Eti Ans
Eti Ans
Eti Ans
aber and W. Scott Merkle Trees and Stuart Stefan Konst and W. Scott Satoshi Nakamoto and
1 a 1 3
____ Stornetta Haber Stornetta Merkle trees
2 The copy of the evidence must be an exact, _____________ copy Byte-by -bit bit-by-bit Bit-by-byte All of above b 1 4
Should be fair and take Should give proper credit to
3 What are the general ethical norms for investigation? Should avoid harm to others All of above d 1 4
action not to discriminate intellectual property
4 In which year, Federal Bureau of Investigation program was created? 1987 1984 1978 1980 b 1 4
In 2000, the first_____Regional Computer Forensic Laboratory was
5 CID CBI FBI FIB c 1 4
recognized
Abstarct Digital Forensic Absolute Digital Forensic Abstarct Data Forensic Abstarct Discrite
6 ADFM stands for ______. a 1 4
Module Module Module Forensic Module
The examination must be
A copy is made onto
The copy of the evidence conducted in such a way
An examination should be forensically sterile media.
7 Which of following is not a rule of digital forensics? must be an exact, bit-by-bit as to prevent any a 1 4
performed on the original data New media should always
copy modification of the
be used if available
evidence
8 Who designed the ADFM framework? Palmar, Carrier and Safford Reith, Gunsh and Carr Gunsh, Carrier and Carr Carr, Reith and Safford b 1 4
9 How many phases are in IDIP framework? 6 9 14 17 d 1 4
______ requires an investigator to walk through the physical crime scene
10 Preservation phase Reconstruction phase Documentation phase Survey phase d 1 4
and identify pieces of physical evidence.
Integrated Digital Investigation Integrated Data Investigator Integrated Data Investigator Independent Data
11 IDIP stands for______. a 1 4
Process Process Process Investigator Process
12 The aim of ______ stage is to “draw conclusions based on evidence found” Preservation Identification Analysis Examination c 1 4
______ consists of finding and collecting digital information that may be
13 Preservation Identification Collection Examination c 1 4
relevant to the investigation
Hacking is identifying
When two items make Hackers are perfectionists for weakness in computer
When two items make contact,
14 Locard’s exchange principle states ______. contact, there will be no clarifying the problem before systems or networks to a 1 4
there will be an interchange
interchange they start generating ideas exploit its weaknesses to
gain access
15 Rule of evidence must be______________. Admissible Authentic Complete All of the above d 1 4
The most complete copy or which includes all necessary parts of evidence,
16 Best Evidence Relevant Evidence Digital Evidence Correct Evidence a 1 4
which is closely related to the original evidence is known as ______.
17 Before accepting digital evidence, a court will determine ______. If the evidence is relevant Whether it is authentic Whether a copy is acceptable orAll
theoforiginal
the above
is required d 1 4
18 ______ is not a form of digital evidence. Cache files Images Fingerprint Log files c 1 4
19 ______ is the form of Digital Evidence Recycle Bin Web History Cookies All of the above d 1 4
20 Cohen refers to digital evidence as a ______. Bag of bits Proper Evidence Exact Evidence Complete Evidence a 1 4
21 Electronic evidence is nothing but______. Documented Evidence Explainable Evidence Digital Evidence Substantial Evidence c 1 4
22 Email, hard drives, Log files are forms of______. Digital Evidence Documented Evidence Explainable Evidence Evidence Collection a 1 4
To meet the challenge of validation, it is necessary to ensure that the original
23 MD5hashes Trans position Steganography All of above a 1 4
media matches the forensic duplication by using ______.
24 The contents of CPU cache and registers are ______. Extremely volatile Non-volatile Permanent Moderate Volatile a 1 4
25 ______ is an example of non-volatile memory. Registers and Cache Process table Flash memory ARP cache c 1 4
What ensures that the data obtained from the previous bit-by-bit copy
26 Copy Test Hash test Security Test All of above b 1 4
procedure is not corrupt and reflects the true nature of the original evidence?
