Download as pdf or txt
Download as pdf or txt
You are on page 1of 74

ETI MCQS PREVIOUS YEARS

ANSWERS

CODE FORGE LEARNING


ALL MCQs Free Available at https://t.me/management_mcq

Question 1: makes sense of unlabeled data without having any


predefined dataset for its training.

• A) Unsupervised Learning (Correct)


• B) Supervised Learning
• C) Human Learning
• D) Machine Learning

Question 2: deals with learning a function from available training


data.

• A) Artificial Intelligence
• B) Deep Learning
• C) Neural Network
• D) Supervised Learning (Correct)

Question 3: is through supervised learning learning from labelled


data and algorithms

• A) Deep Learning (Correct)


• B) Machine Learning
• C) Human Learning
• D) None of these

Question 4: How many important concepts are part of Artificial


Intelligence?

• (Note: The question is incomplete or lacks options, please provide


options for an accurate answer.)

Question 5: Which of the following has ability to Recognize,


Understand and Act.

• A) Data
• B) Information

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• C) Knowledge
• D) Intelligence (Correct)

Question 6: Type 2 Artificial Intelligence machines are:

• A) Super AI
• B) General AI
• C) Weak AI
• D) Limited Memory Machines (Correct)

Question 7: IBM's Watson supercomputer comes under:

• A) General AI
• B) Super AI
• C) Narrow AI (Correct)
• D) All of the above

Question 8: security works for IoT application to handle security


issues according to scenario requirements.

• A) System
• B) Application
• C) Network
• D) All of the above (Correct)

Question 9: ZigBee is one of the most popular wireless technologies


used by:

• A) WSN (Correct)
• B) MANET
• C) Both a and b
• D) None of the above

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 10: contains local and cloud based observer nodes which
can subscribe to and receive information collected in the cloud from
IoT devices.

• A) IoT Level 4 (Correct)


• B) IoT Level 3
• C) IoT Level 2
• D) IoT Level 1

Question 11:
provides the users the ability to provision computing and storage
resources.

• Options:
• IaaS
• PaaS
• SaaS
• All of the above.
• Correct Answer: IaaS

Question 12:
802.16m provides data rates of 100 Mbit/s for__—s and 1 Gbit/s for
__.

• Options:
• mobile station, fixed station
• fixed station, mobile station
• Both a and b
• None of the above.
• Correct Answer: mobile station, fixed station

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 13:
Raspberry Pi __ used to connect TV to

• Options:
• USB
• HDMI
• RJ45
• VGA
• Correct Answer: HDMI

Question 14:
WebSocket APIs follow __ Communication model.

• Options:
• Request-Response Communication
• Publish-Subscribe Communication
• Push-Pull Communication
• Exclusive Pair Communication
• Correct Answer: Exclusive Pair Communication

Question 16:
6LOWPAN provides data transfer rates of

• Options:
• 250Kb/s
• 1.5 Mb/s
• 100 Mbit/s
• 1 Gbit/s
• Correct Answer: 250Kb/s

Question 17:
WLAN stands for

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• Wireless Local Area Network
• Wire Local Area Network
• Wide Local Area Network
• All of the above.
• Correct Answer: Wireless Local Area Network

Question 18:
IoT devices are usually integrated into the __ that allows them to
communicate and exchange data with other devices and systems

• Options:
• Internet
• Intra network
• Inter network
• Information network
• Correct Answer: Internet

Question 19:
The DAC Converts

• Options:
• Analog to Digital Converter
• Digital to Analog Converter
• Both A and B
• None of the above
• Correct Answer: Digital to Analog Converter

Question 20:
Sensor use to detect nearby objects

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• Proximity sensor
• Humidity sensor
• Touch sensor
• Pressure sensor
• Correct Answer: Proximity sensor.

Question 21:
802.3 is the standard for Ethernet that uses coaxial cable as a shared
medium

• Options:
• 10BASE5
• 10BASE-T
• 10BASE-F
• All of the above
• Correct Answer: 10BASE5

Question 22:
Forest Fire Detection is an example of

• Options:
• IoT Level 5
• IoT Level 6
• IoT Level 2
• IoT Level 1
• Correct Answer: IoT Level 1

Question 23:
__ standards form the basis of specifications for high level
communication protocols such as ZigBee.

• Options:

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• IEEE 802.15.4
• IEEE 802.3
• IEEE 802.11
• IEEE 802.16
• Correct Answer: IEEE 802.15.4

Question 24:
Some Arduino Boards include __ used for loading programs from
the personal computer

• Options:
• HDMI
• USB
• RJ45
• None of these
• Correct Answer: USB

Question 25:
Security cameras and sensors (PIR sensors and Door sensors) are
used for

• Options:
• Smart Lighting
• Smart Appliances
• Intrusion Detection
• Smoke/Gas Detectors
• Correct Answer: Intrusion Detection

Question 26:
In IDIP model, the goal of __ phase is to ensure that the operations
and infrastructure are able to fully support an investigation.

• Options:

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Deployment
• Readiness
• Collection
• Examination
• Correct Answer: Readiness

Question 27:
In EMCI Model, __ is the phase during which crime is reported to
some authority.

• Options:
• Awareness
• Planning
• Storage
• Collection
• Correct Answer: Awareness

Question 28:
In IDIP model, The purpose of __ phase is to provide a mechanism
for an incident to be detected and confirmed.

• Options:
• Readiness
• Digital Crime Investigation
• Review
• Deployment
• Correct Answer: Deployment

Question 29:
Who proposed IDIP Model ?

• Options:
• Palmar

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Carrier and Safford


• Stephenson
• None of these
• Correct Answer: Carrier and Safford

Question 30:
Following are some phases of EMCI Model.

• Options:
• Awareness, Planning
• Authorization, Notification
• Collection, Transport
• All of above
• Correct Answer: All of above

Question 31:
Digital forensics includes the following:

• Options:
• Recovery
• Investigation
• Validation
• All of the Above
• Correct Answer: All of the Above

Question 32:
State the purpose of Presentation phase in EEDIP model?

• Options:
• To obtain and study digital evidence
• To preserve the investigation and finding
• To summarize the evidences found in the process of
investigation

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• None of these
• Correct Answer: To summarize the evidences found in the process
of investigation

Question 33:
How many phases are extra in ADFM as compared with RMDFR?

• Options: (Note: Options not provided, please provide options for


an accurate answer.)

Question 34:
The evidence or proof that is obtained from the electronic source is
called as:

• Options:
• Digital evidence
• Explainable evidence
• Demonstrative evidence
• Substantial evidence
• Correct Answer: Digital evidence

Question 35:
Which one is the characteristic of digital evidence rule:

• Options:
• Admissible
• Complete
• Authentic
• All of the above
• Correct Answer: All of the above

Question 36:
Hosting Obscene Profiles and Creating Fake Profile comes under
section of law:

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• 66 of Information Technology Act
• 67 of Information Technology Act
• 68 of Information Technology Act
• None of the above
• Correct Answer: 67 of Information Technology Act

Question 37:
To meet the Validation challenge it is necessary to ensure that
original media matches by using MD5 hashes.

• Options:
• Forensic Duplication
• Forensic Currency
• Forensic error
• None of the above
• Correct Answer: Forensic Duplication

Question 38:
Which of the following is not a type of volatile evidence?

