ETI 22618 Chapter Wise All
ETI 22618 Chapter Wise All
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
2. DARPA, the agency that has funded a great deal of American AI research, is
part of the Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
4. What is the term used for describing the judgmental or commonsense part of
the problem solving?
A. Heuristic
B. Critical
C. Value-based
D. Analytical
E. None of the above
5. What of the following is considered to be a pivotal event in the history of AI.
A. 1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in1956 at a
conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
8. A.M. Turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many popular
products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.What is name of
AI?
A. Boolean logic B. Human logic
C. Fuzzy logic D. Functional logic
16. What is the term used for describing the judgmental or commonsense part of the problem
solving?
A. Heuristic B. Critical
C. Value-based D. Analytical
17. is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human-like fashions
A. Artificial Intelligence B. Internet of Things
C. Embedded System D. Cyber Security
18. In the goal is for the software to use what it has learned in one area to solve problems in otherareas.
A. Machine Learning B. Deep Learning
C. Neural Networks D. None of these
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning B. Deep Learning
C. Neural Networks D. None of these
20. A is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits the search for solutions in large problem spaces.
A. Heuristic B. Critical
C. Value based D. Analytical
26. The concept derived from level is propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level B. Logic level
C. Functional level D. All of the above
27. PROLOG is an AI programming language which solves problems with a form of symboliclogic
known as .
A. Propositional logic B. Tautology
C. Predicate calculus D. Temporal logic
28. The level contains constituents at the third level which are knowledge-based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level B. Gross level
C. Functional level D. All of the above
30. is used for AI because it supports the implementation of software that computes with symbolsvery
well.
A. LISP B. ELIZA
C. PROLOG D. NLP
31. Symbols, symbolic expressions, and computing with those is at the core of
A. LISP B. ELIZA
C. PROLOG D. NLP
32. that deals with the interaction between computers and humans using the natural
language
A. LISP B. ELIZA
C. PROLOG D. NLP
33. The core components are constituents of AI are derived from
A. Concept of logic B. Cognition
C. Computation D. All of the above
34. Aristotle’s theory of syllogism and Descartes and Kant's critic of pure reasoning made
knowledge on .
A. Logic B. Computation logic
C. Cognition logic D. All of the above
35. Charles Babbage and Boole who demonstrate the power of
A. Logic B. Computation logic
C. Cognition logic D. All of the above
36. In 1960s, pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky B. Alain Colmerauer
C. John McCarthy D. None of above
37. Sensing organs as input, mechanical movement organs as output and central nervous system (CNS)
inthe brain as control and computing devices is known as of human being
A. Information Control Paradigm B. Information Processing Paradigm
C. Information Processing Control D. None of the above
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
A. Regular Grammar B. Regular Expression
C. Regular Word D. None of these
44. Weak AI is
A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to
reflect intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
45. Strong AI is
A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to
reflect intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
49. AI is a type of intelligence which could perform any intellectual task with
efficiencylike human.
A. Narrow AI B. General AI
C. Super AI D. None of the above
50. The idea behind AI to make such a system which could be smarter and think
likea human by its own.
A. Narrow AI B. General AI
C. Super AI D. None of the above
51. The worldwide researchers are now focusing on developing machines with AI.
A. Narrow AI B. General AI
C. Super AI D. None of the above
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
AI.
A. Narrow AI B. General AI
C. Super AI D. None of the above
57. Which machines only focus on current scenarios and react on it as per as possible
best action.
A. Reactive machine B. Limited memory
C. Theory of mind D. None of the above
60. Which can stores past experiences or some data for short period time.
A. Reactive machine B. Limited memory
C. Theory of mind D. None of above
62. Which AI should understand human emotions, people, and beliefs and be able to interact socially
likehumans.
A. Reactive machine B. Limited memory
C. Theory of mind D. None of the above
65. Which is not the commonly used programming language for AI?
A. PROLOG B. LISP
C. Perl D. Java script
68. Classifying email as spam, labeling webpages based on their content, voice recognition arethe
example of .
A. Supervised learning B. Unsupervised learning
C. Machine learning D. Deep learning
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired bythe
structured and function of the brain called .
A. Machine learning B. Artificial neural networks
C. Deep learning D. Robotics
2. Embedded system is
A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Page 1 of 15
7. Which of the following is an (are) an intended purpose(s) of embedded systems?
A. Data collection
B. Data processing
C. Data communication
D. All of these
E. None of these
8. Which of the following is (are) example(s) of an embedded system for data communication?
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
9. What are the essential tight constraints related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D. All of the above
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPod (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Page 2 of 15
16. In microcontrollers, UART is acronym of
A. Universal Applied Receiver/Transmitter
B. Universal Asynchronous Rectified Transmitter
C. Universal Asynchronous Receiver/Transmitter
D. United Asynchronous Receiver/Transmitter
18. Which architecture involves both the volatile and non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
20. Harvard architecture allows:
A. Separate program and data memory
B. Pipe-ling
C. Complex architecture
D. All of the mentioned
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Page 3 of 15
26. ARM processors where basically designed for
A. Mainframe systems
B. Distributed systems
C. Mobile systems
D. Supercomputers
Page 4 of 15
36. What does “Things” in IoT refer to?
A. General device
B. Information
C. IoT devices
D. Object
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send and
receive data is called
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
38. is a computing concept that describes the idea of everyday physical objects being connected to
the internet.
A. IoT (Internet of Things)
B. MQTT
C. COAP
D. SPI
39 devices may support a number of interoperable communication protocols and communicate with other
devices and also with infrastructure.
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. None of the above
44. consists of communication protocols for electronic devices, typically a mobile device and a standard
device.
A. RFID
B. MQTT
C. NFC
D. None of the above
Page 5 of 15
45. refers to establish a proper connection between all the things of IoT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
46. IOT devices which have unique identities and can perform .
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
53. LR-WPANs standards from the basis of specifications for high-level communication protocol such as .
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Page 6 of 15
55. include UMTS and CDMA2000.
A. 2G
B. 3G
C. 4G
D. None of the above
56 _include LTE.
A. 2G
B. 3G
C. 4G
D. None of the above
57. layer protocols determine how the data is physically sent over the network’s physical layer or
medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link-layer
58 layer is responsible for sending of IP datagrams from the source network to the destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link-layer
60. protocols provide end to end message transfer capability independent of the underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link-layer
61. The protocols define how the applications interface with the lower-layer protocol to send the data over the
network.
