ETI Question Bank
ETI Question Bank
QN QUESTION
21. The blockchain technology is defined in the year_____
a) 1991
b) 1997
c) 1989
d) 1982
A
22. Block chain system is developed using the concept of ______.
a) Cryptographically Secured chain c) Secure
b) Demanding d) Popular
A
23. Blockchain______ is an append-only database and cannot be changed or altered.
a) ledger database c) responsive database
b) relational database d) all of the above
A
24. A centralized system has a centralized control with all ____________and are easy to design,
maintain, enforce trust, and administrate.
d
29. Consensus layer also deals with the__________ of the blockchain.
a) Safety and security c) Uploading and downloading
b) Sending and receiving d) All of the above
a
30. Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the
records of any digital asset transparent and unchangeable.
a) Secure c) Demanding
b) Popular d) Decentralized
d
31. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene C. Victim and the crime scene
B. Attacker and the crime scene D. Attacker and Information
a
32. Digital evidences must follow the requirements of the ___________
A. Ideal Evidence rule C. Exchange rule
B. Best Evidence rule D. All the mentioned
b
33. The evidences or proof can be obtained from the electronic source is called the __________
A. digital evidence C. Explainable evidence
B. demonstrative evidence D. substantial evidence
a
34. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a a type of
_____________
A. Illustrative evidence C. Documented evidence
B. Electronic evidence D. Explainable evidence
a
35. Blood, fingerprints, DNA these are examples of____________
B. Take photos of physical evidence D. Document date, time, and any other
information of receipt.
d
39. Which is example of non-volatile memory.
A. Flash memory C. Process table
B. Registers and Cache D. Arp cache
a
40. Email, hard drives are examples of ____________
C. Documented evidence
A.Illustrative evidence
B. Electronic evidence D. Explainable evidence
d
QN QUESTION
41. Ethical Hacking is also known as _____
A. Black Hat Hacking
B. White Hat Hacking
C. Encryption.
D. None of these
b
42. Vulnerability scanning in Ethical hacking finds_____
A. Strengths C. A &B
B. Weakness. D. None of these.
48. _____ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks C. Operating system attack
B. Network infrastructure attack D. Application and other specialized attack
a
49. _____ comprise of large portion of hacker attacks simply because every computer has one and so
well know exploits can be used against them
A. Nontechnical attack C. Operating system attack
B. Network infrastructure attack D. Application and other specialized attack
c
50. .Which hacker try to distribute political or social message through their work?
A. Black hat hacker C. Script kiddes
B. Hactivist D. White hat hacker
b
a) Narrow AI c) Super AI
b) General AI d) None of above
b
73. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
_________ AI.
a) Narrow AI c) Super AI
b) General AI d) None of above
c
74. The most widely used coordinate system for data visualization is the .......................
a) Cartesian coordinates c) Nonlinear axes
b) Curved axes d) Polar coordinates
a
75. Which coordinate system can be useful for data of a periodic nature, such that data values at one
end of the scale can be logically joined to data values at the other end.
a
77. ___ is a stateful communication model and server is aware of all open connection.
a) Request-Response c) Push-Pull
b) Publish-Subscriber d) Exclusive Pair
d
78. Which mobile communication system supports video calling for the first time on mobile devices?
a) 2G system c) 3G system
b) CDMA system d) None of the above
c
79. Block chain system is developed using the concept of ______.
a) Cryptographically Secured chain c) Secure
b) Demanding d) Popular
a
80. Blockchain is another layer on top of the Internet and can coexist with other
a) Internet technologies c) Service technology
b) Computer technology d) all of the above
a
QN QUESTION
81. A centralized system has a centralized control with all administrative rights and are _______.
a) Easy to design and enforce trust
b) Administrate and maintain.
c) Enforce trust, and administrate
d) All of the above
d
82. Linking of block need to be defined on _________
a) Execution Layer c) Semantic Layer
b) Application Layer d) Propagation Layer
c
Sub. Code:22618 Page 8 of 14
83. What is a node?
a) A Blockchain c) A type of cryptocurrency
b) An exchange d) A computer on Blockchain network
d
84. .Who created Bitcoin?
a) Elon Musk c) Satoshi Nakamoto
b) Warren Buffett d) Mark Zuckerberg
c
85. A blockchain is a type of?
a) Table c) Database
b) View d) Object
c
86. IDS stands for ___
A. Intrusion detection system C. Intrusion documentation system
B. Information documentation service D. None of above
a
87. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation C. Passive Sniffing
91. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees C. Grey-hat hackers
B. Black-hat hackers D. Script kiddies
a
92. What is the next step to be performed after footprinting?
A. Scanning C. System hacking
B. Enumeration D. Active information gathering
b
* * *Best of Luck* * *
ANSWER KEY
22. A 32. B
23. A 33. A
24. A 34. A
25. B 35. D
26. A 36. A
27. A 37. A
28. D 38. D
29. A 39. A
30. D 40. D
Sub. Code:22618
Q. No. Answer Q. No. Answer
41. B 51. D
42. B 52. C
43. A 53. B
44. A 54. C
45. B 55. D
46. B 56. A
47. C 57. C
48. A 58. A
49. C 59. C
50. B 60. A
Sub. Code:22618
Q. No. Answer Q. No. Answer
81. D 91. A
82. C 92. A
83. D 93. A
84. C 94. B
85. C 95. A
86. A 96. A
87. C 97. C
88. D 98. D
89. C 99. B
90. A 100. B
Sub. Code:22618