• Options:
• Routing Tables
• Main Memory
• Log files
• Cached Data
• Correct Answer: Log files

Question 39:
Hash test analysis on digital evidence ensures that the data
obtained from bit-by-bit copy procedure is __ and reflects the
nature of original evidence.

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• Not corrupt
• Not correct
• Admissible
• Reliable
• Correct Answer: Not corrupt

Question 40:
To verify the original drive with the forensic copy, you use:

• Options:
• Password
• Hash analysis
• Disk to disk verification
• None of the mentioned
• Correct Answer: Hash analysis

Question 41:
Collection of Evidence starts with:

• Options:
• From the most volatile to the least volatile data
• From the least volatile to the most volatile data
• To get only volatile data
• To get only Non-volatile data
• Correct Answer: From the most volatile to the least volatile data

Question 42:
Investigate the case: a. Cyber cafes through which illegal transfers
were made were identified. b. The system server logs of the BPO
were collected c. The IP addresses were traced to the:

• Options:

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• a-b-c-d-e
• e-d-c-b-a
• b-c-a-e-d
• d-b-c-e-a
• Correct Answer: a-b-c-d-e (Note: Please confirm the correct
sequence as the options provided are incomplete and need further
clarification.)

Question 43:
Complainant and extract the IP address Desktop computer and a
handicam were seized from the premises. d. Get home address from
IP address.

• Options:
• a-b-c-d
• b-a-d-c
• b-a-c-d
• d-b-a-c
• Correct Answer: b-a-c-d (Note: Please confirm the correct
sequence as the options provided are incomplete and need further
clarification.)

Question 44:
At what point should computer security professionals stop handling
digital evidence and contact law enforcement?

• Options:
• When their organization's policy specifies
• When the task is beyond their training and experience
• When they would be committing an offense by performing
an action
• Correct Answer: When they would be committing an offense by
performing an action

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 45:
Case: The accused was posing to be a genuine railway ticket agent
and had been purchasing tickets online by using stolen credit cards
of non-residents. The accused created fraudulent electronic
records/profiles, which he used to carry out the:

• Options:
• Short list persons present at cyber cafes when the bookings
were made
• Examine the passengers who had travelled on those tickets
• Logs of machines of cyber cafe examined
• Correct Answer: Logs of machines of cyber cafe examined

Question 46:
__ may not crack passwords.

• Options:
• Port scanner
• Vulnerability scanning
• CTSCan
• Network scanning
• Correct Answer: Vulnerability scanning

Question 47:
__ obstacle(s) to protect from hackers' attacks.

• Options:
• Wide spread use of networking and internet connectivity
• Greater number and availability of hacking tools
• A and B
• None of these
• Correct Answer: A and B

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 48:
Ethical hacker must abide rule set by:

• Options:
• Certified Ethical Hacker (CEH)
• E-Commerce Consultants (EC-Council)
• Certified Information System (CIS)
• Computer Security Certification (CSC)
• Correct Answer: E-Commerce Consultants (EC-Council)

Question 49:
What are the desired skill set required for Ethical Hacker?

• Options:
• Analytical skills
• Problem-solving skills
• Communication skills
• All of the above
• Correct Answer: All of the above

Question 50:
Which type of hacker represents the highest risk to your network?

• Options:
• Black-hat hackers

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Former employees
• White-hat hackers
• Script kiddies
• Correct Answer: Black-hat hackers

Question 51:
Hacking for a cause is called

• Options:
• Active hacking
• Hacktivism
• Activism
• Black-hat hacking
• Correct Answer: Hacktivism

Question 52:
Select correct option which differentiates between White Hat
Hacker and Black Hat Hacker.

• Options:
• Tools
• Methodology
• Good and bad Intention
• Trick
• Correct Answer: Good and bad Intention

Question 53:
Which of the following is NOT a role of Hacker?

• Options:
• Gain Access illegally
• Gain Fame

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Improve System Security


• Use system vulnerabilities
• Correct Answer: Improve System Security

Question 54:
Ethical hacker

• Options:
• Works with high professional morals and principles
• Possesses low moral, low principles
• High principles, low morals
• Low professionals, low morals
• Correct Answer: Works with high professional morals and
principles

Question 55:
One of the common motives behind hacking is

• Options:
• Revenge
• Helping nature
• Ignore insult
• None of these
• Correct Answer: Revenge

Question 56:
Ethical hacking related careers may be

• Options:
• Back-end developer
• Computer networking specialist
• A and B

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• None of these
• Correct Answer: A and B

Question 57:
Installing/enabling a network analyzer on a computer network and
capturing every packet that travels across it is considered:

• Options:
• Network related attacks
• Application attack
• Operating system attack
• Non-technical Attack
• Correct Answer: Network related attacks

Question 58:
__ are those individuals who are appointed to maintain and handle
IT security in any firm or organization.

• Options:
• IT Security Engineer
• Black hat hackers
• Red hat hackers
• Blue hat hackers
• Correct Answer: IT Security Engineer

Question 59:
__ attack can lead to a complete server lockup or crash.

• Options:
• Attachment overloading
• Autoresponder
• Connections
• All of above

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Correct Answer: All of above

Question 60:
Banner grabbing is done by using:

• Options:
• Plain old telnet
• Netacad
• A and B
• None of these
(Note: Options seem incomplete, assuming "Netcat" is
intended.)
• Correct Answer: A and B

Question 51:
Hacking for a cause is called

• Options:
• Active hacking
• Hacktivism
• Activism
• Black-hat hacking
• Correct Answer: Hacktivism

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 52:
Select correct option which differentiates between White Hat
Hacker and Black Hat Hacker.

• Options:
• Tools
• Methodology
• Good and bad Intention
• Trick
• Correct Answer: Good and bad Intention

Question 53:
Which of the following is NOT a role of Hacker?

• Options:
• Gain Access illegally
• Gain Fame
• Improve System Security
• Use system vulnerabilities
• Correct Answer: Improve System Security

Question 54:
Ethical hacker

• Options:
• Works with high professional morals and principles
• Possesses low moral, low principles
• High principles, low morals
• Low professionals, low morals
• Correct Answer: Works with high professional morals and
principles

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 55:
One of the common motives behind hacking is

• Options:
• Revenge
• Helping nature
• Ignore insult
• None of these
• Correct Answer: Revenge

Question 56:
Ethical hacking related careers may be

• Options:
• Back-end developer
• Computer networking specialist
• A and B
• None of these
• Correct Answer: A and B

Question 57:
Installing/enabling a network analyzer on a computer network and
capturing every packet that travels across it is considered:

• Options:
• Network related attacks
• Application attack
• Operating system attack
• Non-technical Attack
• Correct Answer: Network related attacks

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 58:
__ are those individuals who are appointed to maintain and handle
IT security in any firm or organization.

• Options:
• IT Security Engineer
• Black hat hackers
• Red hat hackers
• Blue hat hackers
• Correct Answer: IT Security Engineer

Question 59:
__ attack can lead to a complete server lockup or crash.

