0% found this document useful (0 votes)
57 views12 pages

ETI Question Bank For Class Test2

The document contains questions about blockchain technology, digital evidence collection, ethical hacking, and network security tools. It asks about the definition and history of blockchain, the layers of blockchain technology, digital evidence types and procedures, different types of hackers and their intentions, common network scanning tools, and other related topics.

Uploaded by

patelyashraj243
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views12 pages

ETI Question Bank For Class Test2

The document contains questions about blockchain technology, digital evidence collection, ethical hacking, and network security tools. It asks about the definition and history of blockchain, the layers of blockchain technology, digital evidence types and procedures, different types of hackers and their intentions, common network scanning tools, and other related topics.

Uploaded by

patelyashraj243
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

The Shirpur Education Society’s

R. C. Patel Polytechnic, Shirpur [1808]


QUESTION BANK

QN QUESTION
21. The blockchain technology is defined in the year_____
a) 1991
b) 1997
c) 1989
d) 1982

22. Block chain system is developed using the concept of ______.


a) Cryptographically Secured chain c) Secure
b) Demanding d) Popular

23. Blockchain______ is an append-only database and cannot be changed or altered.


a) ledger database c) responsive database
b) relational database d) all of the above

24. A centralized system has a centralized control with all ____________and are easy to design,
maintain, enforce trust, and administrate.

a) administrative rights c) Virtual rights


b) Network rights d) None of the above

25. Which block chain system is difficult to design and maintain, govern and impose to trust?
a) Centralized c) Both a and b
b) Decentralized d) None of the above

26. _________ consists of services and application programming interfaces (APIs), client-side
programming constructs, scripting, development frameworks that offer other apps with access to
the blockchain network.

a) Application Layer c) Semantic Layer


b) Execution Layer d) Propagation Layer

27. Semantic Layer also called as _______ of blockchain layer.


a) Logical Layer c) Physical Layer
b) Virtual Layer d) Basic Layer

28. A ___________ is used in the peer-to-peer communications between the nodes that allow them
to discover each other and get synchronized with another node in a network.

a) Execution Layer c) Semantic Layer


b) Application Layer d) Propagation Layer
Sub. Code:22618 Page 1 of 12
29. Consensus layer also deals with the__________ of the blockchain.
a) Safety and security c) Uploading and downloading
b) Sending and receiving d) All of the above

30. Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the
records of any digital asset transparent and unchangeable.

a) Secure c) Demanding
b) Popular d) Decentralized

31. The digital evidence are used to establish a credible link between____________
A. Attacker and victim and the crime scene C. Victim and the crime scene
B. Attacker and the crime scene D. Attacker and Information

32. Digital evidences must follow the requirements of the ___________


A. Ideal Evidence rule C. Exchange rule
B. Best Evidence rule D. All the mentioned

33. The evidences or proof can be obtained from the electronic source is called the __________
A. digital evidence C. Explainable evidence
B. demonstrative evidence D. substantial evidence

34. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a a type of
_____________
A. Illustrative evidence C. Documented evidence
B. Electronic evidence D. Explainable evidence

35. Blood, fingerprints, DNA these are examples of____________


A. Illustrative evidence C. Documented evidence
B. Electronic evidenceB. Electronic evidence D. Substantial evidence

36. When an incident takes place, a criminal will leave a hint evidence at the scene and remove a hint
from the scene which is called as ____________
A. Locard’s Exchange principle C. Charles’s Anthony principle
B. Anderson’s Exchange principle D. Kevin Ashton principle

37. The process of ensuring that providing or obtaining the data that you have collected is similar to
the data provided or presented in a court is known as___________
A. Evidence validation C. Best evidence D. Illustrative evidence
B. Relative evidence D. Illustrative evidence

38. Which is not procedure to establish a chain of custody?


A. Save the original materials C. Don’t take screenshots of digital evidence
content.

Sub. Code:22618 Page 2 of 12


B. Take photos of physical evidence D. Document date, time, and any other
information of receipt.

39. Which is example of non-volatile memory.


A. Flash memory C. Process table
B. Registers and Cache D. Arp cache

40. Email, hard drives are examples of ____________


C. Documented evidence
A.Illustrative evidence
B. Electronic evidence D. Explainable evidence

QN QUESTION
41. Ethical Hacking is also known as _____
A. Black Hat Hacking
B. White Hat Hacking
C. Encryption.
D. None of these

42. Vulnerability scanning in Ethical hacking finds_____


A. Strengths C. A &B
B. Weakness. D. None of these.

43. ______ is the art of exploiting the human elements to gain access to the authorized user
A. Social Engineering. C. Ethical Hacking
B. IT Engineering. D. None of the above.

