You are on page 1of 33

Emerging Trends in CO and IT (22618)

CHAPTER 1- Artificial Intelligence

1. Artificial Intelligence is about.


a. Playing a game on Computer
b. Making a machine Intelligent
c. Programming on Machine with your Own Intelligence
d. Putting your intelligence in Machine

2. Who is known as the -Father of AI"?


a. Fisher Ada
b. John McCarthy
c. Alan Turing
d. Allen Newell

3. is an area of computer science that emphasizes the creation of


intelligent machines that work and reacts like human.
a. Artificial Intelligence
b. Machine Learning
c. Neural Network
d. Computer Vision

4. The component of an Expert system is .


a. Knowledge Base
b. Inference Engine
c. User Interface
d. All of the above
5. Which of the given languages is not commonly used for AI?
a. LISP
b. PROLOG
c. Python
d. Perl

6. Computer program that mimics the way the human brain processes
information is called
a. Machine Learning
b. Deep Learning
c. Neural Networks
d. None of the above

7. The Cognitive science approach in AI is related to


a. Act Humanly
b. Act Rationally
c. Think Humanly
d. Think Rationally

8. An AI agent perceives and acts upon the environment using .


a. Sensors
b. Perceivers
c. Actuators
d. Both a and c

9. If a machine can change its course of action based on the external


environment on its own, the machine is called as?
a. Mobile
b. Intelligent
c. Both A and B
d. None of the above
10. Which of the following is not an application of artificial intelligence?
a. Computer Vision
b. Natural language processing
c. Database Management System
d. Digital Assistants

11. What are the different types of Artificial Intelligence approaches?


a. Weak AI
b. General AI
c. Strong AI
d. All of the above

12. Which of the following is not Based on functionality type of AI


a. Reactive Machines
b. Limited Memory
c. Theory of Mind
d. Super AI

13. What is the function of an Artificial Intelligence “Agent”?


a. Mapping of goal sequence to an action
b. Work without the direct interference of the people
c. Mapping of precept sequence to an action
d. Mapping of environment sequence to an action.

14. IBM’s deep blue system is an example of?


a. Reactive machine
b. Limited memory
c. Theory of mind
d. None of above
15. deals with learning a function from available training on labelleddata
a. Reinforcement Learning
b. Supervised Learning
c. Unsupervised Learning
d. Semi Supervised Learning

16. Which AI system does not store memories or past experiences for future
actions
a. Reactive machine
b. Limited memory
c. Theory of mind
d. None of above

17. Which AI system should understand the human emotions, people, beliefs
and able to interact socially like humans
a. Reactive machine
b. Limited memory
c. Theory of mind
d. None of the above

18. is a branch of science that deals with programming the systems


in such a way that they automatically learn and improve with experience.
a. Machine Learning
b. Deep Learning
c. Neural Networks
d. Cognitive Science
19. In philosophy, AI is a dimensional model?
a. 2 dimensional
b. 3 dimensional
c. 4 dimensional
d. 5 dimensional

20. Induction, proposition, tautology & model logic of core are included in
which level?
a. Cognition
b. Functional
c. Logic
d. None of these

21. Which of the following is not a level of AI?


a. Logic
b. Cognition
c. Functional
d. Knowledge

22. Memory and perception are the Core components of which level of AI?
a. Logic
b. Cognition
c. Functional
d. None of the above

23. The idea behind the to make such a system which could be
smart and think like a human by its own.
a. Narrow AI
b. General AI
c. Super AI
d. Self Awareness
24. Machine can perform any task better than human with cognitive
properties is known as AI.
a. Narrow AI
b. General AI
c. Super AI
d. None of the above

25. machines will have their own consciousness and sentiments.


a. Reactive Machines
b. Limited Memory
c. Theory of Mind
d. Self Awareness

26. Machine learning was invented by ?


a. John McCarthy
b. Bnicklaus Wirth
c. Joseph Weizen Baum
d. Arthur Samuel

27. is a subfield of machine learning where concerned algorithms are


inspired by the structured and function of the brain called artificial neural
network
a. Deep Learning
b. Cognition
c. Natural Language Processing
d. Data Science
28. Acting humanly property of AI uses which of the following approach?
a. Laws of thought approach
b. Turing test approach
c. Rational agent approach
d. None of the above
29. learning makes sense of unlabeled data without having any
predefined dataset for its training.
a. Reinforcement Learning
b. Supervised Learning
c. Unsupervised Learning
d. Semi Supervised Learning

