Professional Documents
Culture Documents
New Questions Set
New Questions Set
A. Disk
B. Network Topoplogy
Answer optionc
Marks 1
A. Deep Learning
B. Machine Learning
C. Neural Network
D. Artificial Intelligence
Answer optiona
Marks 1
3 Brokers in MQTT
C. Both a and b
Answer optiona
Marks 1
Answer optiond
Marks 1
A. Deep Learning
B. Machine Learning
C. Neural Network
D. Artificial Intelligence
Answer optionb
Marks 1
A. Data
Information
B.
Knowledge
C.
Intelligence
D.
Answer optiona
Marks 1
Answer optiond
Marks 1
A. linux
B. Palm OS
Answer optiond
Marks 1
________ can recognize the shapes of the
9
letters and convert it into editable text.
Answer optiond
Marks 1
Answer optionc
Marks 1
IOT Level 2
B.
IOT Level 3
C.
IOT Level 4
D.
Answer optionb
Marks 1
Websocket APIs
B.
Both a and b
C.
Answer optiona
Marks 1
In Deep Environment
A.
Integrated Development Environment
B.
IDE
D.
Answer optionc
Marks 1
Answer optionb
Marks 1
Answer optiond
Marks 1
IEEE 802.15.4
A.
IEEE 802.3
B.
IEEE 802.11
C.
IEEE 802.16
D.
Answer optionb
Marks 1
Readiness
A.
Review
C.
Deployment
D.
Answer optionc
Marks 1
Answer optionb
Marks 1
connectivity
B.
Answer optiona
Marks 1
Substantial Evidence
A.
Illustrative evidence
B.
Electronic Evidence
C.
Documented Evidence
D.
Answer optionc
Marks 1
air-conditioners, refrigerators
A.
manufacturing processes
B.
Answer optionb
Marks 1
Level-3
B.
Level-4
C.
Level-2
D.
Answer optiond
Marks 2
None of these
D.
Answer optionc
Marks 1
UDP
A.
TCP
B.
HTTP
C.
CoAP
D.
Answer optiona
Marks 1
Active hacking
A.
Hacktivism
B.
Activism
C.
Black-hat hacking
D.
Answer optionb
Marks 1
Asset to be protected
A.
Support by Organization
C.
Marks 1
All of these
D.
Answer optionb
Marks 1
Answer optiond
Marks 1
Pre-Attack
A.
Attack
B.
Post-attack
C.
Reconnaissance
D.
Answer optiond
Marks 1
None
D.
Answer optiond
Marks 1
Ns
B.
Sn
C.
Ns
D.
Answer optionc
Marks 1
Messaging application
A.
Email
B.
A and B
C.
None
D.
Answer optiond
Marks 1
Embedded System
A.
Cyber Security
B.
Artificial Intelligence
C.
Internet of Things
D.
Answer optionc
Marks 1
Big Data
A.
Hacking
B.
security
D.
Answer optionc
Marks 1
Awareness
A.
Planning
B.
Storage
C.
Collection
D.
Answer optiona
Marks 1
Computer security
A.
Computer Evidence
B.
comuter network
C.
computer Graphics
D.
Answer optionb
Marks 1
OT Level 2
A.
IOT Level 1
B.
IOT Level 4
C.
IOT Level 3
D.
Answer optionc
Marks 1
simple integer
B.
simple symbol
C.
simple string
D.
Answer optiond
Marks 1
LTE
A.
UMTS
B.
CDMA
C.
CDMA 2000
D.
Answer optiona
Marks 1
Protocols are 802.3 Cellular,802.11 WiFi,802.1 5.4-
40 LRWPAN.
Application Layer
A.
Transport Layer
B.
Network Layer
C.
Link Layer
D.
Answer optionb
Marks 1
Heuristic Processing
A.
Cognitive science
B.
Relative Symbolism
C.
Pattern Matching
D.
Answer optionc
Marks 1
Whatsapp
B.
Gmail
C.
All Of these.
D.
Answer optionc
Marks 1
Answer optiond
Marks 1
non-technical attack
D.
Answer optionb
Marks 1
Evaluating Result
A.
All of these
D.
Answer optiona
Marks 1
None
D.
Answer optiona
Marks 1
Answer optionb
Marks 1
Answer optionc
Marks 1
49 ________ pushed the logical formalism to integrate reasoning with Knowledge
Bertrand Russel
A.
Marvin Minsky
B.
Charles Babbage
C.
Aristotle
D.
Answer optiond
Marks 1
firewall
A.
Antivirus
B.
Both A and B
C.
None
D.
Answer optionb
Marks 1
A. Application hacking
Network Hacking
B.
Both A & B
C.
None
D.
Answer optiona
Marks 1
Ping scan
A.
Port scan
B.
Ping sweep
C.
