0% found this document useful (0 votes)
9 views

ETI Set 2

Uploaded by

Ajinkya D
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

ETI Set 2

Uploaded by

Ajinkya D
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SET 2

Q1) One of the example of hackers on basis of their work and mind set is ___________
1) Evading an intrusion prevention system
2) Supporting security
3) Promoting pollution in environment
4) none of these
Ans:-

1) Evading an intrusion prevention system

Q2) IEEE 802.11 is a collection of wireless local area network (WLAN) communication
standards including extensive description of the ______________
1) link layer
2) application layer
3) transport layer
4) network layer
Ans:-

1) link layer

Q3) SQLMap Supports _____________


1) open source and cross platforms
2) supports database engine
3) sniffing networks
4) All of these
Ans:-

4) All of these

Q4) what is rootkit?


Ans:-

An invasive program that affects the system files , including the kernel and libraries.

Q5) computer program that mimic the way human brain processes information is
called__________
1) Computer networks
2) Circuits Networks
3) Neural Networks
4) Human Network
Ans:-
3) Neural Networks

Q6) Apache Mahout is used for training ______________


1) Support vector machines
2) self organizing maps
3) hierarchical clustering
4) Naïve Bayes Classifier
Ans:-

4) Naïve Bayes Classifier

Q7) _____________ data is a data that is lost if the power is switched off.
1) Non- Volatile
2) Volatile
3) Primary
4) Secondary
Ans:-

2)Volatile

Q8) Which of the following application are hacking targets on your network
1) messaging application
2) email
3) a and b
4) none
Ans:-

3) a and b

Q9) ethical behind training how to hack a system


1) think like hacker
2) hacking system without permission
3) to hack vulnearable networking
4) to corrupt software using malware
Ans:-

1) think like hacker

Q10) ___________________ belong to email attack


1) email bomb
2) banner
3) both a and b
4) none
Ans:-
1) email bomb

Q11) a proof that is introduced in the form of physical object is reffered as ______
1) Electronic Evidance
2) Documented Evidance
3) substantial evidence
4) explainable evidence
Ans:-

Q12) Illustrative evidence is also called as ____________


1) Demonstrative evidence
2) Explainable Evidence
3) Substantial evidence
4) Documented Evidence
Ans:-

1) Demonstrative evidence

Q13) The planning and reconnaissance phase of penetration testing in hacking ______
1) defines Salary of hacker for testing
2) defines test goals intelligence is gathered
3) avoids inspections in testing phase
4) implements Random process in penetration testing
Ans:-

2) defines test goals intelligence is gathered

Q14) which of the following is not a computer networking device?


1) Router
2) Firewall
3) Generic Host
4) None
Ans:-

3) Generic Host

Q15) the message transfer capability can be set up on connections, either using handshakes
such as _________ or without handshake/acknowledgements such as ___________.
1) TCP,UDP
2) UDP,TCP
3) HTTP,Coep
4) CoAp,HTTP
Ans:-

1) TCP,UDP
Q16) Piggybacking onto a network through an insecure wireless configuration is a ___
1) Default windows os Configuration
2) weak SQL server administrator password
3) operating system attack
4) network infrastructure attack
Ans:-

4) network infrastructure attack

Q17) When accessing the reliability of digital evidence, the investigator is concerned with
whether the computer that generated the evidence was functioning normally and
1) whether chain of custody was maintained
2) whether there are indications that actual digital evidence was tempered with
3) whether the evidence was properly secured in transist
4) where the evidence media was compatible with forensic machines
Ans:-

2) whether there are indications that actual digital evidence was tempered with

Q18) In forensic investigation in which format the computer and data would be during the
acquisition of the media
1) protected
2) non protected
3) partially protected
4) hidden
Ans:-

2) non protected

Q19) In an email harassment case the act of sending threatening message via web based
email service can leave a number of traces investigator can obtain information from ______
1) offenders hard drive
2) web server access logs
3) IP addresses
4) all of the mentioned
Ans:-

4) all of the mentioned

Q20) Which was the first FBI regional computer laboratory was recognised in 2000?
1) multimedia laboratory
2) programming laboratory
3) Forensic Laboratory
4) software laboratory
Ans:-
3) Forensic Laboratory

Q21) In _________________ multiple large message can quickly fill the total storage
capacity of an email server
1) storage overload
2) Bandwidth blocking
3) A and b
4) none
Ans:-

1) storage overload

You might also like