30. Chomsky's linguistic computational theory generated a model for


syntactic analysis through
a. Regular Grammar
b. Regular Expression
c. Regular Word
d. none of these

31. Types of coarse components in AI?

a. Search
b. Reasoning
c. Knowledge
d. Knowledge Based System
CHAPTER 2 – Internet of Things

1. An Embedded device contains few or all peripherals inside the module


which is called as .
a. Micro controller
b. Micro processor
c. System on Chip (SOC)
d. Operating System
2. Embedded operating systems are also known as
a. Palm OS
b. Real Time OS
c. Symbian OS
d. None of the above
3. are the smallest microcontrollers which can be programmed to
perform a large range of tasks.
a. PIC
b. AVR
c. ARM
d. ASIC
4. used to measure the physical quantity and converts it to an electrical
signal which can be read by any electronic device
a. Sensors
b. Actuators
c. Micro controllers
d. A-D Converters
5. RISC in terms of processor stands for?
a. Reduced Internal Set Computer
b. Reduced Instructions Set Computer
c. Read Instructions Set Computer
d. Read Internal Set Computer
6. What is IoT?
a. network of physical objects embedded with sensors
b. network of virtual objects
c. network of objects in the ring structure
d. network of sensors

7. Which of the following is false about IoT devices?


a. IoT devices use the internet for collecting and sharing data
b. IoT devices need microcontrollers
c. IoT devices use wireless technology
d. IoT devices are completely safe

8. Which of the following is not a fundamental component of an IoT system?


a. Sensors
b. Connectivity and data processing
c. User interface
d. Transformer
9. protocols determine how the data is physically sent over the
network's physical layer or medium
a. Link Layer
b. Transport Layer
c. Network Layer
d. Application Layer
10. 802.3 is the standard for Ethernet that uses coaxial cable as a
shared medium.
a. 10BASE5
b. 10BASE-T
c. 10BASE-F
d. None
11. is a collection of standards for low-rate wireless personal area
networks (LR-WPANs).
a. 802.3
b. 802.11
c. 802.16
d. 802.15.4

12. The are responsible for sending of IP datagrams from the


sourcenetwork to the destination network.
a. Link Layer
b. Network Layer
c. Transport Layer
d. Application Layer

13. is an application layer protocol for machine-to-machine


(M2M)applications, meant for constrained environments with
constrained devicesand constrained networks.
a. HTTP
b. CoAP
c. MQTT
d. XMPP

14. Message Queue Telemetry Transport (MQTT) is a light-weight


messagingprotocol based on the model.
a. Request-Response
b. Push-Pull
c. Publish-Subscribe
d. Exclusive Pair
15. is a bi-directional, fully duplex communication model that uses a
persistent connection between the client and server.
a. Request-Response
b. Push-Pull
c. Publish-Subscribe
d. Exclusive Pair
16. With respect to communication API, REST stands for
a. REpresentational State Transfer
b. REpresentational State Transmission
c. Relational State Transfer
d. Relational State Technique
17. comprises of distributed devices with sensors which are
used tomonitor the environmental and physical conditions.
a. Cloud Computing
b. Embedded Systems
c. Wireless Sensor Network
d. Gateways
18. provides the users the ability to develop and deploy
application in the cloud using the development tools, application
programming interfaces (APIs), software libraries and services provided
by the cloud service provider.
a. Software as a Service (SaaS)
b. Platform as a Service (PaaS)
c. Infrastructure as a Service (IaaS)
d. Security as a Service (SEaaS)
19. is the process of collecting, organizing and analyzing
large setsof data to discover patterns and other useful information
a. Cloud Computing
b. Data Extracting
c. Big Data Analytics
d. Data Discovery
20. Which of the following is an essential property of IoT?
a. Sense
b. Send and Receive
c. Analyze
d. All of the above

21. Who coined the term “Internet of Things”?


a. Kevin Aston
b. John Wright
c. Edward Jameson
d. George Garton

22. Which of the following is not an IoT Circuit?


a. Arduino
b. 8051
c. Raspberry Pi
d. Node MCU

23. Which of the following is not an IoT sensor?


a. Ultra Sonic
b. MQ 6
c. Stepper Motor
d. Passive Infrared

24. Which of the following is not an IoT actuator?


a. Servo Motors
b. Relay
c. DC Motors
d. LED
25. Device that transforms electrical signals into physical movements are
a. Sensors
b. Actuators
c. Switches
d. Display

