47. These types of
hackers are the most skilled hackers in the hackers’ community. Who are
“they” referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration
Testers
d) Red Hat Hackers
Answer: b
48. _________ are
those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security
Interns
c) Software Security
Specialist
d) Security Auditor
Answer: a
49. Role of security
auditor is to ____________
a) secure the network
b) probe for safety and
security of organization’s security components and systems
c) detects and prevents
cyber attacks and threats to organization
d) does penetration
testing on different web applications
Answer: b
50. Having a
member of the search team trained to handle digital evidence:
a. Can reduce
the number of people who handle the evidence b. Can serve to
streamline the presentation of the case c. Can reduce
the opportunity for opposing counsel to impugn the integrity of the Evidence d. All of the above
51. An attorney
asking a digital investigator to find evidence supporting a particular line
of Inquiry is an example of: a. Influencing the examiner b. Due
diligence c. Quid pro quo
d. Voir dire
52. A digital
investigator pursuing a line of investigation in a case because that line
of Investigation proved successful
in two previous cases is an example of: a.
Logical reasoning b. Common sense
c.
Preconceived
theory d. Investigator’s
intuition
53. A scientific
truth attempts to identify roles that are universally true. Legal judgment,
on The other hand, has a standard of
proof in criminal prosecutions of: a.
Balance of probabilities b. Beyond a reasonable doubt c.
Acquittal d. None of the
above
54. Regarding
the admissibility of evidence, which of the following is not a consideration: a.
Relevance b. Authenticity
c.
Best evidence d. Nominally prejudicial
55. According to
the text, the most common mistake that prevents evidence seized from Being admitted is: a.
Uninformed consen b. Forcible
entry c.
Obtained
without authorization d. None of the
above 56. In obtaining
a warrant, an investigator must convince the judge on all of the following Points except: a.
Evidence of a crime is in existence b. A crime has
been committed c.
The owner or
resident of the place to be searched is likely to have committed The crime d. The evidence
is likely to exist at the place to be searched
57. If, while
searching a computer for evidence of a specific crime, evidence of a new, Unrelated crime is discovered, the best
course of action is: a.
Abandon the original search, and pursue the new line of
investigation b. Continue
with the original search but also pursue the new inquiry c.
Stop the
search and obtain a warrant that addresses the new inquiry d. Continue
with the original search, ignoring the new information
58. The process
of documenting the seizure of digital evidence and, in particular, when
that Evidence changes hands, is
known as: a.
Chain of
custody b. Field notes c.
Interim report d. None of the
above
59. Evidence
contained in a document provided to prove that statements made in court
are True is referred to as: a.
Inadmissible evidence b. Illegally
obtained evidence c.
Hearsay
evidence d. Direct
evidence 60. Digital
forensics is all of the except:
A. Extraction of computer data. B. Preservation
of computer data. C. Interpretation
of computer data. D. Manipulation
of computer data. Ans:D
61. IDIP stands for
A. Integrated
Digital Investigation Process. B. Integrated
Data Investigator Process. C. Integrated
Digital Investigator Process. D. Independent
Digital Investigator Process. Ans: A 62. Who proposed Road Map for
Digital Forensic Research (RMDFR) A. G.Gunsh.
B. S.Ciardhuain C. J.Korn. D. G.Palmar Ans: D
63. Investigator
should satisfy following points: A. Contribute to society and human being. B. Avoid harm
to others. C. Honest and
trustworthy. D. All of the
above Ans: D 64. In the past, the method for expressing an opinion
has been to frame a ____ question based on available factual evidence. A. Hypothetical
B. Nested C. Challenging
D. Contradictory
Ans: A
65. More subtle
because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email A. The purpose
of copyright B. Danger of
macro viruses C. Derivative
works D. computer-specific
crime Ans: B
66. There are
three c's in computer forensics. Which is one of the three? A. Control B. Chance C. Chains D. Core Ans: A
67.
When
Federal Bureau Investigation program was created? A.1979 B.1984 C.1995 D.1989 Ans: B
68.
When the
field of PC forensics began? A.1960's
B.1970's C.1980's D.1990's Ans: C
69.
