0% found this document useful (0 votes)
52 views14 pages

ETI Question Bank

The document contains questions about blockchain technology, digital evidence collection procedures, ethical hacking concepts and tools, and network security testing. It includes multiple choice questions about defining blockchain, the layers of blockchain technology, establishing a chain of custody for digital evidence, social engineering techniques, and network scanning tools.

Uploaded by

patelyashraj243
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views14 pages

ETI Question Bank

The document contains questions about blockchain technology, digital evidence collection procedures, ethical hacking concepts and tools, and network security testing. It includes multiple choice questions about defining blockchain, the layers of blockchain technology, establishing a chain of custody for digital evidence, social engineering techniques, and network scanning tools.

Uploaded by

patelyashraj243
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

The Shirpur Education Society’s

R. C. Patel Polytechnic, Shirpur [1808]


QUESTION BANK

QN QUESTION
21. The blockchain technology is defined in the year_____
a) 1991
b) 1997
c) 1989
d) 1982
A
22. Block chain system is developed using the concept of ______.
a) Cryptographically Secured chain c) Secure
b) Demanding d) Popular
A
23. Blockchain______ is an append-only database and cannot be changed or altered.
a) ledger database c) responsive database
b) relational database d) all of the above
A
24. A centralized system has a centralized control with all ____________and are easy to design,
maintain, enforce trust, and administrate.

a) administrative rights c) Virtual rights


b) Network rights d) None of the above
A
25. Which block chain system is difficult to design and maintain, govern and impose to trust?
a) Centralized c) Both a and b
b) Decentralized d) None of the above
b
26. _________ consists of services and application programming interfaces (APIs), client-side
programming constructs, scripting, development frameworks that offer other apps with access to
the blockchain network.

a) Application Layer c) Semantic Layer


b) Execution Layer d) Propagation Layer
a
27. Semantic Layer also called as _______ of blockchain layer.
Sub. Code:22618 Page 1 of 14
a) Logical Layer c) Physical Layer
Virtual Layer d) Basic Layer
a
28. A ___________ is used in the peer-to-peer communications between the nodes that allow them
to discover each other and get synchronized with another node in a network.

a) Execution Layer c) Semantic Layer


b) Application Layer d) Propagation Layer

d
29. Consensus layer also deals with the__________ of the blockchain.
a) Safety and security c) Uploading and downloading
b) Sending and receiving d) All of the above
a
30. Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the
records of any digital asset transparent and unchangeable.

a) Secure c) Demanding
b) Popular d) Decentralized
d
31. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene C. Victim and the crime scene
B. Attacker and the crime scene D. Attacker and Information
a
32. Digital evidences must follow the requirements of the ___________
A. Ideal Evidence rule C. Exchange rule
B. Best Evidence rule D. All the mentioned
b
33. The evidences or proof can be obtained from the electronic source is called the __________
A. digital evidence C. Explainable evidence
B. demonstrative evidence D. substantial evidence
a
34. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a a type of
_____________
A. Illustrative evidence C. Documented evidence
B. Electronic evidence D. Explainable evidence
a
35. Blood, fingerprints, DNA these are examples of____________

Sub. Code:22618 Page 2 of 14


A. Illustrative evidence C. Documented evidence
Electronic evidenceB. Electronic evidence D. Substantial evidence
d
36. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a hint
from the scene which is called as ____________
A. Locard’s Exchange principle C. Charles’s Anthony principle
B. Anderson’s Exchange principle D. Kevin Ashton principle
a
37. The process of ensuring that providing or obtaining the data that you have collected is similar to
the data provided or presented in a court is known as___________
A. Evidence validation C. Best evidence D. Illustrative evidence
B. Relative evidence D. Illustrative evidence
a
38. Which is not procedure to establish a chain of custody?
A. Save the original materials C. Don’t take screenshots of digital evidence
ntent.

B. Take photos of physical evidence D. Document date, time, and any other
information of receipt.
d
39. Which is example of non-volatile memory.
A. Flash memory C. Process table
B. Registers and Cache D. Arp cache
a
40. Email, hard drives are examples of ____________
C. Documented evidence
A.Illustrative evidence
B. Electronic evidence D. Explainable evidence
d
QN QUESTION
41. Ethical Hacking is also known as _____
A. Black Hat Hacking
B. White Hat Hacking
C. Encryption.
D. None of these
b
42. Vulnerability scanning in Ethical hacking finds_____
A. Strengths C. A &B
B. Weakness. D. None of these.

