Download as pdf or txt
Download as pdf or txt
You are on page 1of 65

22618 New Questions Set

An examiner needs to get to the _______

1 immediately and extract that evidence before


it is lost.

A. Disk

B. Network Topoplogy

C. Temporary file systems

D. Cache and register

Answer optionc

Marks 1

In ________the goal is for the software to

2 use what it has learned in one area to solve


problems in other areas.

A. Deep Learning

B. Machine Learning
C. Neural Network

D. Artificial Intelligence

Answer optiona

Marks 1

3 Brokers in MQTT

A. connects publishers and subscribers

B. classify the sensor data in to topics

C. Both a and b

D. None of the above.

Answer optiona

Marks 1

Directing function of management implies-


4
1.Planning 2. Staffing 3. Leadership. 4. Motivation

Enlarged Model of Computer


A.
Investigation
Extended Model of Cybercrime
B.
Investigation
Extended Media of Computer
C.
Indication
Extended Media of Cybercrime
D.
Investigation

Answer optiond

Marks 1

In _________ the goal is for the software to


5 use what it has learned in one area to solve
problems in other areas.

A. Deep Learning

B. Machine Learning

C. Neural Network

D. Artificial Intelligence

Answer optionb

Marks 1

-- is defined as symbols that represent properties of


6 objects events and their environment.

A. Data

Information
B.

Knowledge
C.

Intelligence
D.
Answer optiona

Marks 1

7 Natural Language Understanding is used in —

A. Natural Language Interfaces

B. System for understanding text

C. Natural Language Front end

D. All of the above

Answer optiond

Marks 1

The most common examples of embedded operating system


8
include

A. linux

B. Palm OS

C. iOS - Subset of Mac OS X

D. All of the above.

Answer optiond

Marks 1
________ can recognize the shapes of the
9
letters and convert it into editable text.

Handwriting Recognition System


A.

Voice Recognition System


B.

Text Recognition System


C.

Speech Recognition Systems


D.

Answer optiond

Marks 1

10 Natural Language Understanding is used in _____

Natural Language Interfaces


A.

System for understanding text


B.

Natural Language Front end


C.

All Of the above


D.

Answer optionc

Marks 1

In system has a single node as well as data is stored


11 and analyzed in the cloud application is cloud based
IOT Level 1
A.

IOT Level 2
B.

IOT Level 3
C.

IOT Level 4
D.

Answer optionb

Marks 1

____ allow bi-directional, full duplex communication


12 between clients and servers.

Communication with REST APIs


A.

Websocket APIs
B.

Both a and b
C.

None of the above.


D.

Answer optiona

Marks 1

13 IDE stands for _____

In Deep Environment
A.
Integrated Development Environment
B.

Internal Deep Escape


C.

IDE
D.

Answer optionc

Marks 1

An IoT device may consist of several interfaces for


14 connections to other devices, both wired and wireless
which includes _____

IOT interfaces for sensors


A.

interfaces for Internet connectivity


B.

memory and storage interfaces andaudio/video interfaces.


C.

All of the above.


D.

Answer optionb

Marks 1

The application data, typically in files, is encoded by


the _____ protocol and encapsulated in the ______
15 protocol which provides connection or transaction
oriented communication over the network.

Application layer,Transport layer


A.

Transport layer,Application layer


B.
Network layer,Link layer
C.

Link layer,Network layer


D.

Answer optiond

Marks 1

______ standards form the basis of specifications for


16 high level communication protocols such as ZigBee.

IEEE 802.15.4
A.

IEEE 802.3
B.

IEEE 802.11
C.

IEEE 802.16
D.

Answer optionb

Marks 1

In IDIP model, The purpose of _______ phase is

17 to provide a mechanism for an incident to be


detected and confirmed.

Readiness
A.

Digital Crime Investigation


B.

Review
C.
Deployment
D.

Answer optionc

Marks 1

18 EMCI stands for ______

Enlarged Model of Computer


A.

Extended Model of Cybercrime Investigation


B.

Extended Model of Cybercrime


C.