_______phase
includes putting the pieces of a digital puzzle together and developing
investigative hypotheses A. Preservation
phase B. Survey
phase C. Documentation
phase D. Reconstruction
phase E. Presentation
phase Ans: D
70. What is Artificial intelligence? (A) Putting
your intelligence into Computer (B) Programming
with your own intelligence (C) Making a Machine intelligent (D) Playing a
Game Ans: C
71. Which is not the commonly used programming language
for AI? (A)
PROLOG (B)
Java
(C)
LISP
(D)
Perl Ans: D 72. What is state space? (A) The whole
problem (B) Your
Definition to a problem (C) Problem you
design (ÄŽ)
Representing your problem with variable and parameter Ans: D 73. A production rule consists of (A) A set of Rule (B) A sequence of steps (C) Both (a)
and (b) (D) Arbitrary representation to problem
Ans: C 74. Which search method takes less memory? (A) Depth-First
Search (B) Breadth-First search (C) Both (A) and (B) (D) Linear Search. Ans: A 75.A heuristic is a way of trying (A) To discover
something or an idea embedded in a program (B) To search
and measure how far a node in a search tree seems to be from a goal (C)
To compare two nodes in a search tree to see if one is
better than the other (D) Only (a), (b) and (c). Ans: D 76. A* algorithm is based on (A) Breadth-First-Search (B) Depth-First –Search (C)
Best-First-Search (D) Hill climbing.
Ans: C 77. Which is the best way to go for Game playing
problem? (A) Linear approach (B)
Heuristic approach (C) Random approach (D) Optimal approach
Ans: B
78. How do you represent “All dogs have tails”. (A) Û·x:
dog(x)à hastail(x) (B) ۷x: dog(x)à hastail(y) (C) ۷x: dog(y)à hastail(x) (D) ۷x: dog(x)à hasà tail(x) Ans: A 79. Which is not a property of representation of
knowledge? (A) Representational Verification (B)
Representational Adequacy (C)
Inferential Adequacy (D) Inferential Efficiency Ans: A
80. Embedded systems are_____ A. General purpose B. Special purpose Ans: B 81. Embedded system is______ A. An electronic system B. A pure mechanical system C. An electro-mechanical system D. (A) or (C) Ans: D 82. Which of the following is not true about embedded systems? A. Built around specialized hardware B. Always contain an operating system C. Execution behavior may be deterministic D. None of these Ans: D 83. Which of the following is not an example of a “small-scale embedded system”? A. Electronic Barbie doll B. Simple calculator C. Cell phone D. Electronic toy car Ans: C 84. The first recognized modern embedded system is A. Apple computer B. Apollo Guidance Computer (AGC) C. Calculator D. Radio navigation system Ans: B 85. The first mass produced embedded system is A. Minuteman-I B. Minuteman-II C. Autonetics D-17 D. Apollo Guidance Computer (AGC) Ans: C 86. Which of the following is an (are) an intended purpose(s) of embedded systems? A. Data collection B. Data processing C. Data communication D. All of these Ans: D 87. Which of the following is (are) example(s) of embedded system for data communication? A. Network router B. Digital camera C. Music player D. All of these Ans: B 88. What are the essential tight constraint/s related to the design metrics of an embedded system? A. Ability to fit on a single chip B. Low power consumption C. Fast data processing for real-time operations D .All of the above Ans: D 89. A digital multi meter is an example of an embedded system for A. Data communication B. Monitoring C. Control D. All of these Ans: B 90. Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data. Ans:D 91. IDIP stands for (A) Integrated Digital Investigation Process. (B) Integrated Data Investigator Process. (C) Integrated Digital Investigator Process. (D)Independent Digital Investigator Process. Ans: A 92. Who proposed Road Map for Digital Forensic Research (RMDFR) (A) G.Gunsh. (B) S.Ciardhuain (C) J.Korn. (D) G.Palmar Ans: D 93. Investigator should satisfy following points: (A) Contribute to society and human being. (B) Avoid harm to others. (C) Honest and trustworthy. (D) All of the above Ans: D 94. In the past, the method for expressing an opinion has been to frame a ____ question based on available factual evidence. (A) Hypothetical (B) Nested (C) Challenging (D) Contradictory Ans: A 95. More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime Ans: B 96. There are three c's in computer forensics. Which is one of the three? (A) Control (B) Chance (C) Chains (D) Core Ans: A 97. When Federal Bureau Investigation program was created? (A) 1979 (B) 1984 (C) 1995 (D) 1989 Ans: B 98. When the field of PC forensics began? (A) 1960's (B) 1970's (C) 1980's (D) 1990's Ans: C 99. What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation (C) process where we develop and test hypotheses that answer questions about digital events (D) Use of science or technology in the investigation and establishment of the facts or evidence in a court of law Ans: B
100. A valid definition of digital evidence is: A.
Data stored or transmitted using a computer B.
Information of probative value C.
Digital
data of probative value D.