26. What is the component of an IoT system that executes a program?


a. A Sensor
b. A Microcontroller
c. An Actuator
d. Analog to Digital Converter

27. System has multiple end nodes and one coordinator node
a. IOT Level 3
b. IOT Level 4
c. IOT Level 5
d. IOT Level 6
28. APIs allow bi-directional, full duplex communication
betweenclients and servers.
a. REST
b. WebSocket
c. HTTP
d. None of the above
29. is the communication model in which publishers push the
datain the form of queues.
a. Request-Response
b. Publish-Subscribe
c. Push-Pull
d. Exclusive Pair
Chapter 3 – Basics of Digital Forensic

1. is a branch of forensic science encompassing the


recovery andinvestigation of material found in digital devices,
often in relation to computer crime.
a. Digital Forensics
b. Cyber Security
c. Data Mining
d. Data Extraction.
2. When Federal Bureau Investigation program was
created?a. 1979
b. 1984
c. 1987
d. 1989
3. is known as Father of Computer Forensics.
a. G. Palmar
b. J. Korn
c. Michael Anderson
d. S.Ciardhuain.
4. International Organization on Computer Evidence (IOCE) was formed in

a. 1995
b. 1997
c. 2000
d. 2003
5. Computer forensics do not involve activity.
a. Preservation of computer data.
b. Extraction of computer data.
c. Manipulation of computer data.
d. Interpretation of computer data.
6. Which of following is not a rule of digital forensics?
a. An examination should be performed on the original data
b. A copy is made onto forensically sterile media. New media should
alwaysbe used if available.
c. The copy of the evidence must be an exact, bit-by-bit copy
d. The examination must be conducted in such a way as to
prevent anymodification of the evidence.
7. Who proposed the Road map for Digital Forensic Research model
(RMFDR).
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. S. O. Ciardhuain
8. Who proposed the Abstract Digital Forensic model (ADFM).
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. S.O. Ciardhuain
9. Who proposed the Integrated Digital Investigation Process model (IDIP)
a. Palmar
b. Reith, Carr, Gunsh
c. Carrier and Safford
d. S.O. Ciardhuain
10. Who proposed End to End Investigation Process model (EEDIP)
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. S.O. Ciardhuain
11. Who proposed Extended Model for Cybercrime Investigation (EMCI)
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. S.O. Ciardhuain
12. Who proposed UML modeling of digital forensic process model
(UMDFPM)
a. Palmar
b. Reith, Carr, Gunsh
c. Stephenson
d. Kohn, Eloff and Oliver
13. Which of the following are general Ethical norms for Investigator?
a. To contribute to society and human beings.
b. To avoid harm to others.
c. To be honest and trustworthy.
d. All of the above
14. What is the most significant legal issue in computer forensics?
a. Preserving Evidence
b. Seizing Evidence
c. Admissibility of Evidence
d. Discovery of Evidence
15. Which stage corresponds to “freezing the crime scene” with respect to
RMDFR model?
a. Identification
b. Preservation
c. Collection
d. Examination
16. Which stage corresponds to “In depth systematic search of evidence”
with
respect to RMDFR model?
a. Identification
b. Preservation
c. Collection
d. Examination
17. Returning Evidence is a phase of which Digital Forensic Model?
a. Road map for Digital Forensic Research (RMDFR)
b. Abstract Digital Forensic Model (ADFM)
c. Integrated Digital Investigation Process Model (IDIP)
d. End to End Digital Investigation Process Model (EEDIP)
18. The goal of is to collect and analyze the physical
evidence andreconstruct the actions that took place during the
incident.
a. Readiness Phase
b. Deployment Phase
c. Physical Crime Investigation Phase
d. Digital Crime Investigation Phase

