0% found this document useful (0 votes)
2K views21 pages

Eti MCQ

The document contains 65 multiple choice questions related to cybersecurity, networking, and hacking. The questions cover topics like network protocols, operating systems, vulnerabilities, digital forensics procedures, and types of hackers. The document tests knowledge across a wide range of cybersecurity and IT support domains.

Uploaded by

jaibvp123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views21 pages

Eti MCQ

The document contains 65 multiple choice questions related to cybersecurity, networking, and hacking. The questions cover topics like network protocols, operating systems, vulnerabilities, digital forensics procedures, and types of hackers. The document tests knowledge across a wide range of cybersecurity and IT support domains.

Uploaded by

jaibvp123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

1)Hackers use resources as

a.Public computers at libraries, or kiosks

b.registered website

c.Authorized computer at reception

d.None of these

2)Deep learning is a subfield of

a.Human Learning

b.Machine Learning

c.Source Learning

d.None of these.

3)To determine what evidence to collect first, you should access evidences in____Order of Volatility.

a.Increasing

b.Decreasing

c.any

d.None of the above

4)Which of the following is not a best practice for minimizing security risk

a.Use of encrypted msg

b. Disable unused protocol

c.Use of right software

d. Injuction of malware in system

5)UNIX is

a.Uniplexed Information and computing service

b.Unique Information and computing service

c.User I nformation and computing service

d.Universal Information and computing


6)WebSocket APIs____network traffic and latency as there is no overhead for connection setup and
termination requests for each message.

a.reduce

b.increase

c.Both a and b

d. None of the above.

7)Most of the wireless vulnerability are in

a. 802.09 protocol

b.802.01 protocol

c. 802.11 protocol

d.802.10 protocol

8)A______is a device that alters the physical quantity as it can cause a mechanical component to
move after getting some input from the sensor.

a.Sensors

b.Actuators

c.Both a and b

d.None of the above.

9)Encrypted data can be impossible to view without the_____

a.Key

b.Password

c. Evidence

d.None of the mentioned

10)In EMCI Model_____is the phase during which crime is reported to some authority.

Awareness

Planning

Storage

Collection
11)When assessing security and responding to security incidents a network analyzer can help you

view anomalous networking traffic

Develope baseline of network activity

Track down a intruder

All of above

12)To determine what evidence to collect first, you should access evidences in_____Order of
Volatility.

Increasing

Decreasing

any

None of the above

13)_________data is a data that is lost if the power is switched off.

Non-volatile

Volatile

Primary

Secondary

14)An EMCI model follows______ as every activity occurs in sequence,

Agile Model

Spiral Model

Waterfall Model

None of these

15)Vulnerability is nothing but

Weakness of a system

Strong points of a system

Both a & b

None
16)Guidelines selecting hacking tools may consists of______

Study the user guide for commercial tools

Detailed reports on the discovered vulnerabilities

updates and supports when needed

All of these

17)Digital evidences must follow the requirements of the______

Ideal Evidence rule

BestEvidence Rule

Exchange Rule

aIl of the mentioned

18)use of Ping sweep is

Identify live systems

Locate live systems

Identify open ports

Locate firewall

19)Enemies of information security are

Security researchers

Hackti vists

Cyber Terrorists

all of these

20)Network analyzer performs

Captures all networking traffic

Display it all in chronological order

Decode what is found in human readable format

All of above
21)DMZ stands for

DeMiliterized Zone

DeMa1'l Zone

DoMain Zone

None

22)Devices that transforms electrical signals into physical movements

Sensors

Actuators

Switches

display

23)Which obstacle will be handled by Investigation while achieving the goal of DFI

Handle & locate valid data from large storage

If file is secured, investigator must find way to read the protected data in an unauthorized manner.

Every case is different,identifying the techniques and tools will take long time

24)Ethical hacker does not requirefor effective operation.

Asset to be protected

Poten aI Threat Source

Support by Organization

development life cycle.

25)___jack allows connection of analog TVs and other similar output devices.

RCA

Audio out

USB

HDMI
26)____is competitor OS for Microsoft

Linux

Windows

Symbian

All of above

27)Which of the following is not community hacked port number

18

19

20

21

28)Forest Fire Detection is an example of

IOT Level 5

IOT Level 6

IOT Level 2

IOT Level 1

29)Keeping the software up to date is sign of

Good security

Bad security

A and B

None criteria

30) Key for handling of digital evidence is:

Proper protocol should be followed for acquisition of evidence

AIl material should be date and time stamped

All artifacts physical and digital should be collected and retained

All of the above


31)Which of the following is a part of social engineering life cycle?

Gaining a information

User identification

System monitoring

Shoulder surfing

32)A Chain of Custody form is used to document which of the following?