Any digital evidence on a computer Ans: C 101. What are the three general categories of computer
systems that can contain digital evidence?
A.
Desktop, laptop, server B.
Personal computer, Internet, mobile telephone C.
Hardware, software, networks D.
Open
computer systems, communication systems, and embedded systems Ans: D 102. In terms of digital evidence, a hard drive is an
example of: A.
Open
computer systems B.
Communication systems C.
Embedded computer systems D.
None of the above Ans: A 103. In terms of digital evidence, a mobile telephone is
an example of: A.
Open computer systems B.
Communication systems C. Embedded computer systems D.
None of the above Ans: C 104. In terms of digital evidence, a Smart Card is an
example of: A.
Open computer systems B.
Communication systems C.
Embedded
computer systems D.
None of the above Ans: C 105. In terms of digital evidence, the Internet is an
example of: A.
Open computer systems B.
Communication
systems C.
Embedded computer systems D.
None of the above Ans: B 106. Computers can be involved in which of the following
types of crime? A. Homicide
and sexual assault B. Computer
intrusions and intellectual property theft C. Civil
disputes D. All the above Ans: D 107. A logon record tells us that, at a specific time: A.
An unknown person logged into the system using the
account B.
The owner of a specific account logged into the system
C.
The account
was used to log into the system D.
None of the above Ans: C 108. Cyber trails are advantageous because: A.
They are not connected to the physical world. B.
Nobody can be harmed by crime on the Internet. C.
They are easy to follow. D. Offenders who are unaware of them leave behind more
clues than they otherwise would have. Ans: D 109. Private networks can be a richer source of
evidence than the Internet because: A.
They retain
data for longer periods of time. B.
Owners of private networks are more cooperative with
law enforcement. C.
Private
networks contain a higher concentration of digital evidence. D.
All the above. Ans: C 110. Ethical Hacking is also known as _____ A. Black
Hat Hacking. B.
White Hat Hacking. C.
Encryption. D.
None of these. Ans. B 111. Tool(s) used by ethical hacker_____. A. Scanner B. Decoder C. Proxy D. All of these. Ans. D 112. Vulnerability scanning in Ethical hacking finds_____. A.
Strengths. B.
Weakness. C.
A &B D.
None of these. Ans. B 113. Ethical hacking will allow to____ all the massive security breaches. A. Remove. B.
Measure. C.
Reject. D.
None of these. Ans. B 114. Sequential step hackers use are: _ _ _ _. A.
Maintaining Access. B. Reconnaissance
C.
Scanning. D.
Gaining Access. A.
B, C, D, A B.
B, A, C, D C.
A, B, C, D D.
D, C, B, A Ans. A 115. ______ is the art of exploiting the human elements
to gain access to the authorized user. A.
Social
Engineering. B.
IT Engineering. C.
Ethical Hacking. D.
None of the above. Ans. A 116. Which hacker refers to ethical hacker? A. Black
hat hacker. B.
White hat hacker. C.
Grey hat hacker. D.
None of the above. Ans. B 117. The term cracker refers to_____ A. Black hat hacker. B.
White hat hacker. C.
Grey hat hacker. D.
None of the above. Ans. A 118. Who described a dissertation on fundamentals of hacker’s attitude? A. G.
Palma. B.
Raymond. C.
Either. D.
Jhon Browman. Ans. B 119.Computer Hackers have been in existence for more
than a____. A. Decade. B.
Year. C.
Century D.
Era.
Ans. C
120. SNMP stands for_____ A.
Simple Network Messaging Protocol B.
Simple Network Mailing Protocol C.
Simple
Network Management Protocol D.
Simple Network Master Protocol Ans: C 121. Which of the following tool is used for Network
Testing and port Scanning______
A. NetCat B. SuperScan C. NetScan D. All of above Ans: D
122. Banner grabbing is used for A.
White Hat
Hacking B.
Black Hat Hacking C.
Grey Hat Hacking D.
Script Kiddies Ans: A 123. An attacker can create an________attack by sending
hundreds or thousands of e-mails a with
very large attachments. A.
Connection Attack B.
Auto
responder Attack C.
Attachment Overloading Attack D.
All the above Ans: B 124. Which of the following tool is used for Windows for
network queries from DNS lookups to
trace routes?
A.
Sam
Spade B.
SuperScan C. NetScan D.
Netcat Ans: A 125. Which tool is used for ping sweeps and port
scanning? A.
Netcat B.
SamSpade C.
SuperScan D.