Sub. Code:22618 Page 3 of 14


b
43. ______ is the art of exploiting the human elements to gain access to the authorized user
A. Social Engineering. C. Ethical Hacking
B. IT Engineering. D. None of the above.
a
44. The term cracker refers to_____
A. Black hat hacker C. Grey hat hacker
B. White hat hacker D. None of the above
a
45. The intent of ethical hacker is to discover vulnerabilities from a_____ point of view to better
secure system
A. Victims. C. Both A & B
B. Attackers D. None of the above
b
46. _______ is a person who find and exploits the weakness in computer system.
A. Victim C. Developer
B. Hacker D. None of the abov
b
47. A grey hat hacker is the one who_______
A. Fix identifies weakness C. Identifies the weakness and leave message
owner
B. Steal the data D. None of the above
c

48. _____ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks C. Operating system attack
B. Network infrastructure attack D. Application and other specialized attack
a
49. _____ comprise of large portion of hacker attacks simply because every computer has one and so
well know exploits can be used against them
A. Nontechnical attack C. Operating system attack
B. Network infrastructure attack D. Application and other specialized attack
c
50. .Which hacker try to distribute political or social message through their work?
A. Black hat hacker C. Script kiddes
B. Hactivist D. White hat hacker
b

Sub. Code:22618 Page 4 of 14


51. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good C. very good social engineering practice
B. not so good D. a bad
d
52. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking
A. Automated apps B. Database software
C. Malware D. Worms
c
53. The legal risks of ethical hacking include lawsuits due to __________ of personal data
A. stealing C. deleting
B. disclosure D. hacking
b
54. SNMP stands for_____
A. Simple Network Messaging Protocol C. Simple Network Management Protocol
B. Simple Network Mailing Protocol D. Simple Network Master Protocol
c
55. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat C. NetScan
B. SuperScan D. All of above
d
56. . Banner grabbing is used for
A. White Hat Hacking C. Grey Hat Hacking
B. Black Hat Hacking D. Script Kiddies
a
57. . Which tool is used for ping sweeps and port scanning?
A. Netcat C. SuperScan
B. SamSpade D. All the above
c
58. Key loggers are form of
A. Spyware C. Trojan

B. Shoulder surfing D. Social engineering


a
59. ________is a popular tool used for discovering network as well as security auditing
A. Ettercap C. Nmap
B. Metasploit D. Burp Suit
Sub. Code:22618 Page 5 of 14
c
60. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking
A. Local networking
B. Social engineering C. Physical entry
D. Remote networking
a
QN QUESTION
61. Sniffing is used to perform ______________ fingerprinting.
A. Passive stack
B. Active stack
C. Passive banner grabbing
D. Scanned
a
62. ___________ scans TCP ports and resolves different hostnames.
A. SuperScan C. Ettercap
B. Snort D. QualysGuard .
a
63. What tool can be used to perform SNMP enumeration?
A. DNSlookup C. Nslookup
B. Whois D. IP Network Browser
d
64. _____ is used for searching of multiple hosts in order to target just one specific open port
A. Ping Sweep C. Ipconfig
B. Port scan D. Spamming
a
65. ARP spoofing is often referred to as___
A. Man-in-the-Middle attack C. Sniffing
B. Denial-of-Service attack D. Spoofing
a
66. . ______is a tool that allows you to look into network and analyze data going across the wire for
network optimization, security and troubleshooting purposes.
A. Network analyzer C. John-the -Ripper
B. Crypt tool D. Back track
a
67. What are the forms of password cracking technique?
A. Attack syllable C. Attacks hybrid
B. Attack brute forcing D. All the above

Sub. Code:22618 Page 6 of 14


d
68. A type of attack that overloads the resources of a single system to cause it to crash or hang
A. Resource Starvation C. Passive Sniffing

B. Active Sniffing D. Session Hijacking


c
69. In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems
A. Hacking C. Tracing
B. Evidence D. None of above
a
70. .____ attack, which can take down your Internet connection or your entire network
A. MAC C. IDS
B. DOS D. None of above
b
71. Apple siri is a good example of ______ AI.
a) Narrow AI c) Neural AI
General AI d) None of above
a
72. __________AI is a type of intelligence which could perform any intellectual task with efficiency
like a human.

a) Narrow AI c) Super AI
b) General AI d) None of above
b
73. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
_________ AI.

a) Narrow AI c) Super AI
b) General AI d) None of above
c
74. The most widely used coordinate system for data visualization is the .......................
a) Cartesian coordinates c) Nonlinear axes
b) Curved axes d) Polar coordinates
a
75. Which coordinate system can be useful for data of a periodic nature, such that data values at one
end of the scale can be logically joined to data values at the other end.

a) Cartesian coordinates c) Nonlinear axes


Sub. Code:22618 Page 7 of 14
b) Curved axes d) Polar coordinates
d
76. _____ is a data-centric middleware standard for device-to-device and machine-to-machine
communication.

a) Data Distribution Serviced (DDS) c) Extensible Messaging and Presence Protocol


