ETI Set 2
ETI Set 2
Q1) One of the example of hackers on basis of their work and mind set is ___________
1) Evading an intrusion prevention system
2) Supporting security
3) Promoting pollution in environment
4) none of these
Ans:-
Q2) IEEE 802.11 is a collection of wireless local area network (WLAN) communication
standards including extensive description of the ______________
1) link layer
2) application layer
3) transport layer
4) network layer
Ans:-
1) link layer
4) All of these
An invasive program that affects the system files , including the kernel and libraries.
Q5) computer program that mimic the way human brain processes information is
called__________
1) Computer networks
2) Circuits Networks
3) Neural Networks
4) Human Network
Ans:-
3) Neural Networks
Q7) _____________ data is a data that is lost if the power is switched off.
1) Non- Volatile
2) Volatile
3) Primary
4) Secondary
Ans:-
2)Volatile
Q8) Which of the following application are hacking targets on your network
1) messaging application
2) email
3) a and b
4) none
Ans:-
3) a and b
Q11) a proof that is introduced in the form of physical object is reffered as ______
1) Electronic Evidance
2) Documented Evidance
3) substantial evidence
4) explainable evidence
Ans:-
1) Demonstrative evidence
Q13) The planning and reconnaissance phase of penetration testing in hacking ______
1) defines Salary of hacker for testing
2) defines test goals intelligence is gathered
3) avoids inspections in testing phase
4) implements Random process in penetration testing
Ans:-
3) Generic Host
Q15) the message transfer capability can be set up on connections, either using handshakes
such as _________ or without handshake/acknowledgements such as ___________.
1) TCP,UDP
2) UDP,TCP
3) HTTP,Coep
4) CoAp,HTTP
Ans:-
1) TCP,UDP
Q16) Piggybacking onto a network through an insecure wireless configuration is a ___
1) Default windows os Configuration
2) weak SQL server administrator password
3) operating system attack
4) network infrastructure attack
Ans:-
Q17) When accessing the reliability of digital evidence, the investigator is concerned with
whether the computer that generated the evidence was functioning normally and
1) whether chain of custody was maintained
2) whether there are indications that actual digital evidence was tempered with
3) whether the evidence was properly secured in transist
4) where the evidence media was compatible with forensic machines
Ans:-
2) whether there are indications that actual digital evidence was tempered with
Q18) In forensic investigation in which format the computer and data would be during the
acquisition of the media
1) protected
2) non protected
3) partially protected
4) hidden
Ans:-
2) non protected
Q19) In an email harassment case the act of sending threatening message via web based
email service can leave a number of traces investigator can obtain information from ______
1) offenders hard drive
2) web server access logs
3) IP addresses
4) all of the mentioned
Ans:-
Q20) Which was the first FBI regional computer laboratory was recognised in 2000?
1) multimedia laboratory
2) programming laboratory
3) Forensic Laboratory
4) software laboratory
Ans:-
3) Forensic Laboratory
Q21) In _________________ multiple large message can quickly fill the total storage
capacity of an email server
1) storage overload
2) Bandwidth blocking
3) A and b
4) none
Ans:-
1) storage overload