All the above Ans: C 126. Which of the following tool is used for security
checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data
communication D. Netscan Ans: A
127. What is the most important activity in system
cracking? A.
Information gathering B.
Cracking
password C.
Escalating privileges D.
Covering tracks Ans: B 128. Which Nmap scan is does not completely open a TCP
connection? A.
SYN stealth
scan B.
TCP scan C.
XMAS tree scan D.
ACK scan Ans: A 129.Key loggers are form of A.
Spyware B.
Shoulder
surfing C.
Trojan D.
Social engineering
Ans: A
130.is a branch of science which deals with helping machine find solution to complex to problem in a more human like a fashion. (a) Artificial intelligence (b) Internet of think (c) Embided system (d) Cyber security 131. Is a message that consist relavat meaning , implication , or input for decision and or action. (a) Data (b) Information (c) Knowledge (d) Intelligence 132. The goal is for the software to use what is it is was learned in one area to solve problem in other area. (a) Machine learning (b) Deep learning (c) Neural network (d) All of above 133. What is
Digital Forensic? a. Process of
using scientific knowledge in analysis and presentation of evidence in court b. The
application of computer science and investigative procedures for a legal
purpose involving the analysis of digital evidence after proper search
authority, chain of custody, validation with mathematics, use of validated
tools, repeatability, reporting, and possible expert presentation c. A process
where we develop and test hypotheses that answer questions about digital events
d.
Use of science or technology in the investigation and
establishment of the facts or evidence in a court of law
134. Digital
forensics is all of them except: a. Extraction
of computer data. b. Preservation
of computer data. c. Interpretation
of computer data. d. Manipulation
of computer data.
135. Which of the
following is NOT focus of digital forensic analysis? a. Authenticity
b. Comparison c. Proving
d. Enhancement
136. Which of the
following represents the step of scientific method? I- Develop
hypothesis based on evidence II- Calculate
hash value of evidence III- Test the
hypothesis to look for additional evidence IV-make an imaging of the original evidence a. I and IV b. I
and II c. II, III and
IV d. All of above
137 What is the
Primary Objectives of Digital Forensic for Business and Industry? a. Availability
of service b. Prosecution c. Continuity
of operation d. Security
138. Which of the
following is FALSE? a. The digital
forensic investigator must maintain absolute objectivity b. It
is the investigator’s job to determine someone’s guilt or innocence. c. It is the
investigator’s responsibility to accurately report the relevant facts of a
case. d. The
investigator must maintain strict confidentiality, discussing the results of an
investigation
on only a “need to know”
139. which is
following father of computer forensics a. M.
Anderson b. G. Gunsh c. S.
Ciardhuain d. G. Palmar
140. Who proposed
Road map model? a. G. Gunsh b. S. Ciardhuain
c. J. Korn d. G.
Palmar
141. IDIP stands
for a. Integrated
Digital Investigation Process b. Integrated
Data Investigation Process c. Integrated
Digital Investigator Process d. Independent
Digital Investigation Process
142. When you
give ____ testimony, you present this evidence and explain what it is and how
it was obtained. a.
technical/scientific b.
expert c.
lay witness d.
deposition
143. A valid
definition of digital evidence is: a. Data stored
or transmitted using a computer b. Information
of probative value c. Digital data of probative value d. Any digital
evidence on a computer
144. What are the
three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal
computer, Internet, mobile telephone c. Hardware,
software, networks d. Open computer systems, communication systems,
embedded systems
145. In terms of
digital evidence, a hard drive is an example of: a. Open computer systems b. Communication
systems c. Embedded
computer systems d. None of the
above
146. In terms of
digital evidence, a mobile telephone is an example of: a. Open
computer systems b. Communication
systems c. Embedded computer systems d. None of the
above
147. In terms of
digital evidence, a Smart Card is an example of: a. Open
computer systems b. Communication
systems c. Embedded computer systems d. None of the
above
148. Digital
evidence alone can be used to build a solid case. a. True b. False
149. Personal
computers and networks are often a valuable source of evidence. Those involved
with _______ should be comfortable with this technology. a.
Criminal investigation b.
Prosecution c.
Defense work d.
All
of the above
150. An
argument for including computer forensic training computer security
specialists is: a.
It provides an additional credential. b. It
provides them with the tools to conduct their own investigations. c.
It
teaches them when it is time to call in law enforcement. d. None
of the above. 151. Digital
evidence is only useful in a court of law. a. True b. False
152. In terms of
digital evidence, the Internet is an example of: a. Open
computer systems b. Communication systems c. Embedded
computer systems
d. None of the
above
|