II of above
D.
Answer optionb
Marks 1
Answer optiond
Marks 1
Nontechnical attacks
A.
Operating-system attacks
B.
Network-infrastructure attacks
C.
Answer optiond
Mark 1
Script kiddies
A.
Hacktivist
B.
Phreaker
C.
Cracker
D.
Answer optiond
Marks 1
Elite Hackers
B.
Answer optionb
Marks 1
Answer optionc
Marks 1
Case: The complainant received an obscene e-mail from an
unknown e-mail ID. The complainant also noticed that
58 obscene profiles along with photographs of his daughter
had been uploaded on matrimonial sites.
a-b-c-d
A.
b-a-d-c
B.
b-a-c-d
C.
d-b-a-c
D.
Answer optionc
Marks 1
John Macarthy
A.
Michael Anderson
B.
Allen Turing
C.
Mary Shelley
D.
Answer optionb
Marks 1
Reasoning
B.
Search
C.
Answer optiond
Marks 1
None
D.
Answer optiond
Marks 1
Sniffelet
A.
PromiscDetect
B.
Netflow traffic analyzer
C.
All of above
D.
Answer optionc
Marks 1
Password
A.
Hash analysis
B.
Answer optiona
Marks 1
development
B.
None
D.
Answer optionb
Marks 1
Irrelevant Evidence
A.
Relevant Evidence
B.
Positive Evidence
C.
Legal Evidence
D.
Answer optionc
Marks 1
802.3
A.
802.11
B.
802.15.4
C.
802.16
D.
Answer optionb
Marks 1
IoT devices may support a number of _______ protocols and
67 can communicate with other devices and also with the
infrastructure
Internet
A.
Interoperable communication
B.
Intra system
C.
Intranet
D.
Answer optionb
Marks 1
None
D.
Answer optionb
Marks 1
Publish Subscribe
B.
Push-Pull
C.
exclusive Pair
D.
Answer optiona
Marks 1
Logic
A.
Reasoning
B.
Language
C.
Answer optiond
Marks 1
request-response
A.
publish-subscribe
B.
push-pull
C.
Exclusive pair
D.
Answer optiona
Marks 1
service
A.
Management
B.
Security
C.
Application
D.
Answer optionc
Marks 1
16 bit
A.
32 bit
B.
64 bit
C.
8 bit
D.
Answer optionb
Marks 1
Data
A.
Information
B.
Knowledge
C.
Intelligence
D.
Answer optiona
Marks 1
Port scanning
A.
Network scanning
B.
CT-scan
C.
Vulnerability scanning
D.
Answer optiond
Marks 1
To access the security of the system one must understand
76
of the hacker.
Hobbies
A.
Mindset
B.
none of these
C.
Hobbies
D.
Answer optionc
Marks 1
LC4
A.
pwdump
B.
SuperScan
D.
Answer optiona
Marks 1
IP addresses
C.
Answer optionc
Marks 1
Exchange Rule
C.
Answer optionb
Marks 1
Routing Tables
A.
Main Memory
B.
Log files
C.
Cached Data
D.
Answer optiond
Marks 1
Communication systems
B.
Answer optionc
Marks 1
In digital forensic field ______are the set of moral principles that regulate the use
82
of computers.
carefully
C.
Marks 1
wireless
A.
Optic
B.
Magnetic
C.
original
D.
Answer optionc
Marks 1
A. In Deep Environment
Answer optionb
Marks 1
Artificial Intelligence
A.
Machine Learning
B.
Neural Network
C.
Deep Learning
D.
Answer optionb
Marks 2
86 Brokers in MQTT
C. Both a and b
Marks 1
Answer optionb
Marks 1
Agile Model
A.
Spiral Model
B.
Waterfall Model
C.
None Of these
D.
Answer optionc
Marks 1
Link Layer
A.
Network Layer
B.
Transport Layer
C.
Application Layer
D.
Answer optionb
Marks 1
Destructive
A.
Defensive
B.
Attacking
C.
Analyzing
D.
Answer optionc
Marks 1
91 Type 2 Artificial Intelligence machines are _____
Super Al
A.
General Al
B.
Weak Al
C.
Answer optionc
Marks 1
wireless
A.
Optic
B.
Magnetic
C.
original
D.
Answer optionc
Marks 1
Answer optionc
Marks 1
Answer optiona
Marks 1
Active hacking
A.
Hacktivism
B.
Activism
C.
Black-hat hacking
D.
Answer optiona
Marks 1
Link Layer
A.
Network Layer
B.
Transport Layer
C.
Application Layer
D.
Answer optiond
Marks 1
Answer optiond
Marks 1
Messaging application
A.
Email
B.
A and B
C.
None
D.
Answer optiond
Marks 1
Examine
A.
Hypothesis
B.