MPP)
b) Advance Message Queuing Protocol (AMQP) d) Message Queue Telemetry Transport (MQTT)

a
77. ___ is a stateful communication model and server is aware of all open connection.

a) Request-Response c) Push-Pull
b) Publish-Subscriber d) Exclusive Pair
d
78. Which mobile communication system supports video calling for the first time on mobile devices?

a) 2G system c) 3G system
b) CDMA system d) None of the above
c
79. Block chain system is developed using the concept of ______.
a) Cryptographically Secured chain c) Secure
b) Demanding d) Popular
a
80. Blockchain is another layer on top of the Internet and can coexist with other
a) Internet technologies c) Service technology
b) Computer technology d) all of the above
a
QN QUESTION
81. A centralized system has a centralized control with all administrative rights and are _______.
a) Easy to design and enforce trust
b) Administrate and maintain.
c) Enforce trust, and administrate
d) All of the above
d
82. Linking of block need to be defined on _________
a) Execution Layer c) Semantic Layer
b) Application Layer d) Propagation Layer
c
Sub. Code:22618 Page 8 of 14
83. What is a node?
a) A Blockchain c) A type of cryptocurrency
b) An exchange d) A computer on Blockchain network
d
84. .Who created Bitcoin?
a) Elon Musk c) Satoshi Nakamoto
b) Warren Buffett d) Mark Zuckerberg
c
85. A blockchain is a type of?
a) Table c) Database
b) View d) Object
c
86. IDS stands for ___
A. Intrusion detection system C. Intrusion documentation system
B. Information documentation service D. None of above
a
87. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation C. Passive Sniffing

B. Active Sniffing D. Session Hijacking


c
88. Network consist devices such as routers, firewalls, hosts that you must assess as a part of ______
process.
A. Prackers C. Grey hat hacking process
B. Black hat hacking D. Ethical hacking process.
d
90. A security audit performed on the internal network of an organization by the network
administration is also known as ___________.

A. Grey-box testing C. White-box testing


B. Black-box testing D. Active testing

91. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees C. Grey-hat hackers
B. Black-hat hackers D. Script kiddies
a
92. What is the next step to be performed after footprinting?
A. Scanning C. System hacking
B. Enumeration D. Active information gathering

Sub. Code:22618 Page 9 of 14


a
93. .Nslookup can be used to gather information regarding which of the following?
A. Host names and IP addresses C. DNS server locations
B. Whois information D. Name server types and operating systems
a
94. Dumpster diving can be considered which type of social engineering attack?
A. Human-based C. Physical access
B. Computer-based D. Paper-based
b
95. SNMP is a protocol used to manage network infrastructure devices. What is the SNMP
read/write community name used for?
A. Viewing the configuration information C. Monitoring the device for errors
B. Changing the configuration information D. Controlling the SNMP management station
a
96. Investigation of computer security which step follow
A.Incident leads to legal proceeding C. incident leads to legal procedure
B.Legal proceeding to leads incident D. Legal proceeding to leads incident
a
97. Digital Evidence which form of data or information transmit or stored
A. Digital form C. Both a and b
B. Analog form D. None of the above
c
98. . Digital stream of bits used in ..........
A. digital communication C. Both A & B
B. data storage application. D. Crime Scene
d
99. The negavtive aspects of hacking usually overshadow the positive aspects and promotes...........

A.Positive Aspects C.Negative Aspects


B.Positive Stereotypes D.Negative stereotypes
b
100 .Hackers dont think about the fact that human beings are behind.......
A.walls C.wired Network
B.Firewall D.None of the above

b
* * *Best of Luck* * *

Sub. Code:22618 Page 10 of 14


Sub. Code:22618 Page 11 of 14
Q. No. Answer Q. No. Answer
21. A 31. A

ANSWER KEY

22. A 32. B
23. A 33. A
24. A 34. A
25. B 35. D
26. A 36. A
27. A 37. A
28. D 38. D
29. A 39. A
30. D 40. D

Sub. Code:22618
Q. No. Answer Q. No. Answer
41. B 51. D
42. B 52. C
43. A 53. B
44. A 54. C
45. B 55. D
46. B 56. A
47. C 57. C
48. A 58. A
49. C 59. C
50. B 60. A

Q. No. Answer Q. No. Answer


61. A 71. A
62. A 72. B
63. D 73. C
64. A 74. A
65. A 75. D
66. A 76. A
67. D 77. D
68. C 78. C
69. A 79. A
70. B 80. A

Sub. Code:22618
Q. No. Answer Q. No. Answer
81. D 91. A
82. C 92. A
83. D 93. A
84. C 94. B
85. C 95. A
86. A 96. A
87. C 97. C
88. D 98. D
89. C 99. B
90. A 100. B

Sub. Code:22618

You might also like