0% found this document useful (0 votes)
43 views13 pages

ETI Ass6

The document is an assignment for a Computer Engineering course, focusing on emerging trends in computer and IT. It consists of multiple-choice questions covering topics such as network protocols, cyber-attacks, ethical hacking, and port numbers. Each question is followed by the correct answer, providing a study guide for students.

Uploaded by

kapasepratik31
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views13 pages

ETI Ass6

The document is an assignment for a Computer Engineering course, focusing on emerging trends in computer and IT. It consists of multiple-choice questions covering topics such as network protocols, cyber-attacks, ethical hacking, and port numbers. Each question is followed by the correct answer, providing a study guide for students.

Uploaded by

kapasepratik31
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Assignment No.

Sant Gajanan Maharaj Rural Polytechnic Mahagaon Dept of Computer Engineering


Subject: Emerging Trends in Computer & IT
Name: Alok Prakash Kori Date: / /2025 Roll No: 63

1. SNMP stands for

a) Simple Network Messaging Protocol

b) Simple Network Mailing Protocol

c) Simple Network Management Protocol

d) Simple Network Master Protocol

Answer: c

2. Which of the following tool is used forNetwork Testing and port scanning?

a) NetCat

b) SuperScan

c) NetScan

d) All of Above

Answer: d

3. Banner grabbing is often used for

a) White Hat Hacking

b) Black Hat Hacking

c) Gray Hat Hacking

d) Script Kiddies

Answer: a

4. An attacker can create an attack by sending hundreds or thousands of e-mails with very

large attachments.
a) Connection Attack

b) Auto responder Attack

c) Attachment Overloading Attack

c) All of the above

Answer: c

5. An email bomb is also known as

a) Post bomb

b) Internet bomb

c) Letter bomb

d) All of the above

Answer: c

6. ____is any action that might compromise cyber-security.

a) Threat

b) Vulnerability

c) Exploit

d) Attack

Answer: a

7. Existence of weakness in a system or network is called

a) Threat

b) Vulnerability

c) Exploit

d) Attack

Answer: b
8. is an act of hacking by the means of which a political or social message is conveyed. a)

Hacktivism

b) Whistle-blowing

c) Surveillance

d) Pseudonymization

Answer: a

9. is the method of developing or creating a structurally similar yet unauthentic and


illegitimate data of any firm or company. a) Data copying

b) Data masking

c) Data breaching

d) Data duplicating

Answer: b

10. Data masking is also known as

a) Data obfuscation

b) Data copying

c) Data breaching

d) Data duplicating

Answer: a

11. Backdoors are also known as

a) Trap doors

b) Front doors

c) Cover doors

d) Back entry

Answer: a
12. Adware are pre-chosen developed to display ads.

a) banner

b) software

c) malware

d) shareware Answer: b

13. is an attack technique occurs when excess data gets written to a memory block. a)

Over buffering

b) Buffering

c) Buffer overflow

d) Memory full

Answer: c

14. is an attempt to steal, spy, damage or destroy computer systems, networks or their

associated information.

a) Cyber-security

b) Cyber-attack

c) Digital hacking

d) Computer security

Answer: b

15. is a device which secretly collects data from credit / debit cards.

a) Card Skimmer

b) Data Stealer

c) Card Copier

d) Card cloner

Answer: a
16. is the way or technique through which majority of the malware gets installed in our

system.

a) Drive-by click

b) Drive-by redirection

c) Drive-by download

d) Drive-by injecting USB devices

Answer: c

17. is the hacking approach where cyber-criminals design fake websites or pages for tricking
or gaining additional traffic.