D. Enlarged Model of Cybercrime

Answer optionb

Marks 1

19 obstacle(s) to protect from hackers attacks _______

Wide spread use of networking and internet


A.

connectivity
B.

greater number and availability of hacking


C.

D. None of the these

Answer optiona
Marks 1

20 Dried blood and fingerprints are _type of evidence.

Substantial Evidence
A.

Illustrative evidence
B.

Electronic Evidence
C.

Documented Evidence
D.

Answer optionc

Marks 1

21 Applications of Temperature sensors are ______

air-conditioners, refrigerators
A.

manufacturing processes
B.

agriculture and health industry.


C.

All of the above.


D.

Answer optionb

Marks 1

22 IoT level is used for Home Automation


Level-2
A.

Level-3
B.

Level-4
C.

Level-2
D.

Answer optiond

Marks 2

23 REST is acronym for

Regional State Transfer


A.

Representational Sensed Data Tranfer


B.

Representational State Transfer


C.

None of these
D.

Answer optionc

Marks 1

24 _______ is a connectionless protocol.

UDP
A.

TCP
B.
HTTP
C.

CoAP
D.

Answer optiona

Marks 1

25 Hacking for a cause is called _______

Active hacking
A.

Hacktivism
B.

Activism
C.

Black-hat hacking
D.

Answer optionb

Marks 1

Ethical hacker does not require ________ for effective


26 operation.

Asset to be protected
A.

Potential Threat Source


B.

Support by Organization
C.

Development life cycle.


D.
Answer optionc

Marks 1

27 Resource(s) used by hackers may be _______

Open wireless network


A.

Internet proxy severs


B.

Borrowed or stolen remote desktops


C.

All of these
D.

Answer optionb

Marks 1

______ who help in finding bugs and vulnerabilities in a


28 system & dont intend to crack a system

Black Hat hackers


A.

Red Hat Hackers


B.

Grey Hat Hackers


C.

White Hat Hackers


D.

Answer optiond
Marks 1

29 Scanning is performed in which phase of a pen test?

Pre-Attack
A.

Attack
B.

Post-attack
C.

Reconnaissance
D.

Answer optiond

Marks 1

30 WEP stands for

Wired Equivalent privacy


A.

Wi-fi Equivalent privacy


B.

Wired Equal privacy


C.

None
D.

Answer optiond

Marks 1

Which command-Line option is used for ping scan in Nmap


31 tool
Sn
A.

Ns
B.

Sn
C.

Ns
D.

Answer optionc

Marks 1

Which Of the following application are hacking targets


32
on your network

Messaging application
A.

Email
B.

A and B
C.

None
D.

Answer optiond

Marks 1

A branch of Science that deals with helpingmachines find


33 solutions to complexproblems in human like fashion is
called ______

Embedded System
A.

Cyber Security
B.
Artificial Intelligence
C.

Internet of Things
D.

Answer optionc

Marks 1

34 On which things the Forensic Science is applied?

Big Data
A.

Hacking
B.

riminal and civil action


C.

security
D.

Answer optionc

Marks 1

In EMCI Model,______ is the phase during which crime is


35 reported to some authority.

Awareness
A.

Planning
B.

Storage
C.
Collection
D.

Answer optiona

Marks 1

In 1995, on which topic the International Organization


36 was found?

Computer security
A.

Computer Evidence
B.

comuter network
C.

computer Graphics
D.

Answer optionb

Marks 1

37 Home automation is an example of _____

OT Level 2
A.

IOT Level 1
B.

IOT Level 4
C.

IOT Level 3
D.

Answer optionc
Marks 1

38 MQTT topics are ______

simple floating point


A.

simple integer
B.

simple symbol
C.

simple string
D.

Answer optiond

Marks 1

39 In Mobile Communication,4G includes ______

LTE
A.

UMTS
B.

CDMA
C.

CDMA 2000
D.

Answer optiona

Marks 1
Protocols are 802.3 Cellular,802.11 WiFi,802.1 5.4-
40 LRWPAN.

Application Layer
A.

Transport Layer
B.

Network Layer
C.

Link Layer
D.

Answer optionb

Marks 1

The Al technique that allows computers to understand


41 relationship between objects and events is called _____

Heuristic Processing
A.

