Professional Documents
Culture Documents
ETI Practice 1-6
ETI Practice 1-6
6. Computer program that mimics the way the human brain processes
information is called
a. Machine Learning
b. Deep Learning
c. Neural Networks
d. None of the above
16. Which AI system does not store memories or past experiences for future
actions
a. Reactive machine
b. Limited memory
c. Theory of mind
d. None of above
17. Which AI system should understand the human emotions, people, beliefs
and able to interact socially like humans
a. Reactive machine
b. Limited memory
c. Theory of mind
d. None of the above
20. Induction, proposition, tautology & model logic of core are included in
which level?
a. Cognition
b. Functional
c. Logic
d. None of these
22. Memory and perception are the Core components of which level of AI?
a. Logic
b. Cognition
c. Functional
d. None of the above
23. The idea behind the to make such a system which could be
smart and think like a human by its own.
a. Narrow AI
b. General AI
c. Super AI
d. Self Awareness
24. Machine can perform any task better than human with cognitive
properties is known as AI.
a. Narrow AI
b. General AI
c. Super AI
d. None of the above
a. Search
b. Reasoning
c. Knowledge
d. Knowledge Based System
CHAPTER 2 – Internet of Things
27. System has multiple end nodes and one coordinator node
a. IOT Level 3
b. IOT Level 4
c. IOT Level 5
d. IOT Level 6
28. APIs allow bi-directional, full duplex communication
betweenclients and servers.
a. REST
b. WebSocket
c. HTTP
d. None of the above
29. is the communication model in which publishers push the
datain the form of queues.
a. Request-Response
b. Publish-Subscribe
c. Push-Pull
d. Exclusive Pair
Chapter 3 – Basics of Digital Forensic
a. 1995
b. 1997
c. 2000
d. 2003
5. Computer forensics do not involve activity.
a. Preservation of computer data.
b. Extraction of computer data.
c. Manipulation of computer data.
d. Interpretation of computer data.
6. Which of following is not a rule of digital forensics?
a. An examination should be performed on the original data
b. A copy is made onto forensically sterile media. New media should
alwaysbe used if available.
c. The copy of the evidence must be an exact, bit-by-bit copy
d. The examination must be conducted in such a way as to
prevent anymodification of the evidence.
7. Who proposed the Road map for Digital Forensic Research model
(RMFDR).
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. S. O. Ciardhuain
8. Who proposed the Abstract Digital Forensic model (ADFM).
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. S.O. Ciardhuain
9. Who proposed the Integrated Digital Investigation Process model (IDIP)
a. Palmar
b. Reith, Carr, Gunsh
c. Carrier and Safford
d. S.O. Ciardhuain
10. Who proposed End to End Investigation Process model (EEDIP)
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. S.O. Ciardhuain
11. Who proposed Extended Model for Cybercrime Investigation (EMCI)
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. S.O. Ciardhuain
12. Who proposed UML modeling of digital forensic process model
(UMDFPM)
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. Kohn, Eloff and Oliver
13. Which of the following are general Ethical norms for Investigator?
a. To contribute to society and human beings.
b. To avoid harm to others.
c. To be honest and trustworthy.
d. All of the above
14. What is the most significant legal issue in computer forensics?
a. Preserving Evidence
b. Seizing Evidence
c. Admissibility of Evidence
d. Discovery of Evidence
15. Which stage corresponds to “freezing the crime scene” with respect to
RMDFR model?
a. Identification
b. Preservation
c. Collection
d. Examination
16. Which stage corresponds to “In depth systematic search of evidence”
with
respect to RMDFR model?
a. Identification
b. Preservation
c. Collection
d. Examination
17. Returning Evidence is a phase of which Digital Forensic Model?
a. Road map for Digital Forensic Research (RMDFR)
b. Abstract Digital Forensic Model (ADFM)
c. Integrated Digital Investigation Process Model (IDIP)
d. End to End Digital Investigation Process Model (EEDIP)
18. The goal of is to collect and analyze the physical
evidence andreconstruct the actions that took place during the
incident.
a. Readiness Phase
b. Deployment Phase
c. Physical Crime Investigation Phase
d. Digital Crime Investigation Phase
18. is the kind of evidence spoken by the spectator under the oath, or
written evidence given under the oath by an official declaration that
isaffidavit.
a. Documented evidence
b. Illustrative evidence
c. Electronic evidence
d. Testimonial
19. The in digital forensics can also be referred to as the
forensic link, the paper trail, or the chronological documentation
of electronicevidence.
a. Chain of Custody
b. Authentication of evidence
c. Validation of evidence
d. None
1. Which of the following tool is used for Network Testing and port
Scanning
a. NetCat
b. SuperScan
c. NetScan
d. All of Above
a. Firewall
b. Intrusion Detection System
c. Intrusion Prevention System
d. None
6. A helps you to monitor the performance of any IP-based device
and helps businesses remotely visualize their system performance and
monitor network services, bandwidth utilization, switches, routers and
traffic flow.
a. Access Control
b. Network Monitoring Software
c. Security Audits
d. Vulnerabilities scan
12. If a hacker comprises your WLAN then following problems may occurs
a. Loss of network access
b. Loss of confidentiality
c. Both a and b
d. None