the kernel and libraries
70)Web server provide____as security mechanism
ACL
Root directory
Both A and B
None
71)Piggybacking onto a network through an insecure wireless configuration is a
Default windows OS confi guration
Weak SQL server administrator password
operating system attack
Network infrastructure attack
72)When assessing the reliability of digital evidence, the investigator is concerned with whether the
computer that generated the evidence was functioning normally, and:
Whether chain of custody was maintained
Whether there are indications that the actual digital evidence was tampered with
Whether the evidence was properly secured in transit
Whether the evidence media was compatible with forensic machines
73)In forensic investigation" in which format the computer and data would be, during the acquisition
of the media
protected
non protected
partially protected
hidden
74)Guidelines selecting hacking tools may consists of____
Study the user guide for commercial tools
Detailed reports on the discovered vulnerabilities
updates and supports when needed
All of these
75) In an email harassment case. the act of send/' threatening messages via a Web-based e-mail
service can leave a number of traces. Investigator can obtain information from____
Offender's hard drive
Web server access logs
IP addresses
All of the mentioned
76)Which was the first FBI Regional computer Laboratory was recognized in 2000?
Multimedia Laboratory
Programming laboratory
Forensic Laboratory
Software Laboratory
77)In______multiple large messages can quickly fill the total storage capacity of an email server
storage overload
Bandwidth blocking
A&B
None
78)Digital evidences must follow the requirements of the__
Ideal Evidence rule
Best Evidence Rule
Exchange Rule
AIl of the mentioned
79)Which is not the type of tool that is used by the Ethical hackers?
Nmap
net Framework
Superscan
80) Which of the following is not a best practice for minimizing security risk
Use of encrypted msg
Disable unused protocol
Use of right software
Injuction of malware in system
81)TCP is the most widely used ____protocol, that is used by web browsers (along with HTTP, HTTPS
application layer protocols), email programs (SMTP application layer protocol) and file transfer (FTP).
Application Layer
Transport Layer
Network Layer
Link Layer
82)____ is not a commercial firewall.
Nmap
EtherPeek
Ethereal
Weblnspect
83)Which of the following application are hacking targets on your network
Messaging application
Email
A and B
None
84)At what point should computer security professionals stop handling digital evidence and contact
law enforcement?
stop an contact law enforcement whenever they detect a crime
when their organization's policy specifies
when the task is beyond their training and experience
when they would be committing an offense by performing an action
85)Which of the fOllowing is not a computer networking device.
Router
Firewall
Generic Host
None
86)Which of the following statement is wrong
Investigator should not declare any confidential matters.
Investigator should respect privacy of others.
Investigator should be honest and trustworthy.
87)In____ system has a single node as well as data is stored and analyzed in the cloud application is
cloud based
IOT Level 1
IOT Level 2
IOT Level 3
IOT Level 4
88)Which of the following is a part of social engineering life cycle?
Gaining ainformation
User identification
System monitoring
Shoulder surfing
89)In____multiple large messages can quickly fill the total storage capacity of an email server
storage overload
Bandwidth blocking
A&B
None
90)Vulnerability is nothing but
Weakness of a system
Strong points of a system
Both a & b
None
91)___and____ supports methods such as GET, PUT. POST, and DELETE.
HTTP,CoAP
Websocket,MQTT
XMPP,AMQP
None of the above.
92) The ARM micro-controller architecture is___
Load-Store RISC Architecture
Load Store CISC Architecture
ROM Based Architecture
Hardwired Architecture
93) ZigBee is one of the most popular wireless technologies used by
WSN
MANET
Both a and b
None of the above.
94) An EMCI model follows as every activity occurs in sequence,
Agile Model
Spiral Model
Waterfall Model
None of these
95) ____form the basis of various applications.
AIgorithms
Programs
Code
Testing
96) Keeping the software up to date is sign of
Good security
Bad security
A and B
None
97)_____ is not a commercial firewall.
Nmap
EtherPeek
Ethereal
Weblnspect
98) Scanning is performed in which phase of a pen test?
pre-Attack
Attack
Post-attack
Reconnaissance
99) 802.15.4 also called as
Ethernet
WiFi
WiMax
LR-WPAN
100) TO access the security of the system one must understand Of the hacker.
Nature
Hobbies
Mindset
none of these