19. phase includes putting the pieces of a digital puzzle


together anddeveloping investigative hypotheses
a. Preservation phase
b. Survey phase
c. Documentation phase
d. Reconstruction phase
20. is the phase during which the investigator are informed
that acrime has taken place; the crime is reported to some
authority
a. Awareness
b. Authorization
c. Planning
d. Notification
21. What are the Ethics in Digital forensic
a. Honesty towards the investigation
b. Prudence means carefully handling the digital evidences
c. Compliance with the law and professional norms.
d. All of the above
22. Which is the unethical norms for Digital Forensic Investigation
a. To contribute to the society and human being
b. To be honest and trustworthy
c. Uphold any relevant evidence
d. To respect the privacy of others
23. What is called as the process of creation a duplicate of digital
media forpurpose of examining it?
a. Acquisition.
b. Steganography.
c. Live analysis
d. Hashing.
24. CART stands for
a. Computer Analysis and Risk Team
b. Computer Analysis and Research Team
c. Computer Analysis and Response Team
d. Computer Analysis and Research Technology
Chapter 4 – Digital Evidences

1. Which of the following is not a type of volatile evidence?


a. Routing Tables
b. Main Memory
c. Log files
d. Cached Data

2. is any probative information stored or transmitted in


digitalform that a party to a court case may use at trial.
a. Digital evidence
b. Physical evidence
c. Testimonial
d. Data

3. Digital evidence is:


a. Crosses jurisdictional borders quickly and easily
b. Can be altered, damaged or destroyed with little effort
c. Can be time sensitive
d. All of the above
4. Text message, emails, pictures, videos and internet searches are
mostcommon types of .
a. Physical evidence
b. Digital evidence
c. Substantial evidence
d. Exculpatory
5. The digital evidence are used to establish a credible link between
a. Attacker and victim and the crime scene
b. Attacker and the crime scene
c. Victim and the crime scene
d. Attacker and Information
6. Which of the following is not a digital evidence
a. Recycle Bin
b. Cache files
c. Fingerprint
d. Cookies

7. The says that an original writing must be offered


as evidence unless it is unavailable, in which case other
evidence, likecopies, notes, or other testimony can be used.
a. Original Evidence Rule
b. Best Evidence Rule
c. Digital Evidence Rule
d. None of the above

8. Which of the following is rule of evidence


a. Maintaining a claim of error.
b. No renewal of objection or proof.
c. Aim an offer of proof.
d. All of the above.

9. When an incident takes place, a criminal will leave a hint evidence


at thescene and remove a hint evidence from the scene. This
alteration is known as the .
a. Locard’s Exchange Principle
b. Digital Stream of Bits
c. Digital Investigation Principle
d. None of the above

10. Which of the following is not a digital evidence


a. Recycle Bin
b. Cache files
c. Fingerprint
d. Cookies
11. The says that an original writing must be
offered as evidence unless it is unavailable, in which case
other evidence, likecopies, notes, or other testimony can be
used.
a. Original Evidence Rule
b. Best Evidence Rule
c. Digital Evidence Rule
d. None of the above

12. Which of the following is rule of evidence


a. Maintaining a claim of error.
b. No renewal of objection or proof.
c. Aim an offer of proof.
d. All of the above.

13. When an incident takes place, a criminal


will leave a hint evidence at thescene and remove a hint evidence
from the scene. This alteration is known as the .
a. Locard’s Exchange Principle
b. Digital Stream of Bits
c. Digital Investigation Principle
d. None of the above

14.A proof that is introduced in the form of a physical object, whether


wholeor in part is referred to as .
a. Explainable Evidence
b. Documented Evidence
c. Electronic Evidence
d. Substantial Evidence
15. is the kind of evidence spoken by the spectator under the oath, or
written evidence given under the oath by an official declaration that
isaffidavit.
a. Documented evidence
b. Illustrative evidence
c. Electronic evidence
d. Testimonial

16. The in digital forensics can also be referred to as the


forensic link, the paper trail, or the chronological documentation
of electronicevidence.
a. Chain of Custody
b. Authentication of evidence
c. Validation of evidence
d. None

17. What Considerations Are Involved with Digital Evidence?


a. Never work with the original evidence to develop procedures
b. Use clean collecting method
c. Document any extra scope
d. All of the above
14.B proof that is introduced in the form of a physical object, whether
wholeor in part is referred to as .
a. Explainable Evidence
b. Documented Evidence
c. Electronic Evidence
d. Substantial Evidence

