ETI Question Bank For Class Test2
ETI Question Bank For Class Test2
QN QUESTION
21. The blockchain technology is defined in the year_____
a) 1991
b) 1997
c) 1989
d) 1982
24. A centralized system has a centralized control with all ____________and are easy to design,
maintain, enforce trust, and administrate.
25. Which block chain system is difficult to design and maintain, govern and impose to trust?
a) Centralized c) Both a and b
b) Decentralized d) None of the above
26. _________ consists of services and application programming interfaces (APIs), client-side
programming constructs, scripting, development frameworks that offer other apps with access to
the blockchain network.
28. A ___________ is used in the peer-to-peer communications between the nodes that allow them
to discover each other and get synchronized with another node in a network.
30. Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the
records of any digital asset transparent and unchangeable.
a) Secure c) Demanding
b) Popular d) Decentralized
31. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene C. Victim and the crime scene
B. Attacker and the crime scene D. Attacker and Information
33. The evidences or proof can be obtained from the electronic source is called the __________
A. digital evidence C. Explainable evidence
B. demonstrative evidence D. substantial evidence
34. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a a type of
_____________
A. Illustrative evidence C. Documented evidence
B. Electronic evidence D. Explainable evidence
36. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a hint
from the scene which is called as ____________
A. Locard’s Exchange principle C. Charles’s Anthony principle
B. Anderson’s Exchange principle D. Kevin Ashton principle
37. The process of ensuring that providing or obtaining the data that you have collected is similar to
the data provided or presented in a court is known as___________
A. Evidence validation C. Best evidence D. Illustrative evidence
B. Relative evidence D. Illustrative evidence
QN QUESTION
41. Ethical Hacking is also known as _____
A. Black Hat Hacking
B. White Hat Hacking
C. Encryption.
D. None of these
43. ______ is the art of exploiting the human elements to gain access to the authorized user
A. Social Engineering. C. Ethical Hacking
B. IT Engineering. D. None of the above.
45. The intent of ethical hacker is to discover vulnerabilities from a_____ point of view to better
secure system
A. Victims. C. Both A & B
B. Attackers D. None of the above
46. _______ is a person who find and exploits the weakness in computer system.
A. Victim C. Developer
B. Hacker D. None of the abov
49. _____ comprise of large portion of hacker attacks simply because every computer has one and so
well know exploits can be used against them
A. Nontechnical attack C. Operating system attack
B. Network infrastructure attack D. Application and other specialized attack
50. .Which hacker try to distribute political or social message through their work?
A. Black hat hacker C. Script kiddes
B. Hactivist D. White hat hacker
51. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good C. very good social engineering practice
B. not so good D. a bad
52. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking
A. Automated apps B. Database software
C. Malware D. Worms
53. The legal risks of ethical hacking include lawsuits due to __________ of personal data
A. stealing C. deleting
B. disclosure D. hacking
55. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat C. NetScan
B. SuperScan D. All of above
57. . Which tool is used for ping sweeps and port scanning?
A. Netcat C. SuperScan
B. SamSpade D. All the above
59. ________is a popular tool used for discovering network as well as security auditing
A. Ettercap C. Nmap
B. Metasploit D. Burp Suit
60. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking
A. Local networking
B. Social engineering C. Physical entry
D. Remote networking
QN QUESTION
61. Sniffing is used to perform ______________ fingerprinting.
A. Passive stack
B. Active stack
C. Passive banner grabbing
D. Scanned
64. _____ is used for searching of multiple hosts in order to target just one specific open port
A. Ping Sweep C. Ipconfig
B. Port scan D. Spamming
66. . ______is a tool that allows you to look into network and analyze data going across the wire for
network optimization, security and troubleshooting purposes.
A. Network analyzer C. John-the -Ripper
B. Crypt tool D. Back track
68. A type of attack that overloads the resources of a single system to cause it to crash or hang
A. Resource Starvation C. Passive Sniffing
Sub. Code:22618 Page 5 of 12
B. Active Sniffing D. Session Hijacking
69. In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems
A. Hacking C. Tracing
B. Evidence D. None of above
70. .____ attack, which can take down your Internet connection or your entire network
A. MAC C. IDS
B. DOS D. None of above
72. __________AI is a type of intelligence which could perform any intellectual task with
efficiency like a human.
a) Narrow AI c) Super AI
b) General AI d) None of above
73. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
_________ AI.
a) Narrow AI c) Super AI
b) General AI d) None of above
74. The most widely used coordinate system for data visualization is the .......................
a) Cartesian coordinates c) Nonlinear axes
b) Curved axes d) Polar coordinates
75. Which coordinate system can be useful for data of a periodic nature, such that data values at
one end of the scale can be logically joined to data values at the other end.
77. ___ is a stateful communication model and server is aware of all open connection.
78. Which mobile communication system supports video calling for the first time on mobile
devices?
a) 2G system c) 3G system
b) CDMA system d) None of the above
80. Blockchain is another layer on top of the Internet and can coexist with other
a) Internet technologies c) Service technology
b) Computer technology d) all of the above
QN QUESTION
81. A centralized system has a centralized control with all administrative rights and are _______.
a) Easy to design and enforce trust
b) Administrate and maintain.
c) Enforce trust, and administrate
d) All of the above
87. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation C. Passive Sniffing
Sub. Code:22618 Page 7 of 12
B. Active Sniffing D. Session Hijacking
88. Network consist devices such as routers, firewalls, hosts that you must assess as a part of ______
process.
A. Prackers C. Grey hat hacking process
B. Black hat hacking D. Ethical hacking process.
91. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees C. Grey-hat hackers
B. Black-hat hackers D. Script kiddies
93. .Nslookup can be used to gather information regarding which of the following?
A. Host names and IP addresses C. DNS server locations
B. Whois information D. Name server types and operating systems
94. Dumpster diving can be considered which type of social engineering attack?
A. Human-based C. Physical access
B. Computer-based D. Paper-based
95. SNMP is a protocol used to manage network infrastructure devices. What is the
SNMP read/write community name used for?
A. Viewing the configuration information C. Monitoring the device for errors
B. Changing the configuration information D. Controlling the SNMP management station
100 .Hackers dont think about the fact that human beings are behind.......
A.walls C.wired Network
B.Firewall D.None of the above
* * *Best of Luck* * *