Assignment No.
Sant Gajanan Maharaj Rural Polytechnic Mahagaon Dept of Computer Engineering
Subject: Emerging Trends in Computer & IT
Name: Alok Prakash Kori Date: / /2025 Roll No: 63
1. SNMP stands for
a) Simple Network Messaging Protocol
b) Simple Network Mailing Protocol
c) Simple Network Management Protocol
d) Simple Network Master Protocol
Answer: c
2. Which of the following tool is used forNetwork Testing and port scanning?
a) NetCat
b) SuperScan
c) NetScan
d) All of Above
Answer: d
3. Banner grabbing is often used for
a) White Hat Hacking
b) Black Hat Hacking
c) Gray Hat Hacking
d) Script Kiddies
Answer: a
4. An attacker can create an attack by sending hundreds or thousands of e-mails with very
large attachments.
a) Connection Attack
b) Auto responder Attack
c) Attachment Overloading Attack
c) All of the above
Answer: c
5. An email bomb is also known as
a) Post bomb
b) Internet bomb
c) Letter bomb
d) All of the above
Answer: c
6. ____is any action that might compromise cyber-security.
a) Threat
b) Vulnerability
c) Exploit
d) Attack
Answer: a
7. Existence of weakness in a system or network is called
a) Threat
b) Vulnerability
c) Exploit
d) Attack
Answer: b
8. is an act of hacking by the means of which a political or social message is conveyed. a)
Hacktivism
b) Whistle-blowing
c) Surveillance
d) Pseudonymization
Answer: a
9. is the method of developing or creating a structurally similar yet unauthentic and
illegitimate data of any firm or company. a) Data copying
b) Data masking
c) Data breaching
d) Data duplicating
Answer: b
10. Data masking is also known as
a) Data obfuscation
b) Data copying
c) Data breaching
d) Data duplicating
Answer: a
11. Backdoors are also known as
a) Trap doors
b) Front doors
c) Cover doors
d) Back entry
Answer: a
12. Adware are pre-chosen developed to display ads.
a) banner
b) software
c) malware
d) shareware Answer: b
13. is an attack technique occurs when excess data gets written to a memory block. a)
Over buffering
b) Buffering
c) Buffer overflow
d) Memory full
Answer: c
14. is an attempt to steal, spy, damage or destroy computer systems, networks or their
associated information.
a) Cyber-security
b) Cyber-attack
c) Digital hacking
d) Computer security
Answer: b
15. is a device which secretly collects data from credit / debit cards.
a) Card Skimmer
b) Data Stealer
c) Card Copier
d) Card cloner
Answer: a
16. is the way or technique through which majority of the malware gets installed in our
system.
a) Drive-by click
b) Drive-by redirection
c) Drive-by download
d) Drive-by injecting USB devices
Answer: c
17. is the hacking approach where cyber-criminals design fake websites or pages for tricking
or gaining additional traffic.
a) Cyber-replication
b) Mimicking
c) Website-Duplication
d) Pharming
Answer: a
18. RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the
hard drive. a) True
b) False
Answer: a
19. When you book online tickets by swiping your card, the details of the card gets stored in
a) database system
b) point-of-sale system
c) servers
d) hard drives
Answer: b
20. are deadly exploits where the vulnerability is known and found by cyber-criminals but not
known and fixed by the owner of that application or company. a) Unknown attacks
b) Secret attacks
c) Elite exploits
d) Zero-day exploits
Answer: d
21. Zero-day exploits are also called
a) zero-day attacks
b) hidden attacks
c) un-patched attacks
d) un-fixed exploits
Answer: a
22. There are major types of ports in computers.
a) 1
b) 2
c) 3
d) 4
Answer: b
23. PS2 and DVI are examples of Logical ports.
a) True
b) False
Answer: b
24. Physical ports are usually referred to as
a) jacks
b) cables
c) interfaces
d) hardware plugs
Answer: c
25. are logical numbers assigned for logical connections.
a) Logical ports
b) Physical ports
c) Networking cables
d) IP address
Answer: a
26. Logical ports are also known as
a) numbered ports
b) virtual numbering
c) virtual ports
d) network protocol ports
Answer: c
27. Which of the following is the port number for FTP data?
a) 20
b) 21
c) 22
d) 23
Answer: a
28. Which of the following is the port number for SMTP data?
a) 20
b) 21
c) 25
d) 23
Answer: c
29. Which of the following is the port number for FTP control?
a) 20
b) 21
c) 22
d) 23
Answer: b
30. Which of the following is the port number for SSH (Secure Shell)?
a) 20
b) 21
c) 22
d) 23
Answer: c
31. Which of the following is the port number for Telnet?
a) 20
b) 21
c) 22
d) 23
Answer: d
32. Which of the following are the port numbers for IPSec service?
a) 50, 51
b) 49, 50
c) 51, 52
d) 23, 24
Answer: a
33. Which of the following are the port numbers for DHCP?
a) 66, 67
b) 67, 68
c) 65, 66
d) 68, 69
Answer: c
34. Which of the following is the port number for TFTP service?
a) 69
b) 70
c) 71
d) 72
Answer: a
35. Port 80 handles unencrypted web traffic.
a) True
b) False
Answer: a
36. Why it is important to know which service is using which port number?
a) For database security
b) For reporting data security to the auditor
c) For understanding which data is going through secured traffic and which is not
d) For checking unused data traffic
Answer: c
37. Which of the following is the port number for HTTP?
a) 79
b) 80
c) 81
d) 82
Answer: b
38. Which of the following is the port number for POP3?
a) 110
b) 111
c) 112
d) 113
Answer: a
39. Which of the following is the port number for SNMP?
a) 160
b) 161
c) 162
d) 163
Answer: b
40. Firewalls can be of kinds.
a) 1
b) 2
c) 3
d) 4
Answer: c
41. An ethical hacker must need to have the skills of understanding the problem, networking
knowledge and to know how the technology works. a) True
b) False
Answer: a
42. enables a hacker to open a piece of program or application and re-build it with
further features & capabilities. a) Social engineering
b) Reverse engineering
c) Planting malware
d) Injecting code
Answer: b
43. Which of the following do not comes under the intangible skills of hackers? a)
Creative thinking
b) Problem-solving capability
c) Persistence
d) Smart attacking potential
Answer: d
44. Why programming language is important for ethical hackers and security professionals?
a) Only to write malware
b) For solving problems and building tool and programs
c) To teach programming
d) To develop programs to harm others
Answer: b
45. Understanding of is also important for gaining access to a system through networks. a)
OS
b) email-servers
c) networking
d) hardware
Answer: c
46. For hacking a database or accessing and manipulating data which of the following
language the hacker must know? a) SQL
b) HTML
c) Tcl
d) F#
Answer: a
47. Information Gathering about the system or the person or about organization or network is
not important. a) True
b) False
Answer: b
48. is an ethical hacking technique used for determining what operating system (OS) is
running on a remote computer. a) Footprinting
b) Cyber-printing
c) OS fingerprinting
d) OS penetration testing
Answer: c
49. How many types of fingerprinting are there in ethical hacking? a)
b) 4
c) 3
d) 2
Answer: d
50. is a common tool used for doing OS fingerprinting.
a) Hping
b) Wireshark
c) Nmap
d) Nessus
Answer: c