18. is the kind of evidence spoken by the spectator under the oath, or
written evidence given under the oath by an official declaration that
isaffidavit.
a. Documented evidence
b. Illustrative evidence
c. Electronic evidence
d. Testimonial
19. The in digital forensics can also be referred to as the
forensic link, the paper trail, or the chronological documentation
of electronicevidence.
a. Chain of Custody
b. Authentication of evidence
c. Validation of evidence
d. None

20. What Considerations Are Involved with Digital Evidence?


a. Never work with the original evidence to develop procedures
b. Use clean collecting method
c. Document any extra scope
d. All of the above
Chapter 5 – Basics of Hacking

1. Ethical Hacking is the science of testing _ and for


security vulnerabilities.
a. Phone and Computer
b. Computer and Network
c. Computer and CPU
d. Phone and Memory

2. is the art of exploiting the human elements to gain


access tounauthorized resources.
a. Social Engineering Attack
b. Denial of Service Attack
c. Brute Force Attack
d. Spoofing Attack

3. The term cracker refers to


a. White hat hacker
b. Black hat hacker
c. Grey hat hacker
d. Phone Phreaking

4. Traditionally, a hacker is someone who likes to with


software orelectronic systems.
a. Modify
b. Delete
c. Steal
d. Tamper

5. Which is not the principle of hacker’s attitude?


a. The world is full of fascinating problems waiting to be solved.
b. No Problem should ever have to be solved twice.
c. Freedom is good
d. To counter phishing techniques.
6. are the shortcuts that would modify and improve the performance ofa
computer's operating system or applications and allow more tasks to
be completed in a shorter time.
a. Hacks
b. Tricks
c. Programs
d. Codes

7. involves comparing a company’s security policies or


compliancerequirements to check on what’s actually taking place.
a. Ethical hacking
b. Security auditing
c. Penetration testing
d. Vulnerability testing

8. Who break the system with malicious intent?


a. Cracker
b. Grey hat hacker
c. White hat hacker
d. Script kiddie

9. What is the primary goal of ethical hacker?


a. Avoiding detection
b. Testing security controls
c. Resolving security vulnerabilities
d. Determining return on investment for security measures

10. try to compromise computers and sensitive information


fromthe inside as authorized and “trusted” users.
a. Malicious user
b. Hacktivist
c. Cracker
d. Intruder

11. is a non-skilled person who gains access to computer


systemsusing already made tools
a. Cracker
b. Grey hat hacker
c. Phreaker
d. Script Kiddie
12. is a hacker who use hacking to send social, religious, and
political, etc. messages.
a. Cracker
b. Hacktivist
c. Phreaker
d. Grey hat hacker

13. is a hacker who identifies and exploits weaknesses in


telephonesinstead of computers
a. Cracker
b. Hacktivist
c. Phreaker
d. Grey hat hacker

14. Which is the first phase of hacking?


a. Maintaining access
b. Gaining access
c. Planning and Reconnaissance
d. Scanning

15. The major difference between hacker & cracker is


a. The ethical hacker has authorization from the owner of the target.
b. The ethical hacker is just a cracker who is getting paid.
c. The ethical hacker does not use the same techniques or
skills as acracker.
d. The ethical hacker does it strictly for financial motives unlike a
cracker.

16. Which of the following is ethical hacking commandment?


a. Working ethically
b. Respecting privacy
c. Not cracking your system
d. All of the above

17. To crack passwords, one needs a cracking tool such as


a. Nmap
b. John the ripper
c. SuperScan
d. NetBIOS
18. Which tool is used for in depth analysis of web application
a. LC4
b. Pwdump
c. WebInspect
d. Ethereal

19. An attack from the Internet is known as a


a. Local attack
b. Remote attack
c. Internal attack
d. Physical attack

20. After performing the ethical hacker should never


discloseclient information to other parties.
a. Scanning
b. Exploiting
c. Cracking
d. Penetration Testing

21. Tool(s) used by ethical hackers


a. Scanner
b. Decoder
c. Proxy
d. All of these

22. Ethical hacking will allow to all the massive security


breaches.
a. Remove
b. Measure
c. Reject
d. None of these

23. Emails and files can be encrypted using _


a. Pretty Good Privacy (PGP)
b. Digital Signature
c. AES
d. None
24. Changing the MAC address or IP address every few minutes to get
furtherinto a network without being completely blocked is an example
of
a. Evading an intrusion prevention system
b. Exploiting a physical security weakness
c. Setting up a wireless “evil twin”.
d. Bypassing web access controls