Investigator who has been in contact with evidence in a case

Anyone who has not been in contact with evidence in a case

An ne who has been in contact with idence in a case

33)___is one with very little knowledge about hacking but uses free tools and internet to perform
malicious act.

Ex Employee

Script Kiddies

Malicious Users

Gray Hat

34)Web server provide____as security mechanism

ACL

Root directory

Both A and B

None

35)____ tool is most versatile security tool for such security checks as port scanning & firewall testing

Ether peek

Ettercap

net cat

Nmap
36)Ethical hacker does not require____for effective operation.

Asset to be protected

PotentiaI Threat Source

Support by Organization

Development life cycle.

37)Which of the following term suits more to WhiteHat Hackers?

Formar Black Hat

Former Gray Hat

Fame Gainer

Security Professional

38)I0T stands for

Internet of Technology

Intranet of Things

Internet of Things

Information of Things

39)TCP is the most widely used ______protocoli that is used by web browsers (along with HTTP,
HTTPS application layer protocols), email programs (SMTP application layer protocol) and file transfer
(FTP).

Application Layer

Transport Layer

Network Layer

Link Layer

40)Keeping the software up to date is sign of

Good security

Bad security

A and B

None
41)The correct procedure followed according to the chain of custody for electronic evidence is :

a-Save the original material

b.Take photos of physical evidence

c.Take screenshots Of digital evidence content

d,lniect a bit-for-bit clone of diaital evidence

-c-b-d-e-f

-a-d-f-e-b

-a-b-c-d

42)one of the example of hackers on basis of their work and mind set is___

Evading an intrusion prevesion system

supporting security

promoting pollution in environment

none of these

43)IEEE 802.11 is a collection of wireless local area network (WLAN) communication standards,
including extensive description of the____

Link Layer

Application Layer

Transport Layer

Network Layer

44)SQLMap supports________

open source and cross platforms

supports database engines

sniffing networks

All Of these
45)____ data is a data that is lost if the power is switched off.

Non-volatile

Volatile

Primary

Secondary

46)What is rootkit?

A Simple tool to gain access to the root of the windows system,

An invasive program that affects the system files, including the kernel and

Tool to perform a buffer overflow

A rootkit is an invasive program that affects the system files, including the kernel, and remains
hidden to maintain unauthorized access

47)Computer programs that mimic the way human brain processes information is called__

Computer Networks

Circuits Network

Neural Network

Human Network

48)Apache Mahout is used for training______

Support Vector Machines (SVMs)

seIf -organizjng maps

hierarchical clustering

Naive Bayes classifier

49)_____ data is a data that is lost if the power is switched off.

Non-volatile

Volatile

Primary
50)Which of the following application are hacking targets on your network

Messaging application

Email

A and B

None

51)Ethical behind training how to hack a system

Think like hacker

Hacking system without permission

TO hack vulnerable networking

To corrupt software using malware

52)Hacking for a cause is called____

Active hacking

Hacktivism

Activism

Blackk-hat hacking

53)____belong to Email attack

Email Bomb

Banner

Both A and B

None

54)Which obstacle will be handled by Investigation while achieving the goal of DFI

If file is secured, investigator must find way to read the protected data in an unauthorized manner.

"Every case is different, identifying the techniques and tools will take long time."

All of the Above


55)Encrypted data can be impossible to view without the____

Key

Password

Evidence

None of the mentioned

56)A proof that is introduced in the form of physical object is referred as_____

Electronic evidence

Documented evidence

substantial evidence

Explainable evidence

57)Which of the following term suits more to WhiteHat Hackers?

Formar Black Hat

Former Gray Hat

Fame Gainer

Security Professional

58)one of the example of hackers on basis of their work and mind set is________

Evading an intrusion prevesion system

supporting security

promoting pollution in environment

none of these

59)Encrypted data can be impossible to view without the___

key

Password

Evidence

None of the mentioned


60)Illustrative evidence is also called as____

Demonstrative evidence

Explainable Evidence

Substantial evidence

Documented Evidence

61)The planning and reconnaissance phase of penetration testing in hacking_____

defines Salary of hacker for testing

defines test goals and intellegence is gathered

avoids inspection in testing phase

implements Random process in nenetratinn testing

62)Which of the following term suits more to White Hat Hackers?

Formar Black Hat

Former Gray Hat

Fame Gainer

Security Professional

63)DMZ stands for

DeMiliterized Zone

DeMail Zone

DoMain Zone

None

64)Guidelines selecting hacking tools may consists of______

Study the user guide for commercial tools

Detailed reports on the discovered vulnerabilities

updates and supports when needed

All of these
65)Which of the fOllowing is not a computer networking device.

Router

Firewall

Generic Host

None

66)An EMCI model follows as every activity occurs in sequence,

Agile Model

Spiral Model

Waterfall Model

None of these

67)Which is not the type of tool that is used by the Ethical hackers?