A. Application layer
B. Transport layer
C. Network layer
D. Link-layer
63. 802.3 is the standard for 10BASE5 Ethernet that uses cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Page 7 of 15
65. of the following is a protocol related to IoT
A. Zigbee
B. 6LoWPAN
C. CoAP
D. All of the above
66. is useful for time-sensitive application that have very small data units to exchange and do not
want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer
D. None of the above.
67. protocol uses Universal Resource Identifiers (URIs) to identify HTTP resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
68. The 10/100Mbit Ethernet support enables the board to connect to
A. LAN
B. MAN
C. WAN
D. WLAN
69. Which one out of these is not a data link layer technology?
A. Bluetooth
B. UART
C. Wi-Fi
D. HTTP
70. What is the size of the IPv6 Address?
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
71. MQTT stands for
A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
73. MQTT is protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
74. Which protocol is lightweight?
A. MQTT
B. HTTP
C. CoAP
D. SPI
Page 8 of 15
75. MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Page 9 of 15
85. TCP and UDP are called?
A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
86. The security-based connection is provided by which layer?
A. Application layer
B. Transport layer
C. Session layer
D. Network layer
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
88. The transport layer receives data in the form of?
A. Packets
B. Byte streams
C. Bits stream
D. both packet and Byte stream
89. The network layer is considered as the ?
A. Backbone
B. packets
C. Bytes
D. bits
90. The network layer consists of which hardware devices?
A. Router
B. Bridges
C. Switches
D. All of the above
91. Network layer protocol exits in _?
A. Host
B. Switches
C. Packets
D. Bridges
92. Which protocol has a quality of service?
A. XMPP
B. HTTP
C. CoAP
D. MQTT
93. is a data-centric middleware standard for device-to-device and machine-to-machine communication.
A. Data Distribution Service (DDS)
B. Advanced Message Queuing Protocol (AMQP)
C. Extensible Messaging and Presence Protocol (XMPP)
D. Message Queue Telemetry Transport (MQTT)
94. is a bi-directional, fully duplex communication model that uses a persistent connection between client
and server.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Page 10 of 15
95. is a stateful communication model and the server is aware of all open connections.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
96. Which is not an IoT communication model.
A. Request-Response
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair
97. In Node MCU, MCU stands for .
A. Micro Control Unit
B. MicroController Unit
C. Macro Control Unit
D. Macro Controller Unit
98. REST is acronym for
A. Representational State Transfer
B. Represent State Transfer
C. Representational State Transmit
D. Representational Store Transfer
99. WSN stands for
A. Wide Sensor Network
B. Wireless Sensor Network
C. Wired Sensor Network
D. None of these
100. The benefit of cloud computing services
A. Fast
B. Anywhere access
C. Higher utilization
D. All of the above
101. PaaS stands for
A. Platform as a Service
B. Platform as a Survey
C. People as a Service
D. Platform as a Survey
102. as a Service is a cloud computing infrastructure that creates a development environment upon
which applications may be build.
A. Infrastructure
B. Service
C. Platform
D. All of the mentioned
103. is a cloud computing service model in which hardware is virtualized in the cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
104. Which of the following is the fundamental unit of the virtualized client in an IaaS deployment?
a) work unit
b) workspace
c) workload
d) all of the mentioned
Page 11 of 15
105. offering provides the tools and development environment to deploy applications on another vendor’s
application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
106. is the most refined and restrictive service model.
A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
107. is suitable for IoT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
108. is one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
109. Zigbeespecification are based on .
A. 802.3
B. 802.11
C. 802.16
D. 802.15.4
110. is a transformative computing paradigm that involves delivering applications and services over the
internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of the above
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
B. Cloud Computing
C. Big Data
D. None of the above
112. Does Raspberry Pi need external hardware?
A. True
B. False
113. Does RPi have internal memory?
A. True
B. False
114. What do we use to connect TV to RPi?
A. Male HDMI
B. Female HDMI
C. Male HDMI and Adapter
D. Female HDMI and Adapter
119. Which characteristics involve the facility the thing to respond in an intelligent way to a particular situation?
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
122. The number of devices that need to be managed and that communicate with each other will be much larger.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
123. inIoT as one of the key characteristics, devices have different hardware platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Page 13 of 15
126. DC motors convert electrical into energy.
A. Mechanical
B. Wind
C. Electric
D. None
127. Linear actuators are used in
A. Machine tools
B. Industrial machinery
C. both A and B
D.None
128. Solenoid is a specially designed
A. Actuator
B. Machine
C. Electromagnet
D. none of above
129. Stepper motors are
A. AC motors
B. DC motors
C. Electromagnets
D. None of the above
130. Accelerometer sensors are used in
A. Smartphones
B. Aircrafts
C. Both
D. None of the above
131. Image sensors are found in
A. Cameras
B. Night-vision equipment
C. Sonars
D. All of the above
Page 14 of 15
136. What is the microcontroller used in Arduino UNO?
A. ATmega328p
B. ATmega2560
C. ATmega32114
D. AT91SAM3x8E
137. is an open-source electronic platform based on easy to used hardware and software.
A. Arduino
B. Uno
C. Raspberry Pi
D. Node
139. _detect the presence or absence of nearby objects without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
140 sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and integrated
circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
142 sensor is used for automatic door controls, automatic parking system, automated sinks, automated toilet
flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Page 15 of 15
Question Bank for Multiple Choice Questions
Program: Diploma in Computer Engineering Program Code:- CO
Scheme:- I Semester:- SIXTH
Course:- Emerging Trends in Computer & IT Course Code:- 22618
5. In the past, the method for expressing an opinion has been to frame a question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Page 1 of 5
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of the copyright
B. The danger of macro viruses
C. Derivative works
D. computer-specific crime
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
14. phase includes putting the pieces of a digital puzzle together and developing investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Page 2 of 5
15. In phase investigator transfers the relevant data from a venue out of physical or administrative control of
the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
16. In phase investigator transfers the relevant data from a venue out of physical or administrative control of
the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
20. To collect and analyze the digital evidence that was obtained from the physical investigation phase, is the goal of
which phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
21. To provide a mechanism to an incident to be detected and confirmed is purpose of which phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
22. Which phase entails a review of the whole investigation and identifies an area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Page 3 of 5
24. _is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
29. is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick launch
C. OneLogin
D. Centrify
30. Which of the following are general Ethical norms for Investigator?
A. To contribute to society and human beings. B. To avoid harm to others.
C. To be honest and trustworthy. D. All of the above
E. None of the above
31. Which of the following are Unethical norms for Investigator?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. All of the above
E. None of the above
32. Which of the following is not a general ethical norm for Investigator?
A. To contribute to society and human beings. B. Uphold any relevant Evidence.
C. To be honest and trustworthy. D. To honor confidentially.
33. Which of the following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
34. What is called as the process of creation a duplicate of digital media for purpose of examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Page 4 of 5
35. Which term refers to modifying a computer in a way which was not originally intended to view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law
enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM
C. ROM.
D. EMMC chip
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
41. is the process of recording as much data as possible to create reports and analysis on user input.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
42. searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Metadata
D. Data Spoofing.
43. What is the first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting Files
Page 5 of 5
Question Bank for Multiple Choice Questions
Program: Diploma in Computer Engineering Program Code:- CO
Scheme:- I Semester:- SIXTH
Course:- Emerging Trends in Computer & IT Course Code:- 22618
Unit 04 – Digital Evidences Marks:- 10
4.1 Digital Evidences Definition of Digital Evidence, Best Evidence Rule, Original Evidence
4.2 Rules of Digital Evidence
4.3 Characteristics of Digital Evidence Locard‟s Exchange Principle Digital Stream of bits
4.4 Types of evidence Illustrative, Electronics, Documented, Explainable, Substantial, Testimonial
4.5 Challenges in evidence handling-Authentication of evidence, Chain of custody, Evidence validation
4.6 Volatile evidence
3. From the two given statements 1 & 2, select the correct option from a-d
1) Original media can be used to carry out digital investigation process
2) By default, every part of the victim’s computer is considered unreliable.
a. a and b both are true
b. a is true and b is false
c. a and b both are false
d. a is false and b is true
4. The evidences of proof that can be obtained from the electronic source is called the
a. Digital Evidence
b. Demonstrative Evidence
c. Explainable Evidence
d. Substantial Evidence
Page 1 of 11
7. What are the three general categories of computer systems that can contain digital evidence?
a.Desktop, laptop, server
b. Personal computer, Internet, mobile telephone
c. Hardware, software, networks
d. Open computer systems, communication systems, embedded systems
14. The criminological principle which states that, when anyone, or anything, enters a crime
scene he/she takes something of the scene with him/her, and leaves something of
himself/herself behind, is:
a. Locard’s Exchange Principle
b. Differential Association Theory
c. Beccaria‟s Social Contract
d. None of the above
15. Personal computers and networks are often a valuable source of evidence. Those involved
with------should be comfortable with this technology
a. Criminal investigation
b. Prosecution
c. Defense work
d. All of the above
Page 2 of 11
16. Digital evidence is only useful in a court of law.
a. True
b. False
18. All forensic examinations should be performed on the original digital evidence.
a. True
b. False
19. Digital evidence can be duplicated exactly without any changes to the original data.
a. True
b. False
20. Computers were involved in the investigations into both World Trade Center attacks.
a. True
b. False
21. Computer professionals who take inappropriate actions when they encounter child
pornography on their employer’s systems can lose their jobs or break the law.
a. True
b. False
24. Automobiles have computers that record data such as vehicle speed, brake status, and throttle position
when an accident occurs.
a. True
b. False
26. The aim of a forensic examination is to prove with certainty what occurred.
a. True
b. False
27. Even digital investigations that do not result in legal action can benefit from principles of forensic
science.
a. True
b. False
28. Forensic science is the application of science to investigation and prosecution of crime or to the just
resolution of conflict.
a. True
b. False
Page 3 of 11
29. When a file is deleted from a hard drive, it can often be recovered.
a. True
b. False
Page 4 of 11
39. Issues to be aware of when connecting to a computer over a network and collecting information
include:
a. Creating and following a set of standard operating procedures
b. Keeping a log of actions taken during the collection process
c. Documenting which server actually contains the data that‟s being collected
d. All of the above
40. When a computer contains digital evidence, it is always advisable to turn it off immediately.
a. True
b. False
41. A forensic image of a hard disk drive preserves the partition table.
a. True
b. False
42. All forensic tools acquire digital evidence from storage media in the same way.
a. True
b. False
43. It is not necessary to sanitize/wipe a hard drive purchased directly from a manufacturer.
a. True
b. False
44. Chain of custody enables anyone to determine where a piece of evidence has been, who handled it
when, and what was done to it since it was seized.
a. True
b. False
45. No two files can have the same MD5 value.
a. True
b. False
46. After the MD5 value of a piece of digital evidence has been calculated, any change in that piece of
evidence can be detected.
a. True
b. False
47. When drawing up an affidavit for a warrant, it is important to specifically mention all desired digital
evidence.
a. True
b. False
48. When seeking authorization to search a network and digital evidence that may exist in more than one
jurisdiction it is not necessary to obtain a search warrant for each location.
a. True
b. False
49. Digital investigators should remember that evidence can reside in unexpected places, such as
network routers.
a. True
b. False
50. Active monitoring is time consuming, invasive, and costly and should only be used as a last resort.
a. True
b. False
51. A digital evidence class characteristic is similar to tool mark analysis in the physical world.
a. True
b. False
Page 5 of 11
52. TCP/IP network traffic never contains useful class characteristics.
a. True
b. False
53. It is not possible to recover deleted system or network log files.
a. True
b. False
54. Having a member of the search team trained to handle digital evidence:
a. Can reduce the number of people who handle the evidence
b. Can serve to streamline the presentation of the case
c. Can reduce the opportunity for opposing counsel to impugn the integrity of the evidence
d. All of the above
55. A digital investigator pursuing a line of investigation in a case because that line of investigation
proved successful in two previous cases is an example of:
a. Logical reasoning
b. Common sense
c. Preconceived theory
d. Investigator‟s intuition
56. Regarding the admissibility of evidence, which of the following is not a consideration:
a. Relevance
b. Authenticity
c. Best evidence
d. Nominally prejudicial
57. According to the text, the most common mistake that prevents evidence seized from being
admitted is:
a. Uninformed consent
b. Forcible entry
c. Obtained without authorization
d. None of the above
58. The process of documenting the seizure of digital evidence and, in particular, when that evidence
changes hands, is known as:
a. Chain of custody
b. Field notes
c. Interim report
d. None of the above
59. When assessing the reliability of digital evidence, the investigator is concerned with whether the
computer that generated the evidence was functioning normally, and:
a. Whether chain of custody was maintained
b. Whether there are indications that the actual digital evidence was tampered with
c. Whether the evidence was properly secured in transit
d. Whether the evidence media was compatible with forensic machines
60. The fact that with modern technology, a photocopy of a document has become acceptable in place of
the original is known as:
a. Best evidence rule
b. Due diligence
c. Quid pro quo
d. Voir dire
Page 6 of 11
61. Evidence contained in a document provided to prove that statements made in court are true is
referred to as:
a. Inadmissible evidence
b. Illegally obtained evidence
c. Hearsay evidence
d. Direct evidence
64. There is no need for any specialized training in the collection of digital evidence.
a. True
b. False
65. It is the duty of a digital investigator to ignore influences from any source.
a. True
b. False
66. The application of preconceived theories to a particular case is a good method of reducing
caseload.
a. True b. False
67. In the United States, the prosecution must prove guilt beyond a reasonable doubt.
a. True
b. False
68. Chain of custody is the process of documenting who has handled evidence, where and when, as it
travels from the crime scene to the courts.