_____ is the kind of evidence spoken by the spectator under the oath, or
27 written evidence given under the oath by an official declaration that is Digital Evidence Documented Evidence Testimonial Explainable Evidence c 1 4
affidavit
Dried blood, finger print, and DNA samples, casts of foot prints are
28 Digital Evidence Documented Evidence Explainable Evidence Substantial Evidence d 1 4
examples of ______.
29 Substantial Evidence is also called______. Physical evidence Digital Evidence Documented Evidence Explainable Evidence a 1 4
30 Contracts, wills, invoices etc. are forms of ______. Digital Evidence Documented Evidence Explainable Evidence Substantial Evidence b 1 4
“When two items make contact, there will be an inter change” is stated by
31 Colley Stephenson John McCarthy Locard’s d 1 4
which principle?
32 Ethical Hacking is also known as ______. Black Hat Hacking White Hat Hacking Encryption None of these b 1 4
33 Vulnerability scanning in Ethical hacking finds ______. Strengths Weakness A and B None of these b 1 4
______is the art of exploiting the human elements to gain access to the
34 Social Engineering IT Engineering Ethical Hacking None of these a 1 4
authorized user.
35 The term cracker refers to______. Black hat hacker White hat hacker Grey hat hacker None of the above a 1 4
36 Hackers do hack for ______. Fame Profit Revenge All the above d 1 4
37 A grey hat hacker is the one who ______. Fix identifies weakness Steal the data Identifies the weakness and leave
None
message
of the to
above
owner c 1 4
General Data Protection and General Digital Protection
38 GDPR stand for General Data Prohibition and Regulation
General Data Protection and
a Rules 1 4
Regulation and Regulation
personal health information personally identifiable
39 Data privacy is typically applied to both a and b none of above c 1 4
(PHI) information (PII)
The GDPR is a legal standard that protects the personal data
40 European Union (EU) Indian American None of above a 1 4
of_________citizens.
_______________is a role appointed by an organization to monitor how
41 Data Protection Officer Digital Protection Officer Data Processing Officer Data Protection Owner a 1 5
personal data is processed and ensure compliance of the GDPR
__________includes any information that can be used, alone or in
42 Secured data Personal data Important data Special data b 1 5
combination with other information, to identify someone
ID or passport number,
43 Personal data incudes___________ name, address cultural details, IP addresses All of above d 1 5
financial info
Collecting data from children requires parental consent until children are
44 below 5 above 21 13-16 18-21 c 1 5
between _______ years old
data subjects should be able to data subjects can ask data
45 Right to erasure is _______ correct incorrect or incomplete controllers to “forget” their both a and b None of above b 1 5
data personal data
46 What are GDPR data privacy rights? Collecting data from children Data portability and access Notification of breaches All of above d 1 5
47 DLP stand for______ Data loss prevention Digital loss prevention Data loss prevention Digital loss prevention a 1 5
A_________ is similar to a backup, but it is a complete image of a protected
48 Photo Image Snapshot All of above c 1 5
system,
—is includingfor
a technique data and system
copying data onfiles
an ongoing basis from a protected
49 Replication backup restration All of above a 1 5
system to another location
50 Tools that let you track and filter network traffic are called ___________ VPN bridge gateway Firewalls d 1 5
51 To catch a thief, think like______. Police Forensics Thief Hacker c 1 5
______comprise of large portion of hacker attacks simply because every Network infrastructure
52 Non-technical attacks Operating system attack Application and other specialized
c attack
1 5
computer has one and so well know exploits can be used against them attack
Connecting into network through a rogue modem attached to computer Network infrastructure
53 Non-technical attacks Operating system attack Application and other specialized
b attack
1 5
behind a fire wall is an example of ______. attack
______ exploits that involves manipulating people and user, even yourself, Network infrastructure
54 Non-technical attacks Hacking techniques Ethics to talk to seniors a 1 5
are the greatest vulnerability with in any computer. attack
______ applications are frequently attacked because most firewalls and
55 other security mechanisms are configured to allow full access to these SMTP and HTTP HTPP and FTP FTP and SMTP None of above a 1 5
programs from the Internet
______________is wreaking havoc on system availability and storage
56 Spam Inbox Draft Clutter a 1 5
space.