Nmap

net Framework

Superscan

ToneLoc

68)The message transfer capability can be set up on connections, either using handshakes such as
__or without handshakes/acknowledgements such as___

TCP,UDP

UDP,TCP

HTTP,CoAP

CoAP .HTTP

69)What is rootkit?

A Trojan that sends information to an SMB relay.

A Simple tool to gain access to the root of the windows system.

An invasive program that affects the system files, including the kernel and libraries.

A rootkit is an invasive program that affects the system files, including the kernel and libraries
70)Web server provide____as security mechanism

ACL

Root directory

Both A and B

None

71)Piggybacking onto a network through an insecure wireless configuration is a

Default windows OS confi guration

Weak SQL server administrator password

operating system attack

Network infrastructure attack

72)When assessing the reliability of digital evidence, the investigator is concerned with whether the
computer that generated the evidence was functioning normally, and:

Whether chain of custody was maintained

Whether there are indications that the actual digital evidence was tampered with

Whether the evidence was properly secured in transit

Whether the evidence media was compatible with forensic machines

73)In forensic investigation" in which format the computer and data would be, during the acquisition
of the media

protected

non protected

partially protected

hidden

74)Guidelines selecting hacking tools may consists of____

Study the user guide for commercial tools

Detailed reports on the discovered vulnerabilities

updates and supports when needed


All of these

75) In an email harassment case. the act of send/' threatening messages via a Web-based e-mail
service can leave a number of traces. Investigator can obtain information from____

Offender's hard drive

Web server access logs

IP addresses

All of the mentioned

76)Which was the first FBI Regional computer Laboratory was recognized in 2000?

Multimedia Laboratory

Programming laboratory

Forensic Laboratory

Software Laboratory

77)In______multiple large messages can quickly fill the total storage capacity of an email server

storage overload

Bandwidth blocking

A&B

None

78)Digital evidences must follow the requirements of the__

Ideal Evidence rule

Best Evidence Rule

Exchange Rule

AIl of the mentioned

79)Which is not the type of tool that is used by the Ethical hackers?

Nmap

net Framework

Superscan
80) Which of the following is not a best practice for minimizing security risk

Use of encrypted msg

Disable unused protocol

Use of right software

Injuction of malware in system

81)TCP is the most widely used ____protocol, that is used by web browsers (along with HTTP, HTTPS
application layer protocols), email programs (SMTP application layer protocol) and file transfer (FTP).

Application Layer

Transport Layer

Network Layer

Link Layer

82)____ is not a commercial firewall.

Nmap

EtherPeek

Ethereal

Weblnspect

83)Which of the following application are hacking targets on your network

Messaging application

Email

A and B

None

84)At what point should computer security professionals stop handling digital evidence and contact
law enforcement?

stop an contact law enforcement whenever they detect a crime

when their organization's policy specifies

when the task is beyond their training and experience

when they would be committing an offense by performing an action


85)Which of the fOllowing is not a computer networking device.

Router

Firewall

Generic Host

None

86)Which of the following statement is wrong

Investigator should not declare any confidential matters.

Investigator should respect privacy of others.

Investigator should be honest and trustworthy.

87)In____ system has a single node as well as data is stored and analyzed in the cloud application is
cloud based

IOT Level 1

IOT Level 2

IOT Level 3

IOT Level 4

88)Which of the following is a part of social engineering life cycle?

Gaining ainformation

User identification

System monitoring

Shoulder surfing

89)In____multiple large messages can quickly fill the total storage capacity of an email server

storage overload

Bandwidth blocking

A&B

None
90)Vulnerability is nothing but

Weakness of a system

Strong points of a system

Both a & b

None

91)___and____ supports methods such as GET, PUT. POST, and DELETE.

HTTP,CoAP

Websocket,MQTT

XMPP,AMQP

None of the above.

92) The ARM micro-controller architecture is___

Load-Store RISC Architecture

Load Store CISC Architecture

ROM Based Architecture

Hardwired Architecture

93) ZigBee is one of the most popular wireless technologies used by

WSN

MANET

Both a and b

None of the above.

94) An EMCI model follows as every activity occurs in sequence,

Agile Model

Spiral Model

Waterfall Model

None of these
95) ____form the basis of various applications.

AIgorithms

Programs

Code

Testing

96) Keeping the software up to date is sign of

Good security

Bad security

A and B

None

97)_____ is not a commercial firewall.

Nmap

EtherPeek

Ethereal

Weblnspect

98) Scanning is performed in which phase of a pen test?

pre-Attack

Attack

Post-attack

Reconnaissance

99) 802.15.4 also called as

Ethernet

WiFi

WiMax

LR-WPAN
100) TO access the security of the system one must understand Of the hacker.

Nature

Hobbies

Mindset

none of these

You might also like