Analysis
C.
Report
D.
Answer optiond
Marks 1
100 How many phases are extra in ADFM as comparing with RMDFR
5
A.
4
B.
3
C.
8
D.
Answer optionb
Marks 1
Intelligent Robots
A.
Industrial Robots
B.
Military Robots
C.
Domestic Robots
D.
Answer optiond
Marks 1
IP addresses
C.
Answer optiona
Marks 1
Answer optionb
Marks 1
104 HTTP port number is _____
A. 80
B. 22
C. 64
D. 32
Answer optionb
Marks 2
Publisher
A.
Subscriber
B.
Both a and b
C.
Answer optiond
Marks 1
106 WebSocket APIs follow model.
Push-Pull Communication
C.
Answer optiond
Marks 2
Bluetooth, ZigBee
A.
Wi-FI,GPRS
B.
EDGE
C.
Answer optiond
Marks 2
Temperature
A.
Humidity
B.
motion
C.
Gas
D.
Answer optionc
Marks 1
Physical Network
B.
Intranet
C.
None Of these
D.
Answer optiona
Marks 1
Information
A.
Knowledge
B.
Intelligence
C.
Information
D.
Answer optiond
Marks 1
Device
A.
Communication
B.
service
C.
Management
D.
Answer optionc
Marks 1
Embedded System
A.
Cyber Security
B.
Internet of Things
C.
Artificial Intelligence
D.
Answer optionc
Marks 1
Answer optiond
Marks 2
during failure
B.
after failure
C.
in advance
D.
Answer optiona
Marks 2
Electronic evidence
A.
Documented evidence
B.
substantial evidence
C.
Explainable evidence
D.
Answer optiond
Marks 1
Admissible
A.
Complete
B.
Authentic
C.
Answer optionc
Marks 2
Non-Volaile
A.
Static Information
B.
Highly volatile
C.
Legal Informaion
D.
Answer optiond
Marks 2
digital evidence
A.
Explainable evidence
B.
demonstrative evidence
C.
substantial evidence
D.
Answer optiona
Marks 2
Super Al
A.
General Al
B.
Weak Al
C.
Answer optiona
Marks 2
While performing digital forensics investigation, in which
120 media an examination should never be performed ?
wireless
A.
Optic
B.
Magnetic
C.
original
D.
Answer optionb
Marks 2
Answer optiona
Marks
2
:
Hackers usfeful in finding bugs and vulnerabilities in a
122 system & don't intend to crack a system are
Answer optiona
Marks 1
Active hacking
A.
Hacktivism
B.
Activism
C.
Black-hat hacking
D.
Answer optionb
Marks 2
_______ layer determines how the packets are coded and
124 signaled by the hardware device over the medium to which
the host is attached.
Link Layer
A.
Network Layer
B.
Transport Layer
C.
Application Layer
D.
Answer optionc
Marks: 1
Answer optiona
Marks 1
Messaging application
A.
Email
B.
A and B
C.
None
D.
Answer optionb
Marks 1
Examine
A.
Hypothesis
B.
Analysis
C.
Report
D.
Answer optionb
Marks 2
128 How many phases are extra in ADFM as comparing with RMDFR
A. 5
B. 4
C. 3
D. 8
Answer optiona
Marks 2
Intelligent Robots
A.
Industrial Robots
B.
Military Robots
C.
Domestic Robots
D.
Answer optionc
Marks 2
IP addresses
C.
Marks: 2
Answer optiond
Marks 1
A. 80
B. 22
C. 64
D. 32
Answer optionc
Marks 1
133 ______ is an object responsible for data distribution
Publisher
A.
Subscriber
B.
Both a and b
C.
Answer optiona
Marks: 1
Bluetooth, ZigBee
A.
Wi-FI,GPRS
B.
EDGE
C.
Answer optiona
Marks 1
Temperature
A.
Humidity
B.
motion
C.
Gas
D.
Answer optionb
Marks 2
Physical Network
B.
Intranet
C.
None of these
D.
Answer optionc
Marks 2
Information
A.
Knowledge
B.
Intelligence
C.
Information
D.
Answer optionb
Marks 1
Device
A.
Communication
B.
service
C.
Management
D.
Answer optionb
Marks: 1
Embedded System
A.
Cyber Security
B.
Internet of Things
C.
Artificial Intelligence
D.
Answer optionc
Marks 1
Answer optionb
Marks 1
during failure
B.
after failure
C.
In advance
D.
Answer optiond
Marks 1
A proof that is introduced in the form of physical object
142 is referred as ______
Electronic evidence
A.
Documented evidence
B.
substantial evidence
C.
Explainable evidence
D.
Answer optiona
Marks 1
Admissible
A.
Complete
B.
Authentic
C.
Answer optionb
Marks 2