Exploiting specific protocol Attacking built-in
57 Example of attacks on operating systems is ______. Breaking file-system security All of above d 1 5
implementations authentication systems
58 Malicious software (malware) includes ______. Viruses Worms Trojan horses All of above d 1 5
Flooding a network with too many requests, creating a ______ for legitimate
59 DoS D Dos Man in the Middle None of above a 1 5
requests.
Who identifies and exploits the weaknesses in telephones instead of
60 Script kiddies Hacktivist Grey hat Phreaker d 1 5
computer?
______________is A non-skilled person who gains access to computer
61 Script kiddies Hacktivist Grey hat Phreaker a 1 5
systems using already made tools.
________ is a hacker who use hacking to send social, religious, and
62 Script kiddies Hacktivist Grey hat Phreaker b 1 5
political, etc. messages
The _________Act provides a legal framework for electronic governance by
63 Cyber law act 2000 Cyber law act 2002 Cyber law act 1998 Cyber law act 2005 a 1 5
giving recognition to electronic records and digital signatures
Under which section of Act, Tampering with computer source documents is
64 65 66 66B 66C a 1 5
writen a cyber crime.
Under which section of Act, Receiving stolen computer or communication
65 65 66 66B 66C c 1 5
device is writen a cyber crime.
Under which section of Act, Publication for fraudulent purpose is writen a
66 71 72 73 74 d 1 5
cyber crime.
Under which section of Act,Publishing information which is obscene in
67 67 67A 72 73 a 1 5
electronic form is writen a cyber crime.
Under which section of Act, Publishing images containing sexual acts is
68 68 67A 72 73 b 1 5
writen a cyber crime.
Imprisonment up to two years, Imprisonment up to two Imprisonment up to two Imprisonment up to
What is punishment in India for "Publishing information which is obscene in
69 or/and with fine up to years, or/and with fine up to years, or/and with fine up to three, or/and with fine up c 1 5
electronic form"
₹1,000,000 ₹1,000,001 ₹1,000,002 to ₹5,000,000
Imprisonment up to two years, Imprisonment up to two Imprisonment up to two Imprisonment up to five
What is punishment in India for "Disclosure of information in breach of
70 or/and with fine up to years, or/and with fine up to years, or/and with fine up to three, or/and with fine up d 1 5
lawful contract"
₹1,000,000 ₹1,000,001 ₹1,000,002 to ₹5,000,001
71 Banner grabbing is often used for ______. White Hat Hacking Black Hat Hacking Gray Hat Hacking Script Kiddies a 1 6
Simple Network Messaging Simple Network Mailing
72 SNMP stands for ______. Simple Network Management Protocol
Simple Network Master Protocol
a 1 6
Protocol Protocol
Which tool is used for Windows for network queries from DNS lookups to
73 Sam Spade SuperScan NetScan Nmap or NMapWin a 1 6
trace routes.
74 Which tool is used for ping sweeps and port scanning Sam Spade SuperScan NetScan Nmap or NMapWin b 1 6
Which tool is used for network security-assessment functions, including ping
75 Sam Spade SuperScan NetScan Nmap or NMapWin c 1 6
sweeps, port scanning, and SMTP relay testing
76 Which tool is used for host-port probing and operating-system fingerprinting Sam Spade SuperScan NetScan Nmap or NMapWin d 1 6
77 Which tool is used for port scanning and firewall testing Netcat SuperScan NetScan Nmap or NMapWin a 1 6
78 Which tool is used for network analysis Netcat WildPacketsEtherPeek NetScan Nmap or NMapWin b 1 6
79 6346, 6347 port no. are used for which services? Gnutella Net Bus Pc Anywhere Windows Terminal Servera 1 6
80 SSH service is used by which protocol? TCP UDP TCP and UDP None of above a 1 6
81 Which port no. is used by FTP data (File Transfer Protocol) service? 7 19 20 21 c 1 6
82 Which port no. is used by Daytime service? 22 23 25 37 d 1 6
83 Which port no. is used for Net BIOS over TCP/IP service? 137 138 139 All of above d 1 6
A _____ monitors incoming and outgoing connections through one's
84 port firewall VPN gateway b 1 6
personal computer.
