MSBTE Emerging Trend Diploma I Scheme MCQ
![]() |
ETI 22618 mcq | Emerging Trend Diploma MSBTE mcq | TotalProgrammingCode |
Q1.When the Federal Bureau of investigation was create ?.
A)1900
B)1980
C)19450
D)1984
Q2.What is The Full form of CART
A)Computer Analysis and Response Team
B) Cathode Analog Ray Tube
C)Computer Accessories Repairing team
D)None
Q3 When IOCE is Formed
A)1992
B)1980
C)19490
D)1995
Q4Full Form Of IOCE
A)International Organization on Computer Evidence
B)Internet of Computer Education
C) Internet of Computer Evidence
D)None
Q5When was the first FBI Regional Computer Forensic laboratory was
Recognize ?.
A)1992
B)1980
C)19490
D)2000
Q6How Many Rules in Digital
forensic
A)12
B)19
C)10
D)6
Q7. A valid
definition of digital evidence is:
a. Data stored
or transmitted using a computer
b. Information
of probative value
c. Digital data of probative value
d. Any digital
evidence on a computer
Q8 How Many Phases in RDMDFR
A)12
B)19
C)10
D)6
Q9 Investigator should satisfy the following point:
A)Contribute to the society and human being
B)Avoid harm to others
C)honest and trustworthy
D)All Of the Above
Q10 Who proposed Road Map Model
A)G. Gunsh
B)S. Ciardhuain
C)J. Korn
D)G. Palmar
Q11 Which of the following is not type
of volatile evidence:
A)Routing Tables
B) Main Memory
C)Log Files
D) Cached Data
Q12 Digital Evidence must follow the requirement of the
A)Ideal Evidence Rule
B)Best Evidence Rule
C)Exchange Rule
D)All of the mentioned
Q13 White hat Hacker is known as the
A)Cracker
B)Ethical
C)Grey Hat
D)Script Kiddies
Q14 What is an grey hat hacker
A)Black Hat Hacker
B)White Hat Hacker
C)Combination of White and black hat hackers
D)None
Q15 A Hacker who identifies and exploits weakness in telephones
instead of computers is known as:
A)Phreaker
B)Hacktivist
C)Ethical hacker
D)Grey Hat hacker
Q16 Long Form of the VPN
A)Virtual Private Network
B)Virtual Personal Network
C)Both
D)None
Q17 Who are use their skill to identify security problem with
computer network
A)Black Hat Hacker
B)Ethical Hacker
C)Grey Hat hacker
D)Script Kiddies
Q18 To crack the password you need cracking tool such as:
A)LC4
B)John The Ripper
C)pwdump
D)All of the above
Q19 NMAP known as:
A)Network Mapper
B)NetCat
C)SuperScan
D)NetScan
20. An Artificial Intelligence system
developed by Terry A. Winograd to permit an interactive dialogue about a domain
he called blocks-world.
a. SIMD
b. STUDENT
c. SHRDLU
d. BACON
21. What is Artificial intelligence?
a. Programming
with your own intelligence
b. Putting
your intelligence into Computer
c.Making
a Machine intelligent
d.Playing a Game
22. Who is the “father” of artificial
intelligence?
a.John McCarthy
b. Fisher Ada
c. Allen
Newell
d.Alan Turning
23.Which of the following is a proposed means
of testing the intelligence of the machine? Turing TestTurning TestTuning Test
a.Turing Test
b.Turning Test
c.Tuning Test
d.None
24.Which of the following
is not a component of a production system?
a.Control System
b.Associative Memory
c.Primary Memory
d.Secondary Memory
25. Zero sum game has player…
a. seven
b. Two
c.three player
d. Multiplayer
26.Which one is used for compute the logical
inference algorithm? a. Validity
b.Satisfiability
c. Logical equivalence
d.All of these
27.Single inference rule also called…
a. Resolution
b. Reference
c.Reference
d.None of these
28.Factoring means…
a.Removal of redundant
literal
b.Removal of redundant variable
c.Addition of redundant
variable
d.Addition of redundant
literal
29. Which of the following statements best describes a white-hat hacker?
• A.
Security professional
• B.
Former black hat
• C.
Former grey hat
• D. Malicious hacker
Answer 1. Option A.
30. A security audit performed on the internal network of an organization by the
network administration is also known as ___________.
• A.
Grey-box testing
• B.
Black-box testing
• C.
White-box testing
• D.
Active testing
• E.
Passive testing
Answer 2. Option C..
31. What is the first phase of hacking?
• A.
Attack
• B. Maintaining access
C.
Gaining access
• D.
Reconnaissance
• E.
Scanning
Answer
3. Option D.
32. What type of ethical hack tests access to the physical infrastructure?
• A.
Internal network
• B.
Remote network
• C.
External network
• D.
Physical access
Answer
4. Option D
33. The security, functionality, and ease of use triangle illustrates which
concept?
• A.
As security increases, functionality and ease of use increase.
• B.
As security decreases, functionality and ease of use increase.
• C.
As security decreases, functionality and ease of use decrease.
• D. Security does not affect functionality and ease of use.
Answer 5. Option B.
34. Which type of hacker represents the highest risk to your network?
• A.
Disgruntled employees
• B.
Black-hat hackers
• C.
Grey-hat hackers
• D.
Script kiddies
Answer
6. Option A.
35. What are the three phases of a security evaluation plan? (Choose three
answers.)
• A.
Conduct Security Evaluation
• B.
Preparation
• C.
Conclusion
• D.
Final
• E. Reconnaissance
F. Design Security
• G. Vulnerability Assessment
Answer 7. Options A, B,
C.
36. Hacking for a cause is called __________________.
• A.
Active hacking
• B.
Hacktivism
• C.
Activism
• D. Black-hat hacking
Answer 8. Option B.
37. Which federal law is most commonly used to prosecute hackers?
• A.
Title 12
• B.
Title 18
• C.
Title 20
• D.
Title 2 Answer 9. Option B.
38. When a hacker attempts to attack a host via the Internet it is known as
what type of attack?
• A.
Remote attack
• B.
Physical access
• C.
Local access
• D.
Internal attack
Answer
10. Option A.
39. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hackers Answer: b
40. Which is the legal form of hacking based on which jobs are
provided in IT industries and firms? a) Cracking b) Non ethical Hacking c) Ethical hacking d) Hactivism Answer: c 41. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers Answer: d 42. ________ are the combination of both white as well as black hat hackers. a) Grey Hat hackers b) Green Hat hackers c) Blue Hat Hackers d) Red Hat Hackers Answer: a
|