• Options:
• Attachment overloading
• Autoresponder
• Connections
• All of above
• Correct Answer: All of above

Question 60:
Banner grabbing is done by using:

• Options:
• Plain old telnet
• Netacad
• B and C
• None of these
(Note: Options seem incomplete, assuming "Netcat" is
intended.)
• Correct Answer: Plain old telnet

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 61:
Which of the following is not a caveat for using a network analyzer

• Options:
• Hub on network
• To capture all traffic
• Monitor port on switch
• None
• Correct Answer: None

Question 62:
Which of the following tools is used for network testing and port
scanning

• Options:
• Netcat
• Superscan
• Netscan
• All of Above
• Correct Answer: All of Above

Question 63:
__ is a program that acts as an interface between software &
Hardware

• Options:
• Service
• Operating system
• Network
• None of above
• Correct Answer: Operating system

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 65:
For minimizing database security risk, backup should be

• Options:
• Encrypted
• Decrypted
• Redundant
• None of above
• Correct Answer: Encrypted

Question 66:
Which of the following is not a hacker attack against messaging
systems

• Options:
• Transmitting malware
• Crashing servers
• Obtaining remote control of workstation
• None
• Correct Answer: None

Question 67:
__ can create a DoS condition by filling either user's individual disk
space quota on an email server

• Options:
• Connection
• Autoresponder
• Attachment overloading
• None of above
• Correct Answer: Attachment overloading

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 68:
Which of the following is not an email bomb attack

• Options:
• Attachment overloading Attack
• Connection attack
• Dos
• Autoresponder Attack
• Correct Answer: Connection attack

Question 69:
Crashing server, obtaining remote control of workstation, etc. are
hacker attacks against

• Options:
• Messaging system
• Web Application
• A&B
• None
• Correct Answer: Messaging system

Question 70:
Workstations have a ton of security vulnerabilities like weak
passwords, unpatched security holes, and storage of WEP keys. Such
workstations are

• Options:
• Default Workstations
• Vulnerable workstations
• Physical Workstations
• None
• Correct Answer: Vulnerable workstations

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 71:
The Y dimension of AI philosophy in a 3-Dimensional representation
consists of

• Options:
• Cognition
• Logic
• Interface
• Computation
• Correct Answer: Interface

Question 72:
__ is a tool for ethical hacking of web applications

• Options:
• Netsparker
• Burp Suite
• Angry IP Scanner
• GFI LanGuard
• Correct Answer: Burp Suite

Question 73:
Which of the following is not a network analyzer detection tool

• Options:
• Sniffelet
• PromiscDetect
• Netflow traffic analyzer
• All of above
• Correct Answer: Sniffelet

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 74:
Which of the following holds the highest value of evidence in the
court?

• Options:
• Wide spread use of networking and internet connectivity
• Greater number and availability of hacking tools
• None of these
• Correct Answer: None of these

Question 75:
Banners are intended for

• Options:
• Networking administration
• White hat Hacking
• A&B
• None of above
• Correct Answer: Networking administration

Question 76:
__ is not one of the different stages of hacking.

• Options:
• Reconnaissance
• Scanning
• Suspect
• None of the above
• Correct Answer: Suspect

Question 77:
__ tool is used for ping sweeps and Port scanning

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• [Missing options]
• Correct Answer: [Correct option missing]

Question 78:
Foot-printing Is

• Options:
• Measuring the shoe size of an ethical hacker
• Accumulation of data by gathering information on a target
• Scanning a target network to detect operating system types
• Correct Answer: Accumulation of data by gathering information on
a target

Question 79:
To Examine Intelligently while gathering information about the
target is

• Options:
• Investigation
• Scanning
• Tracing
• Intelligent
• Correct Answer: Intelligent

Question 80:
In 1995, on which topic the International Organization on Computer
Security was formed?

• Options:
• Computer security
• Computer Evidence
• Computer network

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Computer Graphics
• Correct Answer: Computer security

Question 81:
Hosting Obscene Profiles and Creating Fake Profile comes under
section of law

• Options:
• 66 of Information Technology Act
• 67 of Information Technology Act
• 68 of Information Technology Act
• None of the above
• Correct Answer: None of the above

Question 82:
The evidence or proof that is obtained from the electronic source is
called as

• Options:
• Digital evidence
• Explainable evidence
• Demonstrative evidence
• Substantial evidence
• Correct Answer: Digital evidence
Question 84:
When assessing and responding to security incidents, a network
analyzer can help you

• Options:
• View anomalous networking traffic
• Develop baseline of network activity
• Track down an intruder

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• All of the above


• Correct Answer: All of the above

Question 85:
Which norm should not be satisfied by Investigator?

• Options:
• To be Honest and Trustworthy
• Avoid harm to others
• To declare any confidential matters or knowledge
• To respect the privacy of others
• Correct Answer: To declare any confidential matters or knowledge

Question 86:
Which one is the characteristic of digital evidence rule?

• Options:
• Admissible
• Complete
• Authentic
• All of the above
• Correct Answer: All of the above

Question 87:
Hash test analysis on digital evidence ensures that the data
obtained from bit-by-bit copy procedure is __ and reflects the
nature of original evidence.

• Options:
• Not corrupt
• Not correct
• Admissible
• Reliable

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Correct Answer: Reliable

Question 88:
Forest Fire Detection is an example of

• Options:
• IoT Level 5
• IoT Level 6
• IoT Level 2
• IoT Level 1
• Correct Answer: IoT Level 5

Question 89:
In terms of digital evidence, the Internet is an example of:

• Options:
• Open computer systems
• Communication systems
• Embedded computer systems
• None of the above
• Correct Answer: Communication systems

Question 90:
The criminological principle states that contact between two items
will result in an exchange, is:

• Options:
• Locard's Exchange Principle
• Differential Association Theory
• Beccaria's Social Contract
• None of the above
• Correct Answer: Locard's Exchange Principle

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 91:
Key criteria for handling digital evidence include:

• Options:
• Proper protocol should be followed for acquisition of
evidence
• All material artifacts should be date and time-stamped
• Physical and digital artifacts should be collected and retained
• All of the above
• Correct Answer: All of the above

Question 92:
How many models of Digital Forensics?

• Options:
• 8
• 2
• 5
• 3
• Correct Answer: [Correct option missing]

Question 93:
Which of the following is not an attack against messaging systems?

• Options:
• Attachment overloading
• Connection attack
• DoS
• Autoresponder
• Correct Answer: Attachment overloading

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 94:
The difference between machine and human intelligence is that the
human __ compare to machine.

• Options:
• Breath / sleep
• Think / act rationally
• Walk / talk
• Eat / drink
• Correct Answer: Think / act rationally

Question 95:
__ is the process of collecting, organizing, and analyzing large sets
of data to discover patterns and other useful information.

• Options:
• AI
• Cloud computing
• Big Data Analytics
• All of the above
• Correct Answer: Big Data Analytics

Question 96:
In the EMCI Model, __ is impacted by information from within and
outside the organization that will affect the investigation.

• Options:
• Planning
• Awareness
• Authorization
• Transport
• Correct Answer: Awareness

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 97:
Digital forensics includes the following:

• Options:
• Recovery
• Investigation
• Validation
• All of the above
• Correct Answer: All of the above

Question 98:
How many approaches of Artificial Intelligence are in existence?

• Options:
• 2
• 4
• 5
• 3
• Correct Answer: 4

Question 99:
The concept that describes the idea of everyday physical objects
being connected to the internet and being able to identify
themselves to other devices

• Options:
• Internet of Things
• Embedded System
• Intranet of Things
• Microprocessor
• Correct Answer: Internet of Things

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 100:
__ is most commonly used for clustering similar input into logical
groups.