Block the SNMP port
Always disable SNMP on hosts
85 What are the countermeasures of SNMP? (UDP port 161) at the Change the default SNMP community string from public to
All of above d another value
1 that’s6more difficult to guess.
if you’re not using it period
network perimeter.
___________can grab banner information from routers and other network
86 Netcat SuperScan NetScan Nmap or NMapWin a 1 6
hosts, such as a wireless access point or managed Ethernet switch
An excessive amount of _____ requests can be a sign of an ARP spoofingon
87 ARP RARP DOS DDOS a 1 6
your network
88 MAC daddy attacks can be detected by using NDS CCTV IDS All of above c 1 6
The___________ group of standards specify the technologies for wireless
89 IEEE 802.11 IEEE 802.15 IEEE 802.3 IEEE 802.16 a 1 6
standards used the Ethernet Protocol and CSMA/CA
Memory Corruption,
90 What are the common vulnerabilities found in all versions of windows? DoS, Remote Code Execution Sql Injection, XSS All of above d 1 6
Overflow
Leakage of confidential
91 What happens when linux system get hacked? intellectual property and Passwords being cracked Systems taken completely offline
Allby
ofDoS attacks
above d 1 6
customer information
Queue based and Heap Queue based and tree
92 A buffer overflow attack can be__________ and __________ Stack based and Heap based Stack based and quick based a 1 6
based based
93 The hacker attacks against messaging systems include Transmitting malware Crashing servers Capturing and modifying confidential information
All of above d 1 6
94 An email bomb is also known as a____________ letter bomb Document bomb written bomb None of above a 1 6
Limit the size of either e-mails or Limit each user’s space on
95 What are the Countermeasures taken for Attachment-Overloading Attack? both a and b None of above c 1 6
e-mail attachments the server
96 Wahich port no. is used to display banner on an email server? 25 21 20 19 a 1 6
________allows a hacker to search for pages based on the text contained in
97 intitle allintitle inurl allinurl c 1 6
the URL (i.e., “login.php”).
98 The _________directory is the top-most directory on the server file System Bin ect root home c 1 6
99 Hacker attacks against insecure Web applications via ______________ HTTP FTP SMTP TELNET a 1 6
Excessive retention of
100 What are the Vulnerabilities are found in database management systems? Loose access permissions Aggregation of personally identifiable information
All of above d 1 6
sensitive data
101 The blockchain technology is defined in the year_____ 1991 1978 1993 1989 a 1 3
102 Block chain system is developed using the concept of ______. Cryptographically Secured chain Demanding Secure Popular a 1 3
In the year 2000, _________published theory of cryptographic secured Stuart Haber and W. Scott
103 Stefan Konst Philip Moynagh Prof. Brian MacCraith a 1 3
chains, plus ideas for implementation. Stornetta
. In the year 2008, ___________________conceptualized the concept of
Stuart Haber and W. Scott
104 “Distributed lockchain” Satoshi Nakamoto Philip Moynagh Prof. Brian MacCraith a 1 3
Stornetta
called as “A Peer to Peer Electronic Cash System”.
A famous block that
hardcoded a hash of the The first block after each The second transaction
105 What is a genesis block? The first block of a Blockchain a 1 3
Book of Genesis onto the block having of a Blockchain
blockchain
A decentralized
106 What is a dApp? A type of Cryptocurrency A condiment A type of blockchain d 1 3
application
Fraud control & Access
107 What are the benefits of blockchain technology? Security and Speed No hidden fees All of the above d 1 3
levels
108 A blockchain is a type of? Table View Database Object c 1 3
109 Who created Bitcoin? Elon Musk Warren Buffett Satoshi Nakamoto Mark Zuckerberg c 1 3
A centralized system has a centralized control with all administrative rights Enforce trust, and
110 Easy to design and enforce trust Administrate and maintain All of the above d 1 3
and are _______. administrate
A centralized system has a centralized control with all ____________and
111 administrative rights Network rights Virtual rights None of the above a 1 3
are easy to design, maintain, enforce trust, and administrate.