a. True
b. False
69. Typically, a photocopy of a document is considered hearsay evidence and is not admissible
in court.
a. True
b. False
71. Coerced testimony is the most common mistake that prevents evidence seized from being admitted.
a. True
b. False
72. Determining whether digital evidence has been tampered with is a major concern of the digital
examiner.
a. True
b. False
Page 7 of 11
73. Exceeding the scope of a warrant is not likely to affect the admissibility of the evidence collected.
a. True
b. False
74. Digital evidence cannot be direct evidence because of its separation from the events it represents.
a. True
b. False
75. When creating an expert report, digital investigators should support assertions in their reports with
multiple independent sources of evidence.
a. True
b. False
76. Voir dire is the process of becoming accepted as an expert by the court.
a. True
b. False
77. During testimony, when a lawyer appears not to be tech savvy, it is a good practice to guess what
the attorney is trying to ask.
a. True
b. False
78. A proper response to a question that you do not know the answer to is, “I don’t know.”
a. True
b. False
80. In those states with legislation addressing computer forgery, contraband in the form of “forgery
devices” may include:
a. Computers
b. Computer equipment
c. Specialized computer software
d. All of the above
88. The first step in applying the scientific method to a digital investigation is to:
a. Form a theory on what may have occurred
b. Experiment or test the available evidence to confirm or refute your prediction
c. Make one or more observations based on events that occurred
d. Form a conclusion based on the results of your findings
89. Which of the following should the digital investigator consider when arranging for the transportation
of evidence?
a. Should the evidence be physically in the possession of the investigator at all times?
b. Will the evidence copies be shared with other experts at other locations?
c. Will there be environmental factors associated with the digital media?
d. All of the above
90. Generating a plan of action and obtaining supporting resources and materials falls under which step
in the digital investigation?
a. Preparation
b. Survey/identification
c. Preservation
d. Examination and analysis
92. When a network is involved in a crime, investigators must seize and preserve all systems on the
network.
a. True
b. False
93. When seizing a computer, it is always acceptable to lose the contents of RAM.
a. True
b. False
Page 9 of 11
94. Case management is a critical part of digital investigations.
a. True
b. False
95. Forensic examination is the process of extracting, viewing, and analyzing information from the
evidence collected.
a. True
b. False
96. The crime scene preservation process includes all but which of the following:
a. Protecting against unauthorized alterations
b.Acquiring digital evidence
c. Confirming system date and time
d. Controlling access to the crime scene
98. When presenting evidence on an organizational network, the digital investigator may require the
assistance of:
a. System administrators
b. The CEO of the organization
c. The CSO (Chief Security Officer)
d.Additional forensic investigators
99. The proper collection of evidence at a crime scene is crucial in terms of admissibility in court.
a. True
b. False
101. One reason digital investigators write threshold assessments more often than full reports is
because:
a. They will be included in a final report, and so, distribute the time for final report preparation over the entire
period of the investigation.
b. They keep their supervisor aware of their productivity.
c. They take less time to prepare and may be sufficient to close out an investigation.
d. They serve as field notes for the investigator.
102. One reason not to put too much trust into those who run the company’s computers is that:
a. There has always been an antagonism between system administrators and law enforcement.
b. They are typically too busy to take the time to answer your questions.
c. They are usually not authorized to answer questions.
d. They may be the offenders.
Page 10 of 11
103. Although crime scenes are typically photographed, it is a good idea to create diagrams of the
crime scene because:
a. Diagramming is a common crime scene technician‟s skill; however, it requires continual practice.
b. The process of creating a diagram can result in a digital investigator noticing an important item of
evidence that would otherwise have been missed.
c. The quality of photographs taken at the crime scene is not known until the film is developed.
d. None of the above
104. When processing the digital crime scene in a violent crime investigation it is important to have
to ensure that all digital evidence and findings can hold up under close scrutiny.
a.A good supply of electrostatic bags for holding sensitive electronic components
b.More than one reliable camera for photographing the crime scene
c. Standard operating procedures for processing a digital crime scene
d.A good supply of nitrile gloves
Page 11 of 11
Question Bank for Multiple Choice Questions
Program: Diploma in Computer Engineering Program Code:- CO
Scheme:- I Semester:- SIXTH
Course:- Emerging Trends in Computer & IT Course Code:- 22618
Unit 05 – Basics of Hacking Marks:- 12
5.1 Ethical Hacking- How Hackers Beget Ethical Hackers, Defining hacker, Malicious users
5.2 Understanding the need to hack your own systems
5.3 Understanding the dangers your systems face- Nontechnical attacks, Network-infrastructure attacks,
Operating-system attacks, Application and other specialized attacks
5.4 Obeying the Ethical hacking Principles- Working ethically, Respecting privacy, Not crashing your
systems
5.5 The Ethical hacking Process- Formulating your plan, Selecting tools, Executing the plan, Evaluating
results, Moving on
5.6 Cracking the Hacker Mind-set- What You‟re Up Against?, Who breaks in to computer systems? Why
they do it? Planning and Performing Attacks Maintaining Anonymity
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are
termed as
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
Answer: b
Explanation: White Hat Hackers are cyber security analysts and consultants who have the intent to help firms
and Governments in the identification of loopholes as well as help to perform penetration tests for securing a
system.
2. Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
Answer: c
Explanation: Ethical Hacking is an ethical form of hacking done by white-hat hackers for performing penetration
tests and identifying potential threats in any organizations and firms.
3. They are nefarious hackers, and their main motive is to gain financial profit by doing cybercrimes.
Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
Answer: d
Explanation: Black Hat hackers also termed as „crackers‟and are a major type of cyber criminals who take
unauthorized access in user‟s account or system and steal sensitive data or inject malware into the system for
their profit or to harm the organization.
Page 1 of 12
4. are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
Answer: a
Explanation: Grey Hat Hackers have a blending character of both ethical as well as un-ethical hacker. They
hack other‟s systems for fun but do not harm the system, exploits bugs and vulnerabilities in network without the
knowledge of the admin or the owner.
5. The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth
working of security and hacking tools are called
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
Answer: c
Explanation: Script Kiddies are new to hacking and at the same time do not have many interests in developing
coding skills or find bugs of their own in systems; rather they prefer downloading of available tools (developed
by elite hackers) and use them to break any system or network. They just try to gain attention of their friend
circles.
7. Criminal minded individuals who work for terrorist organizations and steal information of nations and
other secret intelligence are
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
Answer: c
Explanation: Cyber Terrorists are very expert programmers and cyber criminals who hide themselves while
doing malicious activities over the internet and they are smart enough to hide themselves or their tracks of
action. They are hired for gaining unauthorized access to nation‟s data centres or break into the network of
intelligence agencies.