• Options:
• Unsupervised Learning
• Supervised learning
• Deep Learning
• Human and Machine Learning
• Correct Answer: Unsupervised Learning

Question 101:
In the 3-dimensional philosophy of AI, the X dimension is

• Options:
• Reasoning
• Knowledge
• Computation
• Vision
• Correct Answer: Reasoning
Question 102:
_____ systems are suitable for solutions where data are involved is
big, however, the primary analysis requirement is not
computationally intensive and can be done locally itself.

• Options:
• IoT Level 1
• IoT Level 2
• IoT Level 3
• IoT Level 4
• Correct Answer: IoT Level 3

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 103:
Computer programs that mimic the way human brain processes
information is called

• Options:
• Computer Networks
• Circuits Network
• Neural Network
• Human Network
• Correct Answer: Neural Network

Question 104:
The ability to sense the environment, to make decisions, and to
control action is called

• Options:
• Data
• Information
• Knowledge
• Intelligence
• Correct Answer: Intelligence

Question 105:
Which of the following is not a network hacking tool?

• Options:
• Telnet
• Net Cat
• CleanIISLog
• A&B
• Correct Answer: CleanIISLog

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 106:
IoT stands for

• Options:
• Internet of Technology
• Intranet of Things
• Internet of Things
• Information of Things
• Correct Answer: Internet of Things

Question 107:
A motor that moves in discrete steps is called a

• Options:
• Servo Motor
• Linear Actuator
• Induction Motor
• Stepper Motor
• Correct Answer: Stepper Motor

Question 108:
_____ supports methods such as GET, PUT, POST, and DELETE.

• Options:
• HTTP CoAP
• Websocket, MQTT
• XMPP AMQP
• None of the above.
• Correct Answer: HTTP CoAP

Question 109:
IoT level is used for Home Automation

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• Level-1
• Level-2
• Level-3
• Level-4
• Correct Answer: Level-1

Question 110:
IoT level which is used for Smart Irrigation System

• Options:
• Level-1
• Level-2
• Level-3
• Level-4
• Correct Answer: Level-2
Question 111:
6LoWPAN works with the _____ layer protocol and defines
compression mechanisms for IPv6 datagrams over IEEE 802.15.4-
based networks.

• Options:
• 802.11
• 802.3
• 802.16
• 802.15.4
• Correct Answer: 802.15.4

Question 112:
_____ provides the users the ability to develop and deploy
applications in the cloud using the development tools, application

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

programming interfaces (APIs), software libraries, and services


provided by the cloud service provider.

• Options:
• IaaS
• PaaS
• SaaS
• All of the above.
• Correct Answer: PaaS

Question 113:
The theory of mechanization was developed by

• Options:
• Bertrand Russel
• Turing
• Aristotle
• Charles Babbage
• Correct Answer: Turing

Question 114:
Which does not come under the characteristics of IoT?

• Options:
• Dynamic & Self-Adapting
• Self-Configuring
• Endpoint Management
• Integrated into Information Network
• Correct Answer: Endpoint Management

Question 115:
_____ can recognize the shapes of the letters and convert it into
editable text.

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• Handwriting Recognition System
• Voice Recognition System
• Text Recognition System
• Speech Recognition Systems
• Correct Answer: Handwriting Recognition System

Question 116:
Most commonly used units for humidity measurement are relative
humidity (RH), dew/frost point (D/F PT), and parts per million
(PPM).

• Options:
• Temperature
• Humidity
• Motion
• All of the above.
• Correct Answer: Humidity

Question 117:
_____ is a transaction-oriented and stateless protocol.

• Options:
• HTTP
• CoAP
• UDP
• TCP
• Correct Answer: HTTP
Question 118:
A program that simulated a psychotherapist interacting with a
patient and successfully passed the Turing Test.

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• MAYA
• ALEXA
• MALISKA
• ELIZA
• Correct Answer: ELIZA

Question 119:
Need of Artificial Intelligence has grown because of

• Options:
• Big data which is normally unstructured and vast for humans
to comprehend.
• Supervised learning has shown promising results.
• Neural Network which is algorithm used as replacement to
human.
• Correct Answer: Big data which is normally unstructured and vast
for humans to comprehend.

Question 120:
_____ is an area of computer science that emphasizes the creation of
intelligent machines that work and react like humans.

• Options:
• Machine Learning
• Deep Learning
• Artificial Intelligence
• Neural Network
• Correct Answer: Artificial Intelligence

Question 121:
BMP180 is a popular digital sensor for use in mobile phones, PDAs,
GPS navigation devices, and outdoor equipment.

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Options:
• Pressure
• Gas
• Smoke
• Image
• Correct Answer: Pressure

Question 122:
_____ supports methods such as GET, PUT, POST, and DELETE.

• Options:
• HTTP, CoAP
• Websocket, MQTT
• XMPP, AMQP
• None of the above.
• Correct Answer: HTTP, CoAP

Question 123:
ARM Microcontrollers support for

• Options:
• Low level programming language
• High Level Programming Language
• Both A and B
• None of the above
• Correct Answer: Both A and B

Question 124:
The WSN nodes are prone to

• Options:
• Malicious attacks

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Eavesdropping
• Interference
• All of the above.
• Correct Answer: All of the above.

Question 125:
WebSocket-Based APIs allow _____ communication between clients
and servers.

• Options:
• Bi-Directional, Full Duplex
• Uni-Directional, Half Duplex
• Bi-Directional, Half Duplex
• Uni-Directional, Full Duplex
• Correct Answer: Bi-Directional, Full Duplex

Question 126:
_____ ensures reliable transmission of packets in-order and also
provides error detection capability so that duplicate packets can be
discarded and lost packets are retransmitted.

• Options:
• UDP
• TCP
• HTTP
• CoAP
• Correct Answer: TCP

Question 127:
IoT level which is used for Tracking Package Handling

• Options:
• Level-1

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Level-2
• Level-3
• Level-4
• Correct Answer: Level-3

Question 128:
In UMDFPM, _____ phase is not there in this Model.

• Options:
• Examine
• Hypothesis
• Analysis
• Report
• Correct Answer: Examine

Question 129:
In EMCI Model, _____ is the phase where the nature of investigation
has been identified.

• Options:
• Awareness
• Authorization
• Planning
• Collection
• Correct Answer: Awareness

Question 130:
In IDIP model, The goal of _____ phase is to collect and analyze the
digital evidence.

• Options:
• Hypothesis
• Deployment

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Digital Crime Investigation


• Review
• Correct Answer: Digital Crime Investigation

Question 131:
An information which has a positive impact on the action occurred,
such as the information supporting an incident is an

• Options:
• Irrelevant Evidence
• Relevant Evidence
• Cannot say
• All of the above
• Correct Answer: Relevant Evidence

Question 132:
Embedded System consists of

• Options:
• Input Device, Microcontroller (The Brain) and Output Device.
• Hardware and software device
• Transmitter and Receiver device
• WiFi and Bluetooth
• Correct Answer: Input Device, Microcontroller (The Brain) and
Output Device.