112 Every node on the blockchain network has an __________of the blockchain Identical copy Different copy Parallel copy Opposite copy a 1 3
Centralized distributed
113 Blockchain is example of_________. Decentralized distributed system Both a and b None of the above a 1 3
system
114 A centralized system suffer from many intrinsic limitations like_______ less stable less secured. scalability is difficult. All of the above d 1 3
Which block chain system is difficult to design and maintain, govern and
115 Centralized Decentralized Both a and b None of the above b 1 3
impose to trust?
116 Advantages of decentralized system_________ More stable Attack resistant equal right to all nodes All of the above d 1 3
117 The blockchain technology is made of a __________architecture Layered architecture Chain architecture Horizontal architecture None of the above a 1 3
decentralized applications user interfaces (UIs) and
118 In the application layer, you can find___________. smart contracts All of the above d 1 3
(DApps) chain code
119 Application Layer is_______ layer of the block chain. 2 4 3 5 d 1 3
_________ consists of services and application programming interfaces
120 (APIs), client-side programming constructs, scripting, development Application Layer Execution Layer Semantic Layer Propagation Layer a 1 3
frameworks that offer other apps with access to the blockchain network.
121 Application Layer acts as the _________tool of the blockchain. Front end Back end Database Network a 1 3
The _________execute the instructions of application in the Application
122 Execution Layer Application Layer Semantic Layer Propagation Layer a 1 3
Layer on all the nodes in a blockchain network.
123 Semantic Layer also called as _______ of blockchain layer. Logical Layer Virtual Layer Physical Layer Basic Layer a 1 3
124 Linking of block need to be defined on _________ Execution Layer Application Layer Semantic Layer Propagation Layer c 1 3
A ___________ is used in the peer-to-peer communications between the
125 nodes that allow them to discover each other and get synchronized with Execution Layer Application Layer Semantic Layer Propagation Layer d 1 3
another node in a network.
Which layer is responsible to make sure that all the nodes must get approve
126 Execution Layer Application Layer Semantic Layer Consensus Layer d 1 3
on a common state of the shared ledger.
127 Consensus layer also deals with the__________ of the blockchain. Safety and security Sending and receiving Uploading and downloading All of the above a 1 3
Cost and time factor of Can scale up vertically
128 Which of these is not a limitation of centralized systems? Trust issue Security issue d 1 3
transaction after a certain limit.
Elimination of intermediaries Easier and genuine Increased security with lower
129 What are advantages of decentralized systems over centralized systems? All of the above d 1 3
trust issue verification of transactions cost
Private Key to Public
130 What does P2P stand for? Password to Password Peer to Peer Product to Product b 1 3
Key
A distributed ledger on
131 What is a blockchain? A Currency A centralized ledger A type of cryptocurrency d 1 3
a peer-to-peer network
132 Who first proposed a blockchain-like protocol? David Chaum Dave Bayer W. Scott Stornetta Stephan const c 1 3
Blockchain is a peer-to-peer _____________ distributed ledger technology
133 Secure Popular Demanding Decentralized d 1 3
that makes the records of any digital asset transparent and unchangeable.
A computer on
134 What is a node? A Blockchain An exchange A type of cryptocurrency d 1 3
Blockchain network
135 Who created Bitcoin? Elon Musk Warren Buffett Satoshi Nakamoto Mark Zuckerberg c 1 3
136 A blockchain is a type of? Table View Database Object c 1 3
c) Fraud control & Access
137 What are the benefits of blockchain technology? Security and Speed No hidden fees All of the above d 1 3
levels
A decentralized
138 What is a dApp? A type of Cryptocurrency A condiment A type of blockchain d 1 3
application
A famous block that
hardcoded a hash of the The first block after each The second transaction
139 What is a genesis block? The first block of a Blockchain a 1 3
Book of Genesis onto the block having of a Blockchain
blockchain