44. The term cracker refers to_____


A. Black hat hacker C. Grey hat hacker
B. White hat hacker D. None of the above

45. The intent of ethical hacker is to discover vulnerabilities from a_____ point of view to better
secure system
A. Victims. C. Both A & B
B. Attackers D. None of the above

46. _______ is a person who find and exploits the weakness in computer system.
A. Victim C. Developer
B. Hacker D. None of the abov

47. A grey hat hacker is the one who_______


A. Fix identifies weakness C. Identifies the weakness and leave message
to owner
B. Steal the data D. None of the above

Sub. Code:22618 Page 3 of 12


48. _____ exploits that involves manipulating people and user even your self are the greatest
vulnerability within any computer
A. Nontechnical attacks C. Operating system attack
B. Network infrastructure attack D. Application and other specialized attack

49. _____ comprise of large portion of hacker attacks simply because every computer has one and so
well know exploits can be used against them
A. Nontechnical attack C. Operating system attack
B. Network infrastructure attack D. Application and other specialized attack

50. .Which hacker try to distribute political or social message through their work?
A. Black hat hacker C. Script kiddes
B. Hactivist D. White hat hacker

51. Performing a shoulder surfing in order to check other’s password is ____________ ethical
practice.
A. a good C. very good social engineering practice
B. not so good D. a bad

52. ___________ has now evolved to be one of the most popular automated tools for unethical
hacking
A. Automated apps B. Database software
C. Malware D. Worms

53. The legal risks of ethical hacking include lawsuits due to __________ of personal data
A. stealing C. deleting
B. disclosure D. hacking

54. SNMP stands for_____


A. Simple Network Messaging Protocol C. Simple Network Management Protocol
B. Simple Network Mailing Protocol D. Simple Network Master Protocol

55. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat C. NetScan
B. SuperScan D. All of above

56. . Banner grabbing is used for


A. White Hat Hacking C. Grey Hat Hacking
B. Black Hat Hacking D. Script Kiddies

57. . Which tool is used for ping sweeps and port scanning?
A. Netcat C. SuperScan
B. SamSpade D. All the above

58. Key loggers are form of


A. Spyware C. Trojan

Sub. Code:22618 Page 4 of 12


B. Shoulder surfing D. Social engineering

59. ________is a popular tool used for discovering network as well as security auditing
A. Ettercap C. Nmap
B. Metasploit D. Burp Suit

60. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking
A. Local networking
B. Social engineering C. Physical entry
D. Remote networking

QN QUESTION
61. Sniffing is used to perform ______________ fingerprinting.
A. Passive stack
B. Active stack
C. Passive banner grabbing
D. Scanned

62. ___________ scans TCP ports and resolves different hostnames.


A. SuperScan C. Ettercap
B. Snort D. QualysGuard .

63. What tool can be used to perform SNMP enumeration?


A. DNSlookup C. Nslookup
B. Whois D. IP Network Browser

64. _____ is used for searching of multiple hosts in order to target just one specific open port
A. Ping Sweep C. Ipconfig
B. Port scan D. Spamming

65. ARP spoofing is often referred to as___


A. Man-in-the-Middle attack C. Sniffing
B. Denial-of-Service attack D. Spoofing

66. . ______is a tool that allows you to look into network and analyze data going across the wire for
network optimization, security and troubleshooting purposes.
A. Network analyzer C. John-the -Ripper
B. Crypt tool D. Back track

67. What are the forms of password cracking technique?


A. Attack syllable C. Attacks hybrid
B. Attack brute forcing D. All the above

68. A type of attack that overloads the resources of a single system to cause it to crash or hang
A. Resource Starvation C. Passive Sniffing
Sub. Code:22618 Page 5 of 12
B. Active Sniffing D. Session Hijacking

69. In computer networking, ____ is any technical effort to manipulate the normal behavior of
network connections and connected systems
A. Hacking C. Tracing
B. Evidence D. None of above

70. .____ attack, which can take down your Internet connection or your entire network
A. MAC C. IDS
B. DOS D. None of above

71. Apple siri is a good example of ______ AI.


a) Narrow AI c) Neural AI
b) General AI d) None of above

72. __________AI is a type of intelligence which could perform any intellectual task with
efficiency like a human.

a) Narrow AI c) Super AI
b) General AI d) None of above

73. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
_________ AI.

a) Narrow AI c) Super AI
b) General AI d) None of above

74. The most widely used coordinate system for data visualization is the .......................
a) Cartesian coordinates c) Nonlinear axes
b) Curved axes d) Polar coordinates

75. Which coordinate system can be useful for data of a periodic nature, such that data values at
one end of the scale can be logically joined to data values at the other end.

a) Cartesian coordinates c) Nonlinear axes


b) Curved axes d) Polar coordinates

76. _____ is a data-centric middleware standard for device-to-device and machine-to-machine


communication.

a) Data Distribution Serviced (DDS) c) Extensible Messaging and Presence Protocol


(XMPP)
b) Advance Message Queuing Protocol (AMQP) d) Message Queue Telemetry Transport
(MQTT)

77. ___ is a stateful communication model and server is aware of all open connection.