Question 133:
FBI stands for

• Options:
• Federal Bureau of Intelligence
• Federal Bureau of Investigation
• Feedback bureau of Investigation

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Fabric building of Integration


• Correct Answer: Federal Bureau of Investigation

Question 134:
Digital evidences are used to establish a credible link between

• Options:
• Attacker and victim and the crime scene
• Attacker and the crime scene
• Victim and the crime scene
• Attacker and Information
• Correct Answer: Attacker and victim and the crime scene

Question 135:
An information which has a positive impact on the action occurred
is called

• Options:
• Irrelevant Evidence
• Relevant Evidence
• Positive Evidence
• Legal Evidence
• Correct Answer: Relevant Evidence

Question 136:
The application data, typically in files, is encoded by the _____
protocol and encapsulated in the _____ protocol which provides
connection or transaction oriented communication over the
network.

• Options:
• Application layer, Transport layer
• Transport layer, Application layer

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Network layer, Link layer


• Link layer, Network layer
• Correct Answer: Application layer, Transport layer
Question 136:

The evidence or proof that is obtained from the electronic source is


called as:

• digital evidence
• Explainable evidence
• demonstrative evidence
• substantial evidence

Answer: digital evidence

Question 137:

State the purpose of Presentation phase in EEDIP model:

• To obtain and study digital evidence


• To preserve the investigation and finding
• To summarize the evidences found in the process of investigation
• None of these

Answer: To summarize the evidences found in the process of


investigation

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 138:

Which forensic model follows the waterfall model as every activity occurs
in sequence?

• EMCI
• IDIP
• UMDFPM
• None of these

Answer: IDIP

Question 139:

A logon record tells us that, at a specific time:

• An unknown person logged into the system using the account


• The owner of a specific account logged into the system
• The account was used to log into the system

Answer: The owner of a specific account logged into the system

Question 140:

When assessing the reliability of digital evidence, the investigator is


concerned with whether the computer that generated the evidence was
functioning normally, and:

• Whether chain of custody was maintained

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Whether there are indications that the actual digital evidence was
tampered with
• Whether the evidence was properly secured in transit
• Whether the evidence media was

Answer: Whether there are indications that the actual digital evidence
was tampered with

Question 141:

In an e-mail harassment case, the act of sending threatening messages


via a Web-based e-mail service can leave a number of traces.
Investigator can obtain information from:

• Offender's hard drive


• Web server access logs
• IP addresses
• All of the mentioned

Answer: All of the mentioned

Question 142:

Dried blood and fingerprints are a type of:

• Substantial Evidence
• Illustrative evidence
• Electronic Evidence

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Documented Evidence

Answer: Documented Evidence

Question 143:

Select the basic questions raised by ethical hackers during penetration


testing among the following: a) What can an attacker do with available
information? b) What information/locations/systems can an attacker gain
access? c) Does anyone at the target notice an attack? d) What systems
are susceptible to attacks?

Options:

• a), b)
• a), c)
• b), d)
• a), b), c), d)

Answer: a), b), c), d)

Question 144:

Ethical hacking will allow to:

• remove
• measure
• reject
• None of these

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Answer: measure

Question 145:

Security assessments based around ethical hacking focus on:

• System Vulnerabilities
• hacking processes
• password cracking
• All of the above

Answer: All of the above

Question 146:

Which of the following is likely to have highest knowledge about system


vulnerabilities?

• Gray Hat
• White Hat
• Malicious Users
• Script kiddies

Answer: White Hat

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 147:

Which is not one of the different stages of hacking?

• Reconnaissance
• Scanning
• Compiling
• Maintaining access

Answer: Compiling

Question 148:

Which is the most secure operating system out of the following?

• Windows
• DOS
• Novell Netware
• Android

Answer: Novell Netware

Question 149:

An examiner needs to access ___ immediately and extract that evidence


before it is lost.

• Disk

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• The cache and register


• Archival Media
• Log Files

Answer: The cache and register

Question 150:

Digital evidences must follow the requirements of the:

• Ideal Evidence rule


• Best Evidence Rule
• Exchange Rule
• All of the mentioned

Answer: Best Evidence Rule

Question 151:

Example(s) of hackers on basis of work and mind is/are:

• exploiting a physical security


• Bypassing web access controls
• using overly trusting colleague's user ID and password
• All of these

Answer: All of these

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 152:

Ports are available in UDP:

• 66535
• 66545
• 66555
• 66565

Answer: 66535

Question 153:

Determines email server version information based on how the server


responds to malformed SMTP requests:

• Nmap scan
• Tmap scan
• Smtp scan
• None

Answer: Smtp scan

Question 154:

Which of the following is a wireless network attack?

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• Encrypted traffic
• Vulnerable wireless workstation
• Rogue network
• All of the above

Answer: Rogue network

Question 155:

Peer option tells Nmap to perform an faster

• Ta
• TS
• T4
• T6

Answer: T4

Question 156:

Workstations have ton of security vulnerabilities like weak passwords to


unpatched security holes to storage of WEP keys such workstations are:

• Default Workstations
• Vulnerable workstations
• Physical Workstations
• None

Answer: Vulnerable workstations

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 157:

____ attack can create a never-ending loop that bounces thousands of


messages back & forth between users:

• Autoresponder
• Connection
• Attachment overloading
• None

Answer: Autoresponder

Question 158:

In EMCI Model, ____ is impacted by information from within and outside


the organization that will affect the investigation.

• Planning
• Awareness
• Authorization
• Transport

Answer: Awareness

Question 159:

Which of the following port no. is vulnerable to hacked HTTPs using TCP
protocol?

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• 441
• 442
• 443
• 444

Answer: 443

Question 160:

POP3 Stands for:

• Post Office Program Version 3


• Post Office Protocol Version 3
• Post Office Process Version 3
• None

Answer: Post Office Protocol Version 3

Question 161:

Skill(s) of ethical hackers may consist of:

• Trained hacker
• Identify security problems with computer networks
• Capable of breaching security
• All of these

Answer: All of these

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 162:

Which statement of the following is INCORRECT in view of ethical


hacker?

• They are hired professions to penetrate in the system


• They find system vulnerabilities without proper authorization.
• They help make the system secure and better.

Answer: They find system vulnerabilities without proper authorization.

Question 163:

Social engineering is the art of:

• making online friends.


• exploiting the human elements to gain access to unauthorized
resources.
• searching on the internet for various things.
• helping others socially

Answer: exploiting the human elements to gain access to unauthorized


resources.

Question 164:

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

The correct procedure followed according to the chain of custody for


electronic evidence is:

• Save the original material


• Take photos of physical evidence
• Take screenshots of digital evidence content
• Inject a bit-for-bit clone of digital evidence

Answer: c-a-d-e-f-b

Question 165:

Which of the following standards form the basis of specifications for


high-level communication protocols such as ZigBee?

• IEEE 802.15.4
• IEEE 802.3
• IEEE 802.11
• IEEE 802.16

Answer: IEEE 802.15.4

Question 166:

Some Arduino Boards include ____ used for loading programs from the
personal computer.

• USB

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

• HDMI
• RJ45
• None of these

Answer: USB

Question 167:

____ is an actuator that creates motion in a straight line, in contrast to the


circular motion of a conventional electric motor.

• Relay
• Solenoid
• Linear Actuator
• None of the above

Answer: Linear Actuator

Question 168:

In which system does Forensic Science play an important role?