Cognitive science
B.

Relative Symbolism
C.

Pattern Matching
D.

Answer optionc

Marks 1

42 _______ uses Natural language processing for photo tagging.


Facebook
A.

Whatsapp
B.

Gmail
C.

All Of these.
D.

Answer optionc

Marks 1

43 Social engineering is the art of _____

making online friends.


A.

exploiting the human elements to


B.

gain access to unauthorized


C.

D. All of the above

Answer optiond

Marks 1

44 Malicious software (malware) attack is amongs the type of

Application based attack


A.

operating system attack


B.
network infrastructure attack
C.

non-technical attack
D.

Answer optionb

Marks 1

Knowledge of ethical hacker for evaluating results may


45 consists of ______

Evaluating Result
A.

Corelating specific vulnerabilities


B.

Simple evaluation process


C.

All of these
D.

Answer optiona

Marks 1

46 UDP Stands for

User datagram Protocol


A.

Usage datagram Protocol


B.

Usecase datagram Protocol


C.

None
D.
Answer optiona

Marks 1

47 DoS Denial of Service attack means _____

Breaking file-system security


A.

flooding a network with too manyrequests


B.

Access to malicious software(s) from internet.


C.

Exploiting special protocol


D.

Answer optionb

Marks 1

48 AVR full form is _____

Action Virtual RAM


A.

Advance Visible Risk


B.

Advanced Virtual RISC


C.

None of the above.


D.

Answer optionc

Marks 1
49 ________ pushed the logical formalism to integrate reasoning with Knowledge

Bertrand Russel
A.

Marvin Minsky
B.

Charles Babbage
C.

Aristotle
D.

Answer optiond

Marks 1

50 Concept of DMZ is used in ______

firewall
A.

Antivirus
B.

Both A and B
C.

None
D.

Answer optionb

Marks 1

Ping sweeping , port scanning, grabbing banners etc. comes


51 under

A. Application hacking
Network Hacking
B.

Both A & B
C.

None
D.

Answer optiona

Marks 1

52 In Nmap tool SP command is used for

Ping scan
A.

Port scan
B.

Ping sweep
C.

II of above
D.

Answer optionb

Marks 1

53 SNMP stands for _____

Single network management protocol


A.

Simple network mobile protocol


B.

Simple network management


C.
D. None

Answer optiond

Marks 1

"Flooding a network with too many requests" this type of


54 attack comes under which category?

Nontechnical attacks
A.

Operating-system attacks
B.

Network-infrastructure attacks
C.

Application and other specialized attacks


D.

Answer optiond

Mark 1

A hacker who identifies and exploits weaknesses in


55 telephones instead of computers is

Script kiddies
A.

Hacktivist
B.

Phreaker
C.

Cracker
D.

Answer optiond
Marks 1

the most skilled hackers in the hackers-community are


56 _____

White hat Hackers


A.

Elite Hackers
B.

Licensed Penetration Testers


C.

Red Hat Hackers


D.

Answer optionb

Marks 1

Which statement of the following is INCORRECT in view of


57 ethical hacker?

They are hired professions to penetrate in system


A.

They find system vulnerabilitie swithout proper authorization.


B.

They help making system secure and better.


C.

D. All of the above

Answer optionc

Marks 1
Case: The complainant received an obscene e-mail from an
unknown e-mail ID. The complainant also noticed that
58 obscene profiles along with photographs of his daughter
had been uploaded on matrimonial sites.

a-b-c-d
A.

b-a-d-c
B.

b-a-c-d
C.

d-b-a-c
D.

Answer optionc

Marks 1

Who is the Father of Computer Forensics,came into


59 limelight during this period.

John Macarthy
A.

Michael Anderson
B.

Allen Turing
C.

Mary Shelley
D.

Answer optionb

Marks 1

The compound components built from core components of AI


60 is are _______
Knowledge
A.

Reasoning
B.

Search
C.

All of the above


D.

Answer optiond

Marks 1

What to do in following case 'If DB holds sensitive


61
information"

Avoid usage of shared web server


A.

Avoid usage of unshared web server


B.

Avoid usage of private web server


C.