25. Which of the following is an Ethical hacking tool?


a. Netsparker
b. HashCat
c. Burp Suite
d. All of the above

26. are highly technical and publicly known IT professionals


who notonly monitor and track computer, network, and application
vulnerabilities but also write the tools and other code to exploit them.
a. Security Researchers
b. Hacktivists
c. Cyber Terrorists
d. Script Kiddies

27. Sequential steps hackers use are , , ,


a. Maintaining access
b. Reconnaissance
c. Scanning
d. Gaining access
I. B, C, D, A
II. B, A, C, D
III. A, B, C, D
IV. D, C, B, A
Chapter 6 – Types of Hacking

1. Which of the following tool is used for Network Testing and port
Scanning
a. NetCat
b. SuperScan
c. NetScan
d. All of Above

2. An attacker can create an attack by sending


hundreds orthousands of e-mails with very large
attachments.
a. Connection Attack
b. Auto responder Attack
c. Attachment Overloading Attack
d. All of the above

3. A is a software tool that basically scans the network and


checks forthe open ports
a. Port scanner
b. Network analyzer
c. Firewall
d. IDS
4. Port number for Telnet is
a. 21
b. 23
c. 25
d. 53
5. Protection from port scanning is often achieved through the use of a

a. Firewall
b. Intrusion Detection System
c. Intrusion Prevention System
d. None
6. A helps you to monitor the performance of any IP-based device
and helps businesses remotely visualize their system performance and
monitor network services, bandwidth utilization, switches, routers and
traffic flow.
a. Access Control
b. Network Monitoring Software
c. Security Audits
d. Vulnerabilities scan

7. SNMP stands for?


a. Simple Network Messaging Protocol
b. Simple Network Mailing Protocol
c. Simple Network Management Protocol
d. Simple Network Master Protocol

8. is the act of capturing the information provided by banners,


configurable text-based welcome screens from network hosts that
generallydisplay system information
a. Whaling
b. Sniffing
c. Shoulder Surfing
d. Banner Grabbing

9. Tools for Banner Grabbing includes


a. Nmap
b. Netcat
c. SuperScan
d. All of the above
10. A is a tool that allows you to look into a network and
analyzedata going across the wire for network optimization, security,
and/or troubleshooting purposes.
a. Firewall
b. Network Analyzer
c. Intrusion Detection System
d. Network management tool

11. A too much number of ARP requests can be a sign of?


a. ARP Poisoning
b. ARP Spoofing
c. Both a and b
d. None

12. If a hacker comprises your WLAN then following problems may occurs
a. Loss of network access
b. Loss of confidentiality
c. Both a and b
d. None

13. Which attacks comes under the wireless network attacks?


a. Rogue Access Points
b. Denial of Service
c. Passive Capturing
d. All of the above

14. Email Bomb is also known as .


a. Dynamic Bomb
b. Passive Bomb
c. Letter Bomb
d. All of the above
15. Different email bomb attacks are
a. Attachment overloading attack
b. Connection attack
c. Autoresponder attack
d. All of the above
16. is a security vulnerability that allows an attacker to
alterbackend SQL statements by manipulating the user
supplied data.
a. SQL Injection
b. Cross site scripting
c. Cross site forgery
d. Security misconfiguration
17. can occur when the application takes untrusted data and
send itto the web browser without proper validation.
a. Cross site scripting
b. Brute force attack
c. Cookies attack
d. SQL Injection
18. is an HTTP attack which allows attackers to access restricted
directories and execute commands outside of the web server’s root
directory.
a. Cross site forgery
b. Directory traversal
c. Web application attack
d. Security misconfiguration
19. Which of the following is Database System vulnerability?
a. Loose access permission
b. Excessive retention of sensitive data
c. Aggregation of personally identifiable information
d. All of the above
20. Banner grabbing is often used for
a. White hat hacking
b. Black hat hacking
c. Grey hat hacking
d. Script kiddies
21. Which tool used for modifying ARP tables?
a. DS Sniff
b. Port Scanner
c. Wireshark
d. NetCat
22. Port number of DNS
a. 20
b. 25
c. 53
d. 443

CRY BABY DID WELL!!

You might also like