• Criminal justice
• Artificial Intelligence
• Machine learning
• Deep learning

Answer: Criminal justice

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 169:

Weather Monitoring, Air Pollution Monitoring, Noise Pollution


Monitoring, Forest Fire Detection, and River Flood Detection belong to:

• Cities
• Environment
• Retail
• Logistics

Answer: Environment

Question 170:

The authentication, authorization, message and content integrity, and


data security are functions of the ____ functional block.

• Service
• Management
• Security
• Application

Answer: Security
Question 170: Which branch of Computer Science pursues creating the
computers/machines as intelligent as human beings? • Options: a)
Artificial Intelligence b) Machine Learning c) Neural Network d) Deep
Learning • Correct Answer: a) Artificial Intelligence

Question 171: The ARM architecture uses a architecture which supports


separate data and instruction buses for memories. What is this

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

architecture called? • Options: a) Harvard b) Von Neumann c) Control


ROM d) Hardwired • Correct Answer: a) Harvard

Question 172: Which algorithm analyzes the training data and produces
an inferred function, which can be used for mapping new examples? •
Options: a) Unsupervised Learning Algorithm b) Deep Learning
Algorithm c) Supervised Learning Algorithm d) Neural Learning
Algorithm • Correct Answer: c) Supervised Learning Algorithm

Question 173: 6LOWPAN operates in which frequency range? • Options:


a) 5GHz b) 2.4GHz c) 60GHz d) 10GHz • Correct Answer: b) 2.4GHz

Question 174: Which protocol does not provide guaranteed delivery,


ordering of messages, and duplicate elimination? • Options: a) CoAP b)
HTTP c) TCP d) UDP • Correct Answer: d) UDP

Question 175: The coordinator acts as a gateway that connects the WSN
to what?

• Options: a) Sensors b) Actuator c) Internet d) TCP

• Correct Answer: c) Internet

Question 176: Which field deals with learning a function from available
training data? • Options: a) Artificial Intelligence b) Deep Learning c)
Neural Network d) Supervised Learning

• Correct Answer: d) Supervised Learning

Question 177: Which communication method allows bi-directional, full-


duplex communication between clients and servers? • Options: a)
Communication with REST APIs b) Websocket APIs c) Both a and b d)
None of the above • Correct Answer: c) Both a and b

Question 178: Which IoT level is used for Forest Fire Detection? •
Options: a) Level-3 b) Level-4 c) Level-5 d) Level-6 • Correct Answer: c)
Level-5

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 179: DDS uses which model where publishers create topics to
which subscribers can subscribe? • Options: a) Request-Response b)
Publish-Subscribe c) Push-Pull d) Exclusive Pair • Correct Answer: b)
Publish-Subscribe

Question 180: Select the basic questions raised by ethical hackers during
penetration testing among the following: • Options: a) What can an
attacker do with available information? b) What
information/locations/systems can an attacker gain access to? c) What
system notices a) and b)? d) All of the above • Correct Answer: d) All of
the above
Question 181: Guaranteed delivery and data integrity are handled by
which protocols? • Options: a) TCP b) UDP c) CoAP d) HTTP • Correct
Answer: a) TCP

Question 182: The WSN nodes are prone to: • Options: a) Malicious
attacks b) Eavesdropping c) Interference d) All of the above • Correct
Answer: d) All of the above

Question 183: In EMCI Model, which phase is impacted by information


from within and outside the organization that will affect the
investigation? • Options: a) Planning b) Awareness c) Authorization d)
Transport • Correct Answer: b) Awareness

Question 184: Which feature or attack can create a never-ending loop


that bounces thousands of messages back and forth between users? •
Options: a) Autoresponder b) Connection c) Attachment overloading d)
None • Correct Answer: a) Autoresponder

Question 185: Workstations have a ton of security vulnerabilities like


weak passwords to unpatched security holes to storage of WEP keys.
What are such workstations called? • Options: a) Default Workstations b)
Vulnerable Workstations c) Physical Workstations d) None • Correct
Answer: b) Vulnerable Workstations

Question 186: Which option tells Nmap to perform a faster scan? •


Options: a) T3 b) T5 c) T4 d) T6 • Correct Answer: c) T4

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 187: Which of the following is a wireless network attack? •


Options: a) Encrypted traffic b) Vulnerable wireless workstation c) Rogue
network d) All of the above • Correct Answer: d) All of the above

Question 188: Which port number is vulnerable to hacked HTTPS using


the TCP protocol? • Options: a) 44 b) 442 c) 443 d) 444 • Correct Answer:
c) 443

Question 189: What determines email server version information based


on how the server responds to a mail-formed SMTP request? • Options:
a) Nmap scan b) Tmap scan c) Smtp scan d) None • Correct Answer: c)
Smtp scan

Question 190: POP3 stands for: • Options: a) Post Office Program Version
3 b) Post Office Protocol Version 3 c) Post Office Process Version 3 d)
None • Correct Answer: b) Post Office Protocol Version 3
Question 191: ____ for hacking is very essential. • Options: a) Rejection b)
Approval c) Scope d) Bandc • Correct Answer: c) Scope

Question 192: Job Skill(s) required by an ethical hacker: • Options: a)


Analytical skills b) Interpersonal skills c) Communication skills d)
Problem-solving skills and all of the above • Correct Answer: d) Problem-
solving skills and all of the above

Question 193: ____ is not one of the different stages of hacking. •


Options: a) Reconnaissance b) Scanning c) Compiling d) Maintaining
access • Correct Answer: c) Compiling

Question 194: Security assessments based around ethical hacking focus


on: • Options: a) System Vulnerabilities b) Hacking processes c) Password
cracking d) All of the above • Correct Answer: d) All of the above

Question 195: Ethical hacking will allow _____ to massive security


breaches. • Options: a) Remove b) Measure c) Reject d) None of these •
Correct Answer: a) Remove

Question 196: Which of the following is likely to have the highest


knowledge about system vulnerabilities? • Options: a) Gray Hat b) White
Hat c) Malicious Users d) Script kiddies • Correct Answer: b) White Hat

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 197: Social engineering is the art of: • Options: a) Making


online friends b) Exploiting the human elements to gain access to
unauthorized resources c) Searching on the internet for various things d)
Helping others socially • Correct Answer: b) Exploiting the human
elements to gain access to unauthorized resources.

Question 198: Which statement of the following is INCORRECT in view of


an ethical hacker? • Options: a) They are hired professions to penetrate
the system b) They find system vulnerabilities without proper
authorization. c) They help make the system secure and better. • Correct
Answer: a) They are hired professions to penetrate the system.