None
D.

Answer optiond

Marks 1

which of the following is not network analyzer


62
detection tool

Sniffelet
A.

PromiscDetect
B.
Netflow traffic analyzer
C.

All of above
D.

Answer optionc

Marks 1

To verify the original drive with the forensic copy, you


63 use ______

Password
A.

Hash analysis
B.

Disk to disk verification


C.

None of the mentioned


D.

Answer optiona

Marks 1

Which of following factors can create weaknesses in


64 messaging system

Rarely integrated security in software


A.

development
B.

Messaging protocol without security


C.

None
D.
Answer optionb

Marks 1

An information which has a positive impact on the action


65 occurred is called ______

Irrelevant Evidence
A.

Relevant Evidence
B.

Positive Evidence
C.

Legal Evidence
D.

Answer optionc

Marks 1

______ standards provide low-cost and low-speed


66 communication for power constrained devices.

802.3
A.

802.11
B.

802.15.4
C.

802.16
D.

Answer optionb

Marks 1
IoT devices may support a number of _______ protocols and
67 can communicate with other devices and also with the
infrastructure

Internet
A.

Interoperable communication
B.

Intra system
C.

Intranet
D.

Answer optionb

Marks 1

What to do in following case •If DB holds sensitive


68
information"

Avoid usage of shared web server


A.

Avoid usage of unshared web server


B.

Avoid usage of private web server


C.

None
D.

Answer optionb

Marks 1

____ is a bi-directional, fully duplex communication


69 model that uses a persistent connection between the
client and server.
Request-Response
A.

Publish Subscribe
B.

Push-Pull
C.

exclusive Pair
D.

Answer optiona

Marks 1

The Y dimension of Al philosophy in 3D representation


70 consists of

Logic
A.

Reasoning
B.

Language
C.

All Of the above


D.

Answer optiond

Marks 1

_____ is a communication model in which the client sends


71 requests to the server and the server responds to the
requests.

request-response
A.

publish-subscribe
B.
push-pull
C.

Exclusive pair
D.

Answer optiona

Marks 1

The authentication, authorization, messageand content


72 integrity, and data security are functions of functional
block.

service
A.

Management
B.

Security
C.

Application
D.

Answer optionc

Marks 1

73 Most of processors designed by ARM are

16 bit
A.

32 bit
B.

64 bit
C.

8 bit
D.
Answer optionb

Marks 1

is a message that contains relevant meaning, implication,


74 or input for decision and/or action.

Data
A.

Information
B.

Knowledge
C.

Intelligence
D.

Answer optiona

Marks 1

_______ will not be the type of scannings used in Ethical


75 hacking.

Port scanning
A.

Network scanning
B.

CT-scan
C.

Vulnerability scanning
D.

Answer optiond

Marks 1
To access the security of the system one must understand
76
of the hacker.

Hobbies
A.

Mindset
B.

none of these
C.

Hobbies
D.

Answer optionc

Marks 1

77 Which of the following tool cannot be use to crack password?

LC4
A.

pwdump
B.

John the Ripper


C.

SuperScan
D.

Answer optiona

Marks 1

In an e-mail harassment case, the act ofsending


threatening messages via a Web- based e-mail service can
78 leave a number of traces. Investigator can obtain
information from _______
Offender's hard drive
A.

Web server access logs


B.

IP addresses
C.

All of the mentioned


D.

Answer optionc

Marks 1

79 Digital evidences must follow the requirements of the

Ideal Evidence rule


A.

Best Evidence Rule


B.

Exchange Rule
C.

All Of the mentioned


D.

Answer optionb

Marks 1

Which of the following is not a type of volatile


80 evidence?

Routing Tables
A.

Main Memory
B.
Log files
C.

Cached Data
D.

Answer optiond

Marks 1

In terms of digital evidence, the Internet is an


81
example of:

Open computer systems


A.

Communication systems
B.

Embedded computer systems


C.

None of the above


D.

Answer optionc

Marks 1

In digital forensic field ______are the set of moral principles that regulate the use
82
of computers.

Compliance with the Law


A.

Handling the digital evidences


B.

carefully
C.