Page 2 of 12
8. One who disclose information to public of a company, organization, firm, government and private
agency and he/she is the member or employee of that organization; such individuals are termed as
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
Answer: d
Explanation: Whistleblowers are those individuals who is a member or an employee of any specific organization
and is responsible for disclosing private information of those organizations, firms, either government or private.
9. These types of hackers are the most skilled hackers in the hackers’ community. Who are “they”
referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
Answer: b
Explanation: The tag “Elite hackers” are considered amongst the most reputed hackers who possess most of
the hacking and security skills. They are treated with utmost respect in the hackers‟community. Zero day
vulnerabilities, serious hacking tools and newly introduced bugs are found and developed by them.
10. are those individuals who maintain and handles IT security in any firm or organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
Answer: a
Explanation: This is an intermediary level of position of an individual in an organization or firm who builds and
preserves different systems and its associated security tools of the firm of organization to which he/she
belongs.
12. are senior level corporate employees who have the role and responsibilities of creating and
designing secured network or security structures.
a) Ethical Hackers b) Chief Technical Officer
c) IT Security Engineers d) Security Architect
Answer: d
Explanation: Security architect are those senior grade employees of an organization who are in charge of
building, designing, implementing and testing of secured network topologies, protocols as well as secured
computers in an organization.
Page 3 of 12
13. security consultants uses database security monitoring & scanning tools to maintain
security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
Answer: a
Explanation: Database Security consultants are specific individuals hired in order to monitor and scan the
database systems and keep them secured from unwanted threats and attacks by giving access to restricted
users, blocking unwanted files, multi-factor access control etc.
14. Governments hired some highly skilled hackers. These types of hackers are termed as
a) Special Hackers b) Government Hackers
c) Cyber Intelligence Agents d) Nation / State sponsored hackers
Answer: d
Explanation: Nation / State sponsored hackers are specific individuals who are employed or hired by the
government of that nation or state and protect the nation from cyber terrorists and other groups or individuals
and to reveal their plans, communications and actions.
15. Someone (from outside) who tests security issues for bugs before launching a system or
application, and who is not a part of that organization or company are
a) Black Hat hacker
b) External penetration tester
c) Blue Hat hacker
d) White Hat Hacker
Answer: c
Explanation: Blue Hat Hackers are outsiders yet security testers who are temporarily hired for performing
outsourced security test for bugs and vulnerabilities in any system before launching it to the market or making
the application live.
Page 4 of 12
18. is a code injecting method used for attacking the database of a system / website.
a) HTML injection
b) SQL Injection
c) Malicious code injection
d) XML Injection
Answer: b
Explanation: SQLi (Structured Query Language Injection) is a popular attack where SQL code is targeted or
injected; for breaking the web application having SQL vulnerabilities. This allows the attacker to run malicious
code and take access to the database of that server.
20. This attack can be deployed by infusing a malicious code in a website’s comment section. What is
“this” attack referred to here?
a) SQL injection
b) HTML Injection
c) Cross Site Scripting (XSS)
d) Cross Site Request Forgery (XSRF)
Answer: c
Explanation: XSS attack can be infused by putting the malicious code (which gets automatically run) in any
comment section or feedback section of any webpage (usually a blogging page). This can hamper the
reputation of a site and the attacker may place any private data or personal credentials.
21. When there is an excessive amount of data flow, which the system cannot handle, attack
takes place.
a) Database crash attack
b) DoS (Denial of Service) attack
c) Data overflow Attack
d) Buffer Overflow attack
Answer: d
Explanation: The Buffer overflow attack takes place when an excessive amount of data occurs in the buffer,
which it cannot handle and lead to data being over-flow into its adjoined storage. This attack can cause a
system or application crash and can lead to malicious entry-point.
22. Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse
user’s credentials is called
a) Session Hijacking
b) Session Fixation
c) Cookie stuffing
d) Session Spying
Answer: a
Explanation: Using session hijacking, which is popularly known as cookie hijacking is an exploitation method for
compromising the user‟s session for gaining unauthorized access to user‟s information.
Page 5 of 12
23. Which of this is an example of physical hacking?
a) Remote Unauthorised access
b) Inserting malware loaded USB to a system
c) SQL Injection on SQL vulnerable site
d) DDoS (Distributed Denial of Service) attack
Answer: b
Explanation: If a suspicious gain access to server room or into any confidential area with a malicious pen-drive
loaded with malware which will get triggered automatically once inserted to USB port of any employee‟s PC; such
attacks come under physical hacking, because that person in gaining unauthorized physical access to any
room or organization first, then managed to get an employee‟s PC also, all done physically – hence breaching
physical security.
25. An attempt to harm, damage or cause threat to a system or network is broadly termed as
a) Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
Answer: b
Explanation: Cyber attack is an umbrella term used to classify different computer & network attacks or activities
such as extortion, identity theft, email hacking, digital spying, stealing hardware, mobile hacking and physical
security breaching.
27. are the special type of programs used for recording and tracking user’s keystroke.
a) Keylogger
b) Trojans
c) Virus
d) Worms
Answer: a
Explanation: Keyloggers are surveillance programs developed for both security purpose as well as done for
hacking passwords and other personal credentials and information. This type of programs actually saves the
keystrokes done using a keyboard and then sends the recorded keystroke file to the creator of such programs.
Page 6 of 12
28. Stuxnet is a
a) Worm
b) Virus
c) Trojan
d) Antivirus
Answer: a
Explanation: Stuxnet is a popular and powerful worm that came into existence in mid 2010, which was very
powerful as it was accountable for the cause of huge damage to Iran‟s Nuclear program. It mainly targets the
PLCs (Programmable Logic Controllers) in a system.
29. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
Answer: c
Explanation: According to the CIA triad the three components that a security need is the Confidentiality,
Integrity, Availability (as in short read as CIA) .
30. is the latest technology that faces an extra challenge because of CIA paradigm.
a) Big data
b) Database systems
c) Cloud storages
d) Smart dust
Answer: a
Explanation: Big data has additional challenges that it has to face because of the tremendous volume of data
that needs protection as well as other key elements of the CIA triad, which makes the entire process costly and
time-consuming.
32. is the practice and precautions taken to protect valuable information from unauthorised
access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
Answer: c
Explanation: Information Security (abbreviated as InfoSec) is a process or set of processes used for protecting
valuable information for alteration, destruction, deletion or disclosure by unauthorised users.
Page 7 of 12
33. From the options below, which of them is not a vulnerability to information security?
a) flood
b) without deleting data, disposal of storage media
c) unchanged default password
d) latest patches and updates not done
Answer: a
Explanation: Flood comes under natural disaster which is a threat to any information and not acts as a
vulnerability to any system.
34. platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive
Answer: a
Explanation: Nowadays data centres support workloads from different geographic locations across the globe
through physical systems, virtual machines, servers, and clouds. Their security can be managed using Cloud
workload protection platforms which manage policies regarding security of information irrespective of its location.
35. technology is used for analyzing and monitoring traffic in network and information flow.
a) Cloud access security brokers (CASBs)
b) Managed detection and response (MDR)
c) Network Security Firewall
d) Network traffic analysis (NTA)
Answer: d
Explanation: Network traffic analysis (NTA) is an approach of information security for supervising the traffic in
any network, a flow of data over the network as well as malicious threats that are trying to breach the network.
This technological solution also helps in triage the events detected by Network Traffic Analysing tools.
Page 8 of 12
38. Possible threat to any information cannot be
a) reduced
b) transferred
c) protected
d) ignored
Answer: d
Explanation: When there lies a threat to any system, safeguards can be implemented, outsourced, distributed
or transferred to some other system, protected using security tools and techniques but cannot be ignored.
39. How many basic processes or steps are there in ethical hacking?
a) 4
b) 5
c) 6
d) 7
Answer: c
Explanation: According to the standard ethical hacking standards, the entire process of hacking can be divided
into 6 steps or phases. These are: Reconnaissance, Scanning, Gaining Access, Maintaining Access, Tracks
clearing, reporting.
40. is the information gathering phase in ethical hacking from the target user.
a) Reconnaissance
b) Scanning
c) Gaining access
d) Maintaining access
Answer: a
Explanation: Reconnaissance is the phase where the ethical hacker tries to gather different kinds of information
aboutthetargetuser or the victim‟s system.
41. Which of the following is not a reconnaissance tool or technique for information gathering?
a) Hping
b) NMAP
c) Google Dorks
d) Nexpose
Answer: d
Explanation: Hping, NMAP & Google Dorks are tools and techniques for reconnaissance. Nexpose is a tool for
scanning the network for vulnerabilities.
Page 9 of 12
43. Which of the following is an example of active reconnaissance?
a) Searching public records
b) Telephone calls as a help desk or fake customer care person
c) Looking for the target‟s details in thedatabase
d) Searchingthetarget‟s details in paper files
Answer: b
Explanation: As active reconnaissance is all about interacting with target victim directly, hence telephonic calls
as a legitimate customer care person or help desk person, the attacker can get more information about the
target user.
47. Which of the following comes after scanning phase in ethical hacking?
a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access
Answer: d
Explanation: Gaining access is the next step after scanning. Once the scanning tools are used to look for flaws
in a system, it is the next phase where the ethical hackers or penetration testers have to technically gain access
to a network or system.
Page 10 of 12
48. In phase the hacker exploits the network or system vulnerabilities.
a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access
Answer: d
Explanation: Penetration testers after scanning the system or network tries to exploit the flaw of the system or
network in “gaining access” phase.
49. A can gain access illegally to a system if the system is not properly tested in scanning
and gaining access phase.
a) security officer
b) malicious hacker
c) security auditor
d) network analyst
Answer: b
Explanation: Malicious hackers can gain illegal access at OS level, application level or network level if the
penetration testers or ethical hackers lack in testing and reporting the vulnerabilities in a system.
50. Which of the following hacking tools and techniques hackers’ do not use for maintaining access in
a system?
a) Rootkits
b) Backdoors
c) Trojans
d) Wireshark
Answer: d
Explanation: Wireshark is not a tool for maintaining access because it is used for analysing network protocols at
a microscopic level (very minutely). It is an interactive tool for data traffic analysing on any computer.
Page 11 of 12
54. Ethical Hacking is also known as
a) Black Hat hacking
b) White Hat hacking
c) Encrypting
d) None of these
Page 12 of 12
Question Bank for Multiple Choice Questions
Program: Diploma in Computer Engineering Program Code:- CO
Scheme:- I Semester:- SIXTH
Course:- Emerging Trends in Computer & IT Course Code:- 22618
2. Which of the following tool is used forNetwork Testing and port scanning?
a) NetCat
b) SuperScan
c) NetScan
d) All of Above
4. An attacker can create an attack by sending hundreds or thousands of e-mails with very
large attachments.
a) Connection Attack
b) Auto responder Attack
c) Attachment Overloading Attack
c) All of the above
Page 1 of 16
5. An email bomb is also known as
a) Post bomb
b) Internet bomb
c) Letter bomb
d) All of the above
9. is the method of developing or creating a structurally similar yet unauthentic and illegitimate
data of any firm or company.
a) Data copying
b) Data masking
c) Data breaching
d) Data duplicating
Answer: b
Explanation: Data masking is the method used for developing or creating a structurally similar version of data of any
organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual
data.
Page 2 of 16
11. Backdoors are also known as
a) Trap doors
b) Front doors
c) Cover doors
d) Back entry
Answer: a
Explanation: Trap-doors are hidden entry points in any already hacked system that is set to bypass
security measures.
13. is an attack technique occurs when excess data gets written to a memory block.
a) Over buffering
b) Buffering
c) Buffer overflow
d) Memory full
Answer: c
Explanation: Buffer overflow is a flaw that occurs in memory when excessive data is written which makes the buffer
allocated to seize.
14. is an attempt to steal, spy, damage or destroy computer systems, networks or their
associated information.
a) Cyber-security
b) Cyber-attack
c) Digital hacking
d) Computer security
Answer: b
Explanation: Cyber-attack can be defined as an attempt to steal, spy, damage or destroy different components of
cyberspace such as computer systems, associated peripherals, network systems, and information.
15. is a device which secretly collects data from credit / debit cards.
a) Card Skimmer
b) Data Stealer
c) Card Copier
d) Card cloner
Answer: a
Explanation: Card skimmer is hardware that is installed and setup in ATMs secretly so that when any user will
swipe or insert their card in the ATM, the skimmer will fetch all information from the magnetic strip.
16. is the way or technique through which majority of the malware gets installed in our
system.
a) Drive-by click
b) Drive-by redirection
c) Drive-by download
d) Drive-by injecting USB devices
Answer: c
Page 3 of 16
Explanation: An accidental yet dangerous action that takes place in the cyberspace which helps attackers place
their malware into the victim‟s system. This technique is called Drive-by download.
17. is the hacking approach where cyber-criminals design fake websites or pages for tricking or
gaining additional traffic.
a) Cyber-replication
b) Mimicking
c) Website-Duplication
d) Pharming
Answer: a
Explanation: The technique and approach through which cyber-crooks develop fake web pages and sites to trick
people for gaining personal details such as login ID and password as well as personal information, is known as
pharming.
18. RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive.
a) True
b) False
Answer: a
Explanation: It is a special kind of malware that looks for sensitive data that you‟ve stored in your hard drive. RAM-
scraping is one of those kinds.