Question 199: An examiner needs to access _____ immediately and


extract that evidence before it is lost. • Options: a) Disk b) The cache and
register c) Archival Media d) Log Files • Correct Answer: b) The cache and
register
Question 44: In an e-mail harassment case, the act of sending
threatening messages via a Web-based e-mail service can leave a
number of traces. Investigators can obtain information from __. •
Options: a) Offender's hard drive b) Web server access logs c) IP
addresses d) All of the mentioned • Correct Answer: d) All of the
mentioned

Question 43: When assessing the reliability of digital evidence, the


investigator is concerned with whether the computer that generated the
evidence was functioning normally, and: • Options: a) Whether chain of
custody was maintained b) Whether there are indications that the actual
digital evidence was tampered with c) Whether the evidence was
properly secured in transit d) Whether the evidence media was • Correct
Answer: b) Whether there are indications that the actual digital evidence
was tampered with

Question 53: Which is the most secure operating system out of the
following? • Options: a) Windows b) DOS c) Novell Netware d) Android •
Correct Answer: c) Novell Netware

Question 42: Although crime scenes are typically photographed, it is a


good idea to create diagrams of the crime scene because: • Options: a)

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Diagramming is a common crime scene technician's skill; however, it


requires continual practice. b) The process of creating a diagram can
result in a digital investigator noticing an important item of evidence
that would otherwise have been missed. c) The quality of photographs
taken at the • Correct Answer: b) The process of creating a diagram can
result in a digital investigator noticing an important item of evidence
that would otherwise have been missed.

Question 39: The evidence or proof that is obtained from the electronic
source is called as-——- • Options: a) Digital evidence b) Explainable
evidence c) Demonstrative evidence d) Substantial evidence • Correct
Answer: a) Digital evidence

Question 41: A logon record tells us that, at a specific time: • Options: a)


An unknown person logged into the system using the account b) The
owner of a specific account logged into the system c) The account was
used to log into the system • Correct Answer: b) The owner of a specific
account logged into the system

Question 45: The correct procedure followed according to the chain of


custody for electronic evidence is: • Options: a) Save the original material
b) Take photos of physical evidence c) Take screenshots of digital
evidence content d) Inject a bit-for-bit clone of digital evidence e) a-b-c-
e-d-f f) a-c-b-d-e-f g) c-a-d-f-e-b h) c-a-d-e-f-b • Correct Answer: g) c-
a-d-f-e-b

Question 38: Digital evidences must follow the requirements of the •


Options: a) Ideal Evidence rule b) Best Evidence Rule c) Exchange Rule d)
All of the mentioned • Correct Answer: b) Best Evidence Rule

Question 36: Digital evidences are used to establish a credible link


between___ • Options: a) Attacker and victim and the crime scene b)
Attacker and the crime scene c) Victim and the crime scene d) Attacker
and Information • Correct Answer: a) Attacker and victim and the crime
scene

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 35: Dried blood and fingerprints are ______ evidence. • Options:
a) Substantial Evidence b) Illustrative evidence c) Electronic Evidence d)
Documented Evidence • Correct Answer: a) Substantial Evidence
Question 32: In IDIP model, The goal of ______ phase is to collect and
analyze the digital evidence. • Options: a) Hypothesis b) Deployment c)
Digital Crime Investigation d) Review • Correct Answer: c) Digital Crime
Investigation

Question 30: ______ norm should not satisfy by Investigator. • Options: a)


To be Honest and Trustworthy b) Avoid harm to others c) To declare any
confidential matters or knowledge d) To respect privacy of others •
Correct Answer: c) To declare any confidential matters or knowledge

Question 28: In UMDFPM, ______ phase is not there in this Model. •


Options: a) Examine b) Hypothesis c) Analysis d) Report • Correct Answer:
b) Hypothesis

Question 26: FBI stands for • Options: a) Federal Bureau of Intelligence b)


Federal Bureau of Investigation c) Feedback bureu of Investigation d)
Fabric building of of Integration • Correct Answer: b) Federal Bureau of
Investigation

Question 29: In EMCI Model, ______ is the phase where the nature of
investigation has been identified. • Options: a) Awareness b)
Authorization c) Planning d) Collection • Correct Answer: a) Awareness

Question 27: In which system does Forensic Science play an important


role? • Options: a) Criminal justice b) Artificial Intelligence c) Machine
learning d) Deep learning • Correct Answer: a) Criminal justice

Question 25: ________ standards form the basis of specifications for high-
level communication protocols such as ZigBee. • Options: a) IEEE
802.15.4 b) IEEE 802.3 c) IEEE 802.11 d) IEEE 802.16 • Correct Answer: a)
IEEE 802.15.4

Question 24: IoT level which is used for Tracking Package Handling •
Options: a) Level-1 b) Level-2 c) Level-3 d) Level-4 • Correct Answer: a)
Level-1

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 23: Some Arduino Boards include ______ used for loading
programs from the personal computer. • Options: a) USB b) HDMI c)
RJ45 d) None of these • Correct Answer: a) USB

Question 21: ______ is an actuator that creates motion in a straight line, in


contrast to the circular motion of a conventional electric motor. •
Options: a) Relay b) Solenoid c) Linear Actuator d) None of the above •
Correct Answer: c) Linear Actuator
Question 22: Weather Monitoring, Air Pollution Monitoring, Noise
Pollution Monitoring, Forest Fire Detection, and River Flood Detection
belong to the domain-specific IoT of ______. • Options: a) Cities b)
Environment c) Retail d) Logistics • Correct Answer: b) Environment

Question 20: The application data, typically in files, is encoded by the


protocol and encapsulated in the protocol which provides connection or
transaction-oriented communication over the network. This is the
interaction between the ______ and ______ layers. • Options: a) Application
layer, Transport layer b) Transport layer, Application layer c) Network
layer, Link layer d) Link layer, Network layer • Correct Answer: b)
Transport layer, Application layer

Question 19: The authentication, authorization, message and content


integrity, and data security are functions of the ______ functional block. •
Options: a) Service b) Management c) Security d) Application • Correct
Answer: c) Security

Question 18: ______ ensures reliable transmission of packets in-order and


also provides error detection capability so that duplicate packets can be
discarded and lost packets are retransmitted. • Options: a) UDP b) TCP c)
HTTP d) CoAP • Correct Answer: b) TCP

Question 17: Embedded Systems consist of Input Device, Microcontroller


(The Brain), and Output Device. • Options: a) Hardware and software
device b) Transmitter and Receiver device c) WiFi and Bluetooth d) Input
Device, Microcontroller (The Brain), and Output Device • Correct Answer:
d) Input Device, Microcontroller (The Brain), and Output Device

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 15: The WSN nodes are prone to ______. • Options: a) Malicious
attacks b) Eavesdropping c) Interference d) All of the above • Correct
Answer: d) All of the above

Question 14: BMP 180 is a popular digital sensor for use in mobile
phones, PDAs, GPS navigation devices, and outdoor equipment,
specifically for measuring ______. • Options: a) Pressure b) Gas c) Smoke
d) Image • Correct Answer: a) Pressure

Question 13: ARM Microcontrollers support ______. • Options: a) Low-


level programming language b) High-Level Programming Language c)
Both A and B d) None of the above • Correct Answer: c) Both A and B
Question 67: When assessing security and responding to security
incidents, a network analyzer can help you ______. • Options: a) View
anomalous networking traffic b) Develop baseline of network activity c)
Track down an intruder d) All of the above • Correct Answer: d) All of the
above

Question 40 (Repeated): To determine what evidence to collect first, you


should access evidences in ______. • Options: a) Order of Volatility b)
Increasing c) Decreasing d) Any • Correct Answer: a) Order of Volatility

Question 26: In the EMCI Model, the phase during which crime is
reported to some authority is ______. • Options: a) Extended Model of
Cybercrime Investigation (EMCI) b) Awareness c) Planning d) Collection •
Correct Answer: b) Awareness