Honesty towards investigation


D.
Answer optionb

Marks 1

While performing digital forensics investigation, in


83 which media an examination should never be performed ?

wireless
A.

Optic
B.

Magnetic
C.

original
D.

Answer optionc

Marks 1

84 IDE stands for

A. In Deep Environment

B. integrated Development Environment

C. Internal Deep Escape


D. IDE

Answer optionb

Marks 1

A branch of Computer Science named _______ pursues


85 creating the computers / machines as intelligent as
human beings.

Artificial Intelligence
A.

Machine Learning
B.

Neural Network
C.

Deep Learning
D.

Answer optionb

Marks 2

86 Brokers in MQTT

A. connects publishers and subscribers

B. classify the sensor data in to topics

C. Both a and b

D. None of the above.


Answer optiona

Marks 1

Directing function of management implies-


87
1.Planning 2. Staffing 3. Leadership. 4. Motivation

Enlarged Model of Computer


A.
Investigation
Extended Model of Cybercrime
B.
Investigation
Extended Media of Computer
C.
Indication
Extended Media of Cybercrime
D.
Investigation

Answer optionb

Marks 1

88 An EMCI model follows _________ activity occurs in


sequence.

Agile Model
A.

Spiral Model
B.

Waterfall Model
C.

None Of these
D.
Answer optionc

Marks 1

_______ layer determines how the packets are coded and


89 signaled by the hardware device over the medium to which
the host is attached.

Link Layer
A.

Network Layer
B.

Transport Layer
C.

Application Layer
D.

Answer optionb

Marks 1

An ethical hacker is a security professional who applies


90 their hacking skills for purposes on behalf of the owners
of information systems

Destructive
A.

Defensive
B.

Attacking
C.

Analyzing
D.

Answer optionc

Marks 1
91 Type 2 Artificial Intelligence machines are _____

Super Al
A.

General Al
B.

Weak Al
C.

Limited Memory Machines


D.

Answer optionc

Marks 1

While performing digital forensics investigation, in which media an examination


92
should never be performed ?

wireless
A.

Optic
B.

Magnetic
C.

original
D.

Answer optionc

Marks 1

Having a member of the search team trained to handle


93 digital evidence:

A. Can reduce the number of people who handle the evidence


Can help in the presentation of the case
B.

Can help in the integrity of the evidence


C.

All of the above


D.

Answer optionc

Marks 1

Hackers usfeful in finding bugs and vulnerabilities in a


94
system & don't intend to crack a system are

Black Hat hackers


A.

White Hat Hackers


B.

Blue Hat Hackers


C.

Grey Hat Hackers


D.

Answer optiona

Marks 1

95 Hacking for a cause is called _______

Active hacking
A.

Hacktivism
B.
Activism
C.

Black-hat hacking
D.

Answer optiona

Marks 1

layer determines how the packets are coded and signaled


96 by the hardware device over the medium to which the host
is attached.

Link Layer
A.

Network Layer
B.

Transport Layer
C.

Application Layer
D.

Answer optiond

Marks 1

At what point should computer security professionals stop


97 handling digital evidence and contact law enforcement?

stop an contact law enforcementwhenever they detect a


A. crime

B. when their organization's policy specifies

C. when the task is beyond their training and experience


D. All of these

Answer optiond

Marks 1

Which of the following application are hacking targets


98
on your network

Messaging application
A.

Email
B.

A and B
C.

None
D.

Answer optiond

Marks 1

99 In is not there in this Model.

Examine
A.

Hypothesis
B.

Analysis
C.

Report
D.

Answer optiond
Marks 1

100 How many phases are extra in ADFM as comparing with RMDFR

5
A.

4
B.

3
C.

8
D.

Answer optionb

Marks 1

The Robots that have efficient processors,multiple


101 sensors and huge memory are called

Intelligent Robots
A.

Industrial Robots
B.

Military Robots
C.

Domestic Robots
D.

Answer optiond

Marks 1

In an e-mail harassment case, the act ofsending


threatening messages via a Web-based e-mail service can
102 leave a number oftraces. Investigator can obtain
information from
Offender's hard drive
A.

