You are on page 1of 7

1.

The Y dimension of AI philosophy in a 3 dimensional representation consists of _____

1. cognition
2. logic
3. interface
4. computation

2. _______ is a tool for Ethical hacking of web application

1. Netsparker
2. Burpsuite
3. Angry IP scanner
4. GFI LanGuard

3. which of the following is not network analyzer detection tool

1. Sniffelet
2. PromiscDetect
3. Netflow traffic analyzer
4. all of the above
4. _____ is a tool that scan vulnerability in web application

1. GFI LanGuard
2. probely
3. Burpsuite
4. Angry IP Scanner

5. Which of the following hold the highest value of evidence in the count

1. documentary
2. demonstrative
3. testimonial
4. Real

Ans Real

6. obstacle to protect from hacker attacks _______

1. wide spread use of Networking and internet connectivity


2. greater number and availability of hacking tools
3. A and B
4. none of these
7. Banners are intended for

1. networking administration
2. White Hat hacking
3. A and B
4. none of above

8. _____ is not one of the different stages of hacking

1. Reconnaissance
2. scanning
3. compiling
4. maintaining access

9. Tool is used for Ping sweeps for port scanning

1. Sam Spade
2. superscan
3. both A and B
4. none

10.Footprinting is _____

1. measuring the shoes size of an ethical hacker


2. accumulation of data by gathering information on a target
3. scanning a target network to the operating system types
11.Examine intelligently while gathering information about the target is

1. investigation
2. scanning
3. Tracing
4. intelligent

12.In 1995 on which topic the International Organization was found

1. computer security
2. computer evidence
3. computer network
4. computer graphics

13.Hosting obscene profile and creating fake profile comes under section of law

1. 66 of Information Technology Act


2. 67 of Information Technology Act
3. 68 of Information Technology Act
4. None of the Above
14.The evidence or proof that is obtained from the electronic source is called as

1. digital evidence
2. explainable evidence
3. demonstrative evidence
4. substantial evidence

15._______ norm should not satisfy by investigator

1. To be honest and trustworthy


2. Avoid harm to other t
3. To declare any confidential method of knowledge
4. To respect privacy of others

16.Which one is the characteristics of digital evidence rule

1. admissible
2. complete
3. authentic
4. all of the above
17.Hash test analysis on digital evidence ensures that the data obtained from bit-by-bit
copy procedure is ________ and reflect the nature of orignal evidence

1. not corrupt
2. not correct
3. admissible
4. reliable

18.In term of digital evidence the internet is an example of

1. Open computer system


2. communication system
3. Embedded computer system
4. none of the above

19.The criminological principle states that contact between two items give reason in a
exchange is

1. Locard's Exchange principle


2. Differential Association Theory
3. Beccaria's social contract
4. none of the above
20.How many models of digital forensic

1. 6
2. 4
3. 5
4. 3

21.Use of Port scanning ais

1. scanning network to check who is there


2. identify network to check who is their
3. scanning network who is not there
4. none

22.Which of the following is not an email bomb attack

1. Attachment overloading attack


2. connection attack
3. DoS
4. Autoresponder attack

You might also like