19. When you book online tickets by swiping your card, the details of the card gets stored in
a) database system
b) point-of-sale system
c) servers
d) hard drives
Answer: b
Explanation: The point-of-sale system is a system where the retailer or company stores financial records and card
details of the e-commerce system or online business transactions.
20. are deadly exploits where the vulnerability is known and found by cyber-criminals but not
known and fixed by the owner of that application or company.
a) Unknown attacks
b) Secret attacks
c) Elite exploits
d) Zero-day exploits
Answer: d
Explanation: Zero-day exploits are used to attack a system as soon as cyber-criminals came to know about the
weakness or the day the weaknesses are discovered in a system. Hackers exploit these types of vulnerabilities
before the creator releases the patch or fix the issue.
Page 4 of 16
22. There are major types of ports in computers.
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: There are 2 major types of ports in computer systems. These are physical ports and logical ports.
27. Which of the following is the port number for FTP data?
a) 20
b) 21
c) 22
d) 23
Answer: a
Explanation: Port number 20 is the logical port number for FTP data service. FTP protocol is a standard protocol
used for transmitting and receiving files from client to server through a network.
Page 5 of 16
28. Which of the following is the port number for SMTP data?
a) 20
b) 21
c) 25
d) 23
Answer: c
29. Which of the following is the port number for FTP control?
a) 20
b) 21
c) 22
d) 23
Answer: b
Explanation: Port number 21 is the logical port number for FTP control service. FTP protocol is a standard protocol
used for transmitting and receiving files from client to server through a network.
30. Which of the following is the port number for SSH (Secure Shell)?
a) 20
b) 21
c) 22
d) 23
Answer: c
Explanation: Port number 22 is the logical port number for Secure Shell service. SSH gives users (specifically
system administrators), a way to securely access computers on unsecured network connectivity.
32. Which of the following are the port numbers for IPSec service?
a) 50, 51
b) 49, 50
c) 51, 52
d) 23, 24
Answer: a
Explanation: Port numbers 50 and 51 are the logical port numbers for IPSec service. IPSec is a standard protocols
suite used among 2 communication points that help in providing data authentication, confidentiality, and integrity.
33. Which of the following are the port numbers for DHCP?
a) 66, 67
b) 67, 68
c) 65, 66
d) 68, 69
Answer: c
Explanation: Port numbers 67 and 68 are the logical port numbers for Dynamic Host Configuration Protocol (DHCP)
service. It helps in providing Internet Protocol (IP) host automatically along with related configuration information
like subnet mask and default gateway.
Page 6 of 16
34. Which of the following is the port number for TFTP service?
a) 69
b) 70
c) 71
d) 72
Answer: a
Explanation: Port number 69 is the logical port number for Trivial File Transfer Protocol (TFTP) service. It is an
internet software utility protocol used for transferring files.
35. Port 80 handles unencrypted web traffic.
a) True
b) False
Answer: a
Explanation: Ports are assigned to different services for identification of which port is sending traffic over the
network. Port 80 is used by the popular HTTP (Hyper Text Transfer Protocol) that handles unencrypted web traffic.
36. Why it is important to know which service is using which port number?
a) For database security
b) For reporting data security to the auditor
c) For understanding which data is going through secured traffic and which is not
d) For checking unused data traffic
Answer: c
Explanation: If a security analyst or ethical hacker knows which port is open and through which port data is going,
he/she will be able to know which data is going in encrypted form and which one is not. Also, it helps in securing a
system by closing the logical ports so that hackers cannot gain access through them.
Page 7 of 16
40. Firewalls can be of kinds.
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: Firewalls are of three kinds – one is the hardware firewalls, another is software firewalls and the other
is a combination of both hardware and software.
41. An ethical hacker must need to have the skills of understanding the problem, networking knowledge
and to know how the technology works.
a) True
b) False
Answer: a
Explanation: An ethical hacker must need to have the skills of understanding the problem, networking knowledge
and to know how the technology works. Password guessing and securing, network traffic sniffing, exploring for
vulnerabilities are some other skills.
42. enables a hacker to open a piece of program or application and re-build it with
further features & capabilities.
a) Social engineering
b) Reverse engineering
c) Planting malware
d) Injecting code
Answer: b
Explanation: Reverse engineering is the technique used to enable a hacker to open a piece of program or
application (usually in a low-level language such as Assembly language) and re-build it with further features &
capabilities.
43. Which of the following do not comes under the intangible skills of hackers?
a) Creative thinking
b) Problem-solving capability
c) Persistence
d) Smart attacking potential
Answer: d
Explanation: Every hacker must possess some intangible skill-set such as creative thinking to process out a new
way of penetrating a system, problem-solving skills as to cease down any active attack and persistence, try in
different ways without losing hope.
44. Why programming language is important for ethical hackers and security professionals?
a) Only to write malware
b) For solving problems and building tool and programs
c) To teach programming
d) To develop programs to harm others
Answer: b
Explanation: A programming language is important for hackers and security professionals to understand so that
they can understand the working behaviour of any virus, ransomware, or other malware, or write their own defense
code to solve a problem. Nowadays, security tools and malware are developed by security professionals with high
skills and knowledge.
Page 8 of 16
45. Understanding of is also important for gaining access to a system through networks.
a) OS
b) email-servers
c) networking
d) hardware
Answer: c
Explanation: A proper understanding of networking is very important for hackers who are trying to gain access to a
system through networks. How TCP/IP works, how topologies are formed and what protocols are used for what
purposes are some mandatory stuff a hacker or security professional must understand.
46. For hacking a database or accessing and manipulating data which of the following language the hacker
must know?
a) SQL
b) HTML
c) Tcl
d) F#
Answer: a
Explanation: For hacking a database or accessing and manipulating data, a hacker must need to have the
knowledge of SQL (Structured Query Language). From a hacker‟s perspective, if you‟ve accessed any database for
short period of time and want to change some specific data, you must need to write a proper SQL query to search
for or implement your hack faster.
47. Information Gathering about the system or the person or about organization or network is not
important.
a) True
b) False
Answer: b
Explanation: Information Gathering about the system or the person or about organization or network is not
important so that as a hacker one can get to know well about the target system or victim.
48. is an ethical hacking technique used for determining what operating system (OS) is
running on a remote computer.
a) Footprinting
b) Cyber-printing
c) OS fingerprinting
d) OS penetration testing
Answer: c
Explanation: OS fingerprinting is an ethical hacking technique used for determining what operating system (OS) is
running on a remote computer.
Page 9 of 16
50. is a common tool used for doing OS fingerprinting.
a) Hping
b) Wireshark
c) Nmap
d) Nessus
Answer: c
Explanation: Nmap is a common tool that is used for performing OS fingerprinting. Before targeting any system for
the attack, it is necessary to know what OS the website is hosting, which can be found out using some simple
command of this tool.