Web server access logs


B.

IP addresses
C.

All of the mentioned


D.

Answer optiona

Marks 1

103 What is digital forensic science?

recovery and investigation of material found in digital devices


A.

Things are connected to internet


B.

Put intelligence to machin


C.

Search the data from internet


D.

Answer optionb

Marks 1
104 HTTP port number is _____

A. 80

B. 22

C. 64

D. 32

Answer optionb

Marks 2

105 _______ is an object responsible for data distribution

Publisher
A.

Subscriber
B.

Both a and b
C.

None of the above.


D.

Answer optiond

Marks 1
106 WebSocket APIs follow model.

RequeRequest-Response Communication st-Response


A. Communication

Publish Subscribe Communication


B.

Push-Pull Communication
C.

D. Exclusive Pair Communication

Answer optiond

Marks 2

The data transmission can be done through wireless media


107 such as ______

Bluetooth, ZigBee
A.

Wi-FI,GPRS
B.

EDGE
C.

All of the above.


D.

Answer optiond

Marks 2

sensors include thermocouples,thermistors, resistor


108 temperature detectors(RTDs) and integrated circuits (ICs).

Temperature
A.
Humidity
B.

motion
C.

Gas
D.

Answer optionc

Marks 1

A ______ comprises of distributed devices with sensors


109 which are used to monitor the environmental and physical
conditions

Wireless Sensor Network


A.

Physical Network
B.

Intranet
C.

None Of these
D.

Answer optiona

Marks 1

______ is defined as symbols that represent properties of


110 objects events and their environment.

Information
A.

Knowledge
B.

Intelligence
C.
Information
D.

Answer optiond

Marks 1

The ______ block handles the communication for the IoT


111 system.

Device
A.

Communication
B.

service
C.

Management
D.

Answer optionc

Marks 1

A branch of computer science that pursues Computers /


112 Machines as intelligent human beings is ______

Embedded System
A.

Cyber Security
B.

Internet of Things
C.

Artificial Intelligence
D.

Answer optionc
Marks 1

who help in finding bugs and vulnerabilities in a system &


113 don't intend to crack a system

Black Hat hackers


A.

Red Hat Hackers


B.

Grey Hat Hackers


C.

White Hat Hackers


D.

Answer optiond

Marks 2

114 Ethical hacking need to be planned ______

after I year of installation of system.


A.

during failure
B.

after failure
C.

in advance
D.

Answer optiona

Marks 2

A proof that is introduced in the form of physical object


115 is referred as ______

Electronic evidence
A.
Documented evidence
B.

substantial evidence
C.

Explainable evidence
D.

Answer optiond

Marks 1

116 Which one is the characteristic of digital evidence rule

Admissible
A.

Complete
B.

Authentic
C.

All of the above.


D.

Answer optionc

Marks 2

kernel statistics are moving back and forth between cache


117 and main memory, which make them _____

Non-Volaile
A.

Static Information
B.

Highly volatile
C.
Legal Informaion
D.

Answer optiond

Marks 2

The evidence or proof that is obtained from the electronic


118 source is called as ______

digital evidence
A.

Explainable evidence
B.

demonstrative evidence
C.

substantial evidence
D.

Answer optiona

Marks 2

119 Type 2 Artificial Intelligence machines are—

Super Al
A.

General Al
B.

Weak Al
C.

Limited Memory Machines


D.

Answer optiona

Marks 2
While performing digital forensics investigation, in which
120 media an examination should never be performed ?

wireless
A.

Optic
B.

Magnetic
C.

original
D.

Answer optionb

Marks 2

Having a member of the search team trained to handle


121 digital evidence:

A. Can reduce the number of people who handle the evidence

Can help in the presentation of the case


B.

Can help in the integrity of the evidence


C.

All of the above


D.

Answer optiona

Marks
2
:
Hackers usfeful in finding bugs and vulnerabilities in a
122 system & don't intend to crack a system are

Black Hat hackers


A.

hite Hat Hackers


B.

Blue Hat Hackers


C.

Grey Hat Hackers


D.

Answer optiona

Marks 1

123 Hacking for a cause is called ______

Active hacking
A.