Question 36: Encrypted data can be impossible to view without the


______. • Options: a) Password b) Evidence c) None of the mentioned •
Correct Answer: a) Password

Question 11: ______ is a device that alters the physical quantity as it can
cause a mechanical component to move after getting some input from
the sensor. • Options: a) Sensors b) Rensnnors c) Both a and b d) None
of the above • Correct Answer: c) Both a and b
Question 34: ______ data is data that is lost if the power is switched off. •
Options: a) Non-volatile b) Goat c) Primary d) Secondary • Correct
Answer: a) Non-volatile

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 31: An EMCI model follows ______ as every activity occurs in


sequence. • Options: a) Agile Model b) Spiral Model c) Waterfall Model
d) None of these • Correct Answer: c) Waterfall Model

Question 61: Vulnerability is nothing but ______ of a system. • Options: a)


strong points of a system b) Both a & b c) None • Correct Answer: a)
strong points of a system

Question 55: Guidelines for selecting hacking tools may consist of ______.
• Options: a) Study the user guide for commercial tools b) Detailed
reports on the discovered vulnerabilities c) Regular updates and support
when needed d) All of these • Correct Answer: d) All of these

Question 35: Digital evidence must follow the requirements of the ______.
• Options: a) Ideal Evidence rule b) Best Evidence Rule c) Exchange Rule
d) All of the mentioned • Correct Answer: d) All of the mentioned

Question 61 (Repeated): Use of Ping sweep is ______. • Options: a)


identify live systems b) Locate live systems c) identify open ports d)
Locate firewall • Correct Answer: b) Locate live systems

Question 55 (Repeated): Enemies of information security are ______. •


Options: a) Security researchers b) Hacktivists c) Cyber Terrorists d) All of
these • Correct Answer: d) All of these

Question 68: Network analyzer performs ______. • Options: a) Captures all


networking traffic b) Display it all in chronological order c) Decode what
is found in human-readable format d) All of the above • Correct Answer:
d) All of the above

Question 59: DMZ stands for ______. • Options: a) Demilitarized Zone b)


DeMail Zone c) DoMain Zone d) None • Correct Answer: a) Demilitarized
Zone

Question 18: Devices that transform electrical signals into physical


movements are ______. • Options: a) Sensors b) Actuators c) Switches d)
Display • Correct Answer: b) Actuators

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 33: Which obstacle will be handled by Investigation while


achieving the goal of DFI? • Options: a) Pinpoint & locate valid data from
large storage b) If a file is secured, the investigator must find a way to
read the protected data in an unauthorized manner. c) Every case is
different, identifying the techniques and tools will take a long time. d) All
of the above • Correct Answer: d) All of the above

Question 51: Ethical hacker does not require ______ for effective
operation. • Options: a) Asset to be protected b) Potential Threat Source
c) Support by Organization d) None of the above • Correct Answer: d)
None of the above

Question 16: ______ jack allows connection of analog TVs and other
similar output devices. • Options: a) Audio out b) USB c) HDMI • Correct
Answer: a) Audio out

Question 63: ______ is a competitor OS for Microsoft. • Options: a)


Windows b) Symbian c) All of the above • Correct Answer: c) All of the
above
Question 60: Which of the following is not a commonly hacked port
number? • Options: a) 19 b) 20 c) 21 • Correct Answer: a) 19

Question 25: Forest Fire Detection is an example of which IoT level? •


Options: a) IoT Level 5 b) IoT Level 6 c) IoT Level 2 d) IoT Level 1 •
Correct Answer: d) IoT Level 1

Question 68: Keeping the software up to date is a sign of ______ security.


• Options: a) Good security b) Bad security c) Both A and B d) None •
Correct Answer: a) Good security

Question 39: Key criteria for the handling of digital evidence include: •
Options: a) Proper protocol should be followed for acquisition of
evidence b) Material should be date and time stamped c) All artifacts,
physical and digital, should be collected and retained • Correct Answer:
c) All artifacts, physical and digital, should be collected and retained

Question 54: Which of the following is a part of the social engineering


life cycle? • Options: a) Gaining information b) User identification c)

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

System monitoring d) Shoulder surfing • Correct Answer: d) Shoulder


surfing

Question 45: A Chain of Custody form is used to document which of the


following? • Options: a) Investigator who has been in contact with
evidence in a case b) Anyone who has not been in contact with evidence
in a case c) Anyone who has been in contact with evidence in a case •
Correct Answer: c) Anyone who has been in contact with evidence in a
case

Question 46: ______ is one with very little knowledge about hacking but
uses free tools and the internet to perform malicious acts. • Options: a)
Ex-Employee b) Script Kiddies c) Malicious Users d) Gray Hat • Correct
Answer: b) Script Kiddies

Question 62: Web servers provide ______ as a security mechanism. •


Options: a) ACL = Access Control List b) Root directory c) Both A and B
d) None • Correct Answer: c) Both A and B

Question 67: Which tool is the most versatile security tool for security
checks such as port scanning and firewall testing? • Options: a)
Etherpeek b) Ettercap c) Netcat d) Nmap • Correct Answer: d) Nmap

Question 51: Ethical hacker does not require ______ for effective
operation. • Options: a) Asset to be protected b) Potential Threat Source
c) Support by Organization d) None of the above • Correct Answer: d)
None of the above
Question 57: One example of hackers based on their work and mindset
is: • Options: a) Neat an intrusion prevention system b) Supporting
security c) Promoting pollution in the environment d) None of these •
Correct Answer: d) None of these

Question 36: Encrypted data can be impossible to view without: •


Options: a) Password b) Evidence c) None of the mentioned • Correct
Answer: a) Password

https://play.google.com/store/apps/details?id=com.krrish.managementmcq
ALL MCQs Free Available at https://t.me/management_mcq

Question 38: Illustrative evidence is also called as: • Options: a)


Demonstrative evidence b) Explainable evidence c) Substantial evidence
d) Documented evidence • Correct Answer: a) Demonstrative evidence

Question 57: The planning and reconnaissance phase of penetration


testing in hacking: • Options: a) Defines salary of hacker for testing b)
Defines test goals and intelligence is gathered c) Avoids inspection in
testing phase d) Implements random process in penetration testing •
Correct Answer: b) Defines test goals and intelligence is gathered

Question 52: Which of the following terms suits more to White Hat
Hackers? • Options: a) Former Black Hat b) Former Gray Hat c) Fame
Gainer d) Security Professional • Correct Answer: d) Security Professional

Question 59: DMZ stands for: • Options: a) Cone Zone b) DeMail Zone c)
DoMain Zone d) None • Correct Answer: d) None

Question 55: Guidelines for selecting hacking tools may consist of: •
Options: a) Study the user guide for commercial tools b) Detailed reports
on the discovered vulnerabilities c) Update and support when needed d)
All of these • Correct Answer: d) All of these

Question 64: Which of the following is not a computer networking


device? • Options: a) Router b) Switch c) Firewall d) Generic Host •
Correct Answer: d) Generic Host

Question 31: An EMCI model follows: • Options: a) Every activity occurs


in sequence b) Agile Model c) Spiral Model d) None of these • Correct
Answer: d) None of these

https://play.google.com/store/apps/details?id=com.krrish.managementmcq

You might also like