a) Cyber-replication

b) Mimicking

c) Website-Duplication

d) Pharming

Answer: a

18. RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the
hard drive. a) True

b) False

Answer: a

19. When you book online tickets by swiping your card, the details of the card gets stored in

a) database system

b) point-of-sale system

c) servers

d) hard drives

Answer: b
20. are deadly exploits where the vulnerability is known and found by cyber-criminals but not

known and fixed by the owner of that application or company. a) Unknown attacks

b) Secret attacks

c) Elite exploits

d) Zero-day exploits

Answer: d

21. Zero-day exploits are also called

a) zero-day attacks

b) hidden attacks

c) un-patched attacks

d) un-fixed exploits

Answer: a

22. There are major types of ports in computers.

a) 1

b) 2

c) 3

d) 4

Answer: b

23. PS2 and DVI are examples of Logical ports.

a) True

b) False

Answer: b

24. Physical ports are usually referred to as


a) jacks

b) cables

c) interfaces

d) hardware plugs

Answer: c

25. are logical numbers assigned for logical connections.

a) Logical ports

b) Physical ports

c) Networking cables

d) IP address

Answer: a

26. Logical ports are also known as

a) numbered ports

b) virtual numbering

c) virtual ports

d) network protocol ports

Answer: c

27. Which of the following is the port number for FTP data?

a) 20

b) 21

c) 22

d) 23

Answer: a

28. Which of the following is the port number for SMTP data?
a) 20

b) 21

c) 25

d) 23

Answer: c

29. Which of the following is the port number for FTP control?

a) 20

b) 21

c) 22

d) 23

Answer: b
30. Which of the following is the port number for SSH (Secure Shell)?

a) 20

b) 21

c) 22

d) 23

Answer: c

31. Which of the following is the port number for Telnet?

a) 20

b) 21

c) 22

d) 23

Answer: d

32. Which of the following are the port numbers for IPSec service?

a) 50, 51
b) 49, 50

c) 51, 52

d) 23, 24

Answer: a

33. Which of the following are the port numbers for DHCP?

a) 66, 67

b) 67, 68

c) 65, 66

d) 68, 69

Answer: c

34. Which of the following is the port number for TFTP service?

a) 69

b) 70

c) 71

d) 72

Answer: a

35. Port 80 handles unencrypted web traffic.

a) True

b) False

Answer: a

36. Why it is important to know which service is using which port number?

a) For database security

b) For reporting data security to the auditor


c) For understanding which data is going through secured traffic and which is not

d) For checking unused data traffic

Answer: c

37. Which of the following is the port number for HTTP?

a) 79

b) 80

c) 81

d) 82

Answer: b

38. Which of the following is the port number for POP3?

a) 110

b) 111

c) 112

d) 113

Answer: a

39. Which of the following is the port number for SNMP?

a) 160

b) 161

c) 162

d) 163

Answer: b

40. Firewalls can be of kinds.

a) 1

b) 2
c) 3

d) 4

Answer: c

41. An ethical hacker must need to have the skills of understanding the problem, networking
knowledge and to know how the technology works. a) True

b) False

Answer: a

42. enables a hacker to open a piece of program or application and re-build it with

further features & capabilities. a) Social engineering

b) Reverse engineering

c) Planting malware

d) Injecting code

Answer: b

43. Which of the following do not comes under the intangible skills of hackers? a)

Creative thinking

b) Problem-solving capability

c) Persistence

d) Smart attacking potential

Answer: d

44. Why programming language is important for ethical hackers and security professionals?

a) Only to write malware

b) For solving problems and building tool and programs


c) To teach programming

d) To develop programs to harm others

Answer: b

45. Understanding of is also important for gaining access to a system through networks. a)

OS

b) email-servers

c) networking

d) hardware

Answer: c

46. For hacking a database or accessing and manipulating data which of the following
language the hacker must know? a) SQL

b) HTML

c) Tcl

d) F#

Answer: a

47. Information Gathering about the system or the person or about organization or network is
not important. a) True

b) False

Answer: b

48. is an ethical hacking technique used for determining what operating system (OS) is

running on a remote computer. a) Footprinting

b) Cyber-printing

c) OS fingerprinting

d) OS penetration testing
Answer: c

49. How many types of fingerprinting are there in ethical hacking? a)

b) 4

c) 3

d) 2

Answer: d

50. is a common tool used for doing OS fingerprinting.

a) Hping

b) Wireshark

c) Nmap

d) Nessus

Answer: c

You might also like