51. To secure your system from such type of attack, you have to hide your system behind any VPN or proxy
server.
a) True
b) False
Answer: a
Explanation: It is recommended to hide your system from such fingerprinting attack, performed by hackers, with a
secure proxy server by using VPN tools. This technique will completely preserve your identity and hence your
system.
52. A is a network scanning practice through which hackers can use to conclude to a point
which IP address from a list of IP addresses is mapping to live hosts.
a) ping-based hacking
b) ping sweep
c) ping-range
d) pinging
Answer: b
Explanation: A ping sweep is a network scanning practice through which hackers can use to conclude to a point
which IP address from a list of IP addresses is mapping to live hosts.
54. The command is used on Linux for getting the DNS and host-related information.
a) dnslookup
b) lookup
c) nslookup
d) infolookup
Answer: c
Explanation: The „nslookup‟ command is used on Linux for getting the DNS and host-related information. DNS
enumeration is the method used to locate all the DNS-servers and their associated records.
Page 10 of 16
56. are piece of programs or scripts that allow hackers to take control over any system.
a) Exploits
b) Antivirus
c) Firewall by-passers
d) Worms
Answer: a
Explanation: Exploits are the piece of programs or scripts that allow hackers to take control over any system.
Vulnerability scanners such as Nexpose and Nessus are used for finding such vulnerabilities.
57. The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are
known as
a) infiltrating
b) exploitation
c) cracking
d) hacking
Answer: b
Explanation: The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are
known as exploitation. Vulnerability scanners such as Nexpose and Nessus are used for finding such vulnerabilities
and then they are exploited using such programs and scripts.
59. is the specific search engine for exploits where anyone can find all the exploits associated
to vulnerability.
a) Google
b) Bing
c) Exploit-db
d) Exploit-engine
Answer: c
Explanation: Since based on vulnerabilities, we can find exploits, Exploit-db is the specific search engine for
exploits where anyone can find all the exploits associated with vulnerability. You can find this from
https://www.exploit-db.com.
Page 11 of 16
61. Cyber-laws are incorporated for punishing all criminals only.
a) True
b) False
Answer: b
Explanation: Cyber-laws were incorporated in our law book not only to punish cyber criminals but to reduce cyber
crimes and tie the hands of citizens from doing illicit digital acts that harm or damage other‟s digital property or
identity.
Page 12 of 16
66. What is the name of the IT law that India is having in the Indian legislature?
a) India‟s Technology (IT) Act, 2000
b) India‟s Digital Information Technology (DIT) Act, 2000
c) India‟s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Answer: c
Explanation: The Indian legislature thought of adding a chapter that is dedicated to cyber law. This finally brought
India‟s Information Technology (IT) Act, 2000 which deals with the different cyber-crimes and their associated laws.
69. The Information Technology Act -2000 bill was passed by K. R. Narayanan.
a) True
b) False
Answer: b
Explanation: The bill was passed & signed by Dr. K. R. Narayanan on 9th May, in the year 2000. The bill got
finalised by head officials along with the Minister of Information Technology, Pramod Mahajan.
70. Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
a) 65
b) 65-D
c) 67
d) 70
Answer: a
Explanation: When a cyber-criminal steals any computer documents, assets or any software‟s source code from
any organization, individual, or from any other means then the cyber crime falls under section 65 of IT Act, 2000.
71. What is the punishment in India for stealing computer documents, assets or any software’s source code
from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000
Answer: d
Explanation: The punishment in India for stealing computer documents, assets or any software‟s source code from
any organization, individual, or from any other means is 3 years of imprisonment and a fine of Rs. 500,000.
Page 13 of 16
72. What is the updated version of the IT Act, 2000?
a) IT Act, 2007
b) Advanced IT Act, 2007
c) IT Act, 2008
d) Advanced IT Act, 2008
Answer: c
Explanation: In the year 2008, the IT Act, 2000 was updated and came up with a much broader and precise law on
different computer-related crimes and cyber offenses.
74. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components
Answer: a
Explanation: Under section 66 of IT Act, 2000 which later came up with a much broader and precise law says that
cracking or illegally hacking into any victim‟s computer is a crime. It covers a wide range of cyber-crimes under this
section of the IT Act.
76. Performing a shoulder surfing in order to check other’s password is ethical practice.
a) a good
b) not so good
c) very good social engineering practice
d) a bad
Answer: d
Explanation: Overlooking or peeping into someone‟s system when he/she is entering his/her password is a bad
practice and is against the ethics of conduct for every individual. Shoulder surfing is a social engineering attack
approach used by some cyber-criminals to know your password and gain access to your system later.
Page 14 of 16
77. has now evolved to be one of the most popular automated tools for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Answer: c
Explanation: Malware is one of the biggest culprits that harm companies because they are programmed to do the
malicious task automatically and help hackers do illicit activities with sophistication.
78. Leaking your company data to the outside network without prior permission of senior authority is a
crime.
a) True
b) False
Answer: a
Explanation: Without prior permission of the senior authority or any senior member, if you‟re leaking or taking our
your company‟s data outside (and which is confidential), then it‟s against the code of corporate ethics.
79. is the technique used in business organizations and firms to protect IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
Answer: a
Explanation: Ethical hacking is that used by business organizations and firms for exploiting vulnerabilities to secure
the firm. Ethical hackers help in increasing the capabilities of any organization or firm in protecting their IT and
information assets.
80. The legal risks of ethical hacking include lawsuits due to of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
Answer: b
Explanation: The legal risks of ethical hacking contains lawsuits due to disclosure of personal data during the
penetration testing phase. Such disclosure of confidential data may lead to a legal fight between the ethical hacker
and the organization.
81. Before performing any penetration test, through legal procedure, which key points listed below is not
mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
Answer: d
Explanation: Before performing any penetration test, through the legal procedure the key points that the penetration
tester must keep in mind are –
i) Know the nature of the organization ii) what type of work the organization do and
iii) the system and networks used in various departments and their confidential data that are sent and received over
the network.
Page 15 of 16
82. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False
Answer: a
Explanation: Yes, it is very important for an ethical hacker to make sure that while doing penetration tests, the
confidential data and proprietary information are preserved properly and not get leaked to the external network.
83. After performing the ethical hacker should never disclose client information to other
parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
Answer: c
Explanation: It is against the laws and ethics of ethical hackers that after doing penetration tests, the ethical hacker
should never disclose client information to other parties. The protection of client data is in the hands of the ethical
hacker who performed the tests.
84. is the branch of cyber security that deals with morality and provides different theories and
a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
Answer: d
Explanation: Ethics in cyber-security is the branch of cyber security that deals with morality and provides different
theories and principles‟ regarding the view-points about what is right and what need not to be done.
Page 16 of 16