Sub. Code:22618 Page 6 of 12


a) Request-Response c) Push-Pull
b) Publish-Subscriber d) Exclusive Pair

78. Which mobile communication system supports video calling for the first time on mobile
devices?

a) 2G system c) 3G system
b) CDMA system d) None of the above

79. Block chain system is developed using the concept of ______.


a) Cryptographically Secured chain c) Secure
b) Demanding d) Popular

80. Blockchain is another layer on top of the Internet and can coexist with other
a) Internet technologies c) Service technology
b) Computer technology d) all of the above

QN QUESTION
81. A centralized system has a centralized control with all administrative rights and are _______.
a) Easy to design and enforce trust
b) Administrate and maintain.
c) Enforce trust, and administrate
d) All of the above

82. Linking of block need to be defined on _________


a) Execution Layer c) Semantic Layer
b) Application Layer d) Propagation Layer

83. What is a node?


a) A Blockchain c) A type of cryptocurrency
b) An exchange d) A computer on Blockchain network

84. .Who created Bitcoin?


a) Elon Musk c) Satoshi Nakamoto
b) Warren Buffett d) Mark Zuckerberg

85. A blockchain is a type of?


a) Table c) Database
b) View d) Object

86. IDS stands for ___


A. Intrusion detection system C. Intrusion documentation system
B. Information documentation service D. None of above

87. A type of attack that overloads the resources of a single system to cause it to crash or hang.
A. Resource Starvation C. Passive Sniffing
Sub. Code:22618 Page 7 of 12
B. Active Sniffing D. Session Hijacking

88. Network consist devices such as routers, firewalls, hosts that you must assess as a part of ______
process.
A. Prackers C. Grey hat hacking process
B. Black hat hacking D. Ethical hacking process.

90. A security audit performed on the internal network of an organization by the


network administration is also known as ___________.

A. Grey-box testing C. White-box testing


B. Black-box testing D. Active testing

91. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees C. Grey-hat hackers
B. Black-hat hackers D. Script kiddies

92. What is the next step to be performed after footprinting?


A. Scanning C. System hacking
B. Enumeration D. Active information gathering

93. .Nslookup can be used to gather information regarding which of the following?
A. Host names and IP addresses C. DNS server locations
B. Whois information D. Name server types and operating systems

94. Dumpster diving can be considered which type of social engineering attack?
A. Human-based C. Physical access
B. Computer-based D. Paper-based

95. SNMP is a protocol used to manage network infrastructure devices. What is the
SNMP read/write community name used for?
A. Viewing the configuration information C. Monitoring the device for errors
B. Changing the configuration information D. Controlling the SNMP management station

96. Investigation of computer security which step follow


A.Incident leads to legal proceeding C. incident leads to legal procedure
B.Legal proceeding to leads incident D. Legal proceeding to leads incident

97. Digital Evidence which form of data or information transmit or stored


A. Digital form C. Both a and b
B. Analog form D. None of the above

98. . Digital stream of bits used in ..........


A. digital communication C. Both A & B
B. data storage application. D. Crime Scene

Sub. Code:22618 Page 8 of 12


99. The negavtive aspects of hacking usually overshadow the positive aspects and
promotes...........
A.Positive Aspects C.Negative Aspects
B.Positive Stereotypes D.Negative stereotypes

100 .Hackers dont think about the fact that human beings are behind.......
A.walls C.wired Network
B.Firewall D.None of the above

* * *Best of Luck* * *

Sub. Code:22618 Page 9 of 12


ANSWER KEY

Q. No. Answer Q. No. Answer


21. A 31. A

Sub. Code:22618 Page 10 of 12


22. A 32. B
23. A 33. A
24. A 34. A
25. B 35. D
26. A 36. A
27. A 37. A
28. D 38. D
29. A 39. A
30. D 40. D

Q. No. Answer Q. No. Answer


41. B 51. D
42. B 52. C
43. A 53. B
44. A 54. C
45. B 55. D
46. B 56. A
47. C 57. C
48. A 58. A
49. C 59. C
50. B 60. A

Q. No. Answer Q. No. Answer


61. A 71. A
62. A 72. B
63. D 73. C

Sub. Code:22618 Page 11 of 12


64. A 74. A
65. A 75. D
66. A 76. A
67. D 77. D
68. C 78. C
69. A 79. A
70. B 80. A

Q. No. Answer Q. No. Answer


81. D 91. A
82. C 92. A
83. D 93. A
84. C 94. B
85. C 95. A
86. A 96. A
87. C 97. C
88. D 98. D
89. C 99. B
90. A 100. B

Sub. Code:22618 Page 12 of 12

You might also like