Professional Documents
Culture Documents
A certain Professor at the Stanford University coined the word 'artificial intelligence' in1956 at
a conference held at Dartmouth College. Can you name the Professor?
David Levy
John McCarthy
Joseph Weizenbaum
Hans Berliner
None of the above
3. The process of collecting, organizing and collecting large sets of data called as
WSN
Cloud Computing
Big Data
None of above
7. Which machines only focus on current scenarios and react on it as per as possible best action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
8. Embedded system is
An electronic system
A pure mechanical system
An electro-mechanical system
(A) or (C)
9. _______is the smallest microcontrollers which can be programmed to perform a large range of
tasks.
PIC microcontrollers
ARM microcontrollers
AVR microcontrollers
ASIC microcontrollers
12. _______ is a bi-directional, fully duplex communication model that uses a persistent
connection between client and server.
Request-Response
Publish-Subscriber
Push-Pull
Exclusive Pair
16. LR-WPANs standards from basis of specifications for high level communication protocol
such as ____
ZigBee
Allsean
Tyrell
Microsoft's Azure
21. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
23. Sensing organs as input, mechanical movement organs as output and central nervous
system(CNS) in brain as control and computing devices is known as ____of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
24. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
_______
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
28. DFPM along with ______ groups and _____ phases are proposed by Carrier and Safford.
DFPM is named the Integrated Digital Investigation Process (IDIP).
5,15
5,17
5,20
6,17
31. _________ phase of ADFM model determines importance and probative value to the case of
the examined product
Returning Evidence
Presentation
Analysis
Readiness phase
32. What are the three general categories of computer systems that can contain digital evidence?
Desktop, laptop, server
Personal computer, Internet, mobile telephone
Hardware, software, networks
Open computer systems, communication systems, and embedded systems
33. Sequential step hackers use are: A. Maintaining Access. B. Reconnaissance C. Scanning. D.
Gaining Access.
B, C, D, A
B, A, C, D
A, B, C, D
D, C, B, A
35. The intent of ethical hacker is to discover vulnerabilities from a ___________ point of view
to better secure system.
Victims.
Attackers.
Both A & B
None of these.
39. Connecting into network through a rogue modem attached to computer behind a firewall is
an example of _________
Nontechnical attacks
Network infrastructure attack
Operating system attack
Application and other specialized attack
43. __________ has now evolved to be one of the most popular automated tools for unethical
hacking.
Automated apps
Database software
Malware
Worms
44. Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
Know the nature of the organization
Characteristics of work done in the firm
System and network
Type of broadband company used by the firm
47. The author of a series of threatening e-mails consistently uses “im” instead of “I’m.” This is
an example of:
An individual characteristic
An incidental characteristic
A class characteristic
An indeterminate characteristic
49. From the two given statements 1 and 2, select the correct option from: a. Original media can
be used to carry out digital investigation process. b. By default, every part of the victim’s
computer is considered as unreliable.
a and b both are true
a is true and b is false
a and b both are false
a is false and b is true
54. TCP uses port no _____ for SMTP (Simple Mail Transfer Protocol)
24
22
25
35
55. Banners cannot be grabbed by using either plain old telnet or Netcat.
True
False
60. XSS is an attack which allows the attacker to execute the scripts on the victim's browser.
True
False
61. _________ is a UNIX-based program alerts you via e-mail if it detects changes in MAC
addresses associated with specific IP addresses on the network.
Arp watch
Ettercap
dsniff
Cain & Abel tool
62. TCP uses port no _____ for HTTP (Hypertext Transfer Protocol)
60
70
80
90
64. ________ is Network Testing and port Scanning tool used for the most versatile security tool
for such security checks as port scanning and firewall testing
Netcat
Nmap or NMapWin
WildPacketsEtherPeek
NetScan
68. _______________ is used for searching of multiple hosts in order to target just one specific
open port.
Ping Sweep
Port scan
Ipconfig
Spamming
69. What is AI ?
Putting your intelligence into computer
Programming with your own intelligence
Making a machine intelligence
Putting more memory into computer
79. ______is a branch of science which deals with helping machines find solution to complex
problems in more Human-like fashion.
Artificial Intelligent
Internet of Things
Embedded System
Cyber Security
80. The machines only focus on current scenarios and react on its as per possible best action
Reactive Machine
Limited Memory
Theory of Mind
Self Awaeness
95. ___________ specifies the function that will be called when the client disconnects.
Callback
Error
Connect
Disconnect
102. Which of the software or a programming language used for controlling of Arduino?
Assembly Language
C language
JAVA
Any language
109. Digital Forensics Includes Identification, recovery, ________ , validation & presentation of
facts regarding digital evidence found.