Hacktivism
B.

Activism
C.

Black-hat hacking
D.

Answer optionb

Marks 2
_______ layer determines how the packets are coded and
124 signaled by the hardware device over the medium to which
the host is attached.

Link Layer
A.

Network Layer
B.

Transport Layer
C.

Application Layer
D.

Answer optionc

Marks: 1

At what point should computer security professionals stop


125 handling digital evidence and contact law enforcement?

stop an contact law enforcement whenever they detect a


A. crime

B. when their organization's policy specifies

C. when the task is beyond their training and experience

D. All of the above

Answer optiona

Marks 1

Which of the following application are hacking targets on


126 your network

Messaging application
A.
Email
B.

A and B
C.

None
D.

Answer optionb

Marks 1

127 In UMDFPM.—phase is not there in this Model.

Examine
A.

Hypothesis
B.

Analysis
C.

Report
D.

Answer optionb

Marks 2

128 How many phases are extra in ADFM as comparing with RMDFR

A. 5

B. 4
C. 3

D. 8

Answer optiona

Marks 2

The Robots that have efficient processors,multiple sensors


129 and huge memory are called _____

Intelligent Robots
A.

Industrial Robots
B.

Military Robots
C.

Domestic Robots
D.

Answer optionc

Marks 2

In an e-mail harassment case, the act of sending


threatening messages via a Web-based e-mail service can
130 leave a number of traces. Investigator can obtain
information from _____

Offender's hard drive


A.

Web server access logs


B.

IP addresses
C.

All of the mentioned


D.
Answer optionb

Marks: 2

131 What is digital forensic science?

recovery and investigation of material found in digital


A. devices

Things are connected to internet


B.

Put intelligence to machin


C.

Search the data from internet


D.

Answer optiond

Marks 1

132 HTTP port number is ____

A. 80

B. 22

C. 64

D. 32

Answer optionc

Marks 1
133 ______ is an object responsible for data distribution

Publisher
A.

Subscriber
B.

Both a and b
C.

None of the above.


D.

Answer optiona

Marks: 1

The data transmission can be done through wireless media


134 such as

Bluetooth, ZigBee
A.

Wi-FI,GPRS
B.

EDGE
C.

AII of the above.


D.

Answer optiona

Marks 1

sensors include thermocouples,thermistors, resistor


135 temperature detectors (RTDs) and integrated circuits
(ICs).

Temperature
A.
Humidity
B.

motion
C.

Gas
D.

Answer optionb

Marks 2

A ______ comprises of distributed devices with sensors


136 which are used to monitor the environmental and physical
conditions

ireless Sensor Network


A.

Physical Network
B.

Intranet
C.

None of these
D.

Answer optionc

Marks 2

___ is defined as symbols that represent properties of


137 objects events and their environment.

Information
A.

Knowledge
B.

Intelligence
C.
Information
D.

Answer optionb

Marks 1

The ______ block handles the communication for the IoT


138 system.

Device
A.

Communication
B.

service
C.

Management
D.

Answer optionb

Marks: 1

A branch of computer science that pursues Computers /


139 Machines as intelligent human beings is _______

Embedded System
A.

Cyber Security
B.

Internet of Things
C.

Artificial Intelligence
D.

Answer optionc
Marks 1

who help in finding bugs and vulnerabilities in a system &


140 don't intend to crack a system

Black Hat hackers


A.

Red Hat Hackers


B.

Grey Hat Hackers


C.

White Hat Hackers


D.

Answer optionb

Marks 1

141 Ethical hacking need to be planned _________

after I year of installation of system.


A.

during failure
B.

after failure
C.

In advance
D.

Answer optiond

Marks 1
A proof that is introduced in the form of physical object
142 is referred as ______

Electronic evidence
A.

Documented evidence
B.

substantial evidence
C.

Explainable evidence
D.

Answer optiona

Marks 1

Which one is the characteristic of digital


143
evidence rule

Admissible
A.

Complete
B.

Authentic
C.

All of the above.


D.

Answer optionb

Marks 2

kernel statistics are moving back and forth between cache


144 and main memory, which make them _____

You might also like