Investigation
Data
Password
Image
115. You begin any computer forensics case by creating an ____. evidence custody form
investigation plan risk assessment report investigation report B
How many Phases are present in Road Map for Digita Forensics Model 7 6 8
9 B
Digital Forensics is all of them except: Extraction of computer data Preservation of
computer data Interpretation of computer data Manipulation of computer data D
Data ____ involves changing or manipulating a file to conceal information. creep hiding
recovery integrity B
Who proposed Road Map model G. Gunsh S. Ciardhuain J. Koren G. Palmar
D
Investigator should satisfy the following points: Contribute to the society & human being
Avoid harm to others Honest & trustworthy All of the above D
Rules of Digital Forensics areCreate a copy of original data Data should not be modified Chain
of custody must be maintain All of the above D
General Ethical norm for Investigator is: Express an opinion on the guilt Engage in
illegal conductTo Respect Privacy of others. Distort or falsify education, training, credentials
C
A written report is frequently an ____ or a declaration. affidavit subpoena
deposition perjury A
IDIP stand for Integrated Digital Investigation Process Integrated Data Investigation Process
Integrated Digital Investigator Process Independant Digital Investigation Process
A
How May Digital Forensics Models are present 5 6 8 9 B
Unethical norms are Uphold any relevant evidenceDeclare confidential matter Display bias in
findings All of the above D
For forensics specialists, keeping the ____ updated and complete is crucial to supporting your
role as an expert and showing that you’re constantly enhancing your skills through training,
teaching, and experience. testimony examination plan deposition CV D
The term ____ comes from the Greek word for “hidden writing.” creep escrow
steganography hashing C
The criminological principle which states that, when anyone, or anything, enters a crime scene
he/she takes something of the scene with him/her, and leaves something of himself/herself
behind, is: Locard’s Exchange Principle Differential Association Theory Beccaria’s
Social Contract None of the above A
A valid definition of digital evidence is: Data stored or transmitted using a computer
Information of probative value Digital data of probative value Any digital
evidence on a computer C
. In terms of digital evidence, the Internet is an example of Open computer systems
Communication systems
Embedded computer systems
None of the above B
What is the chain of custody? A log of everyone who has entered a crime scene A list of every
item number used for marking evidence. A thorough documentation process that protects
evidence from contamination and tampering.The list of all personnel who work at a crime lab
C
Rule of evidence is Rule 108 Rule 100 Rule 93 Rule 103 D
which is not the consideration involved with Digital Forensics Document any extra scope
work with the original evidence to develop procedures Use clean collecting media
consider safety of personnel at scene B
How many forensic categories of devices are? 3 2 5 4 A
The most complete copy which includes all necessary parts of evidence,closely related to
original evidence, is called as Documented Evidnece Digital Evidence Illustrative
Evidence Best Evidence D
Digital Evidence found in which form Slack Space Recycle Bin Domain Access Logs
All of the above D
Law of Evidence is also called as Locard’s Exchange Principle Rule of Evidence
Authentication of Evidence Best Evidence Rule B
What is the Procedure to establish chain of custody?Take photos of physical evidence
Perform Hash Test Analysis Inject a bit-for-bit clone of digital Evidence content All of
the above D
The Evidences lasting long are called as Digital Evidence Best Evidence Volatile
Evidence None of the above C
Which is not true regarding Digital EvidenceIt can be time sensitive It can not be altered
It crosses juridictional borders It is Latent B
The Rule of Evidence must be Believable Alterable Compatible Renewable
A
A bag of bits, organized in sequence to represent information of Digital Evidence, is called as
Sequnece of Bits Bits of Digital Evidenve Digital stream of Bits Bits of Stream
C
Demonstrative Evidence is Documented Evidnece Illustrative Evidnece Both a and b
None of the above C
Arrange resources as per order by relative volatality 1. Temporary File
2. Routing Table 3. Network Topology
4. Process Table 2-4-1-3 2-3-1-4 4-2-3-1 3-1-4-2 A
The proof prodiced in the form of Physical Object isIllustrative Evidnece Substantial Evidence
Documented Evidnece Physical Evidence B
Challenges in Evidence handling are Chain of Custody Authentication of Evidence
Evidence Validation All of the above D
Mobile Devices comes into category Evidence Category Authentic Category Forensic
Cateogory Digital Category C
cracking
penetration testing
exploiting C
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a
system are termed as ________ Black Hat hackers
Hactivists
Script Kiddies
Whistle Blowers C
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber
crimes. Who are “they” referred to here? Gray Hat Hackers
Hacktivism
Hardening
Whacker C