0% found this document useful (0 votes)
46 views3 pages

Assignment 5

The document contains a series of multiple-choice questions related to cybersecurity, machine learning, and network analysis. It covers topics such as hacking tools, data encryption, and the EMCI model. Each question provides four answer options, testing knowledge on various technical concepts and best practices in the field.

Uploaded by

dasmitag147
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views3 pages

Assignment 5

The document contains a series of multiple-choice questions related to cybersecurity, machine learning, and network analysis. It covers topics such as hacking tools, data encryption, and the EMCI model. Each question provides four answer options, testing knowledge on various technical concepts and best practices in the field.

Uploaded by

dasmitag147
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ASSIGNMENT-5

1) Hackers use resources as _________


a) Public computers at Libraries or kiosks
b) Registered website
c) Authorized computer at reception
d) None of these
2) Deep learning is subfield of ________
a) Human Learning
b) Machine Learning
c) Source Learning
d) None of these
3) To determine what evidence to collect first, you should access evidences in ______ order of volatility.

a) Increasing
b) Decreasing
c) Any
d) None of these
4) Which of the following is not a best practice for minimizing security risk
a) Use of encrypted msg
b) Disable unused protocol
c) Use of right software
d) Injection of malware in system
5) Unix is ___________
a) Uniplexed Information and computing service
b) Unique information and computing service
c) User information and computing service
d) Universal information and computing service
6) Most of the wireless vulnerability are in _________
a) 802.09 protocol
b) 802.01 protocol
c) 802.11 protocol
d) 802.10 protocol
7) A _________ is a device that alters the physical quantity as it can cause a mechanical component to
move after getting some input from sensor .
a) Sensors
b) Actuators
c) Both a and b
d) None of the above
8) Encrypted data can be impossible to view without the ______
ASSIGNMENT-5
a) Key
b) Password
c) Evidence
d) None of the mentioned
9) In EMCI Model, ___________ is the phase during which crime is reported to some authority
a) Awareness
b) Planning
c) Storage
d) Collection
10) When Accessing security and responding to security incidents a network analyser can help you
_____.

a) View anomalous networking traffic


b) Develop baseline of network activity
c) Track down a intruder
d) All of above
11) ​ _______ data is a data that is lost if the power is switched off.
a) Non-volatile
b) Volatile
c) Primary
d) Secondary
12) An EMCI model follows ______ as every activity occurs in sequence.
a) Agile model
b) Spiral model
c) Waterfall model
d) None of these
13) Vulnerability is nothing but ________
a) Weakness of a system
b) Strong points of a system
c) Both a & b
d) None

14) Guidelines selecting hacking tools may consists of ___________
a) Study of user guide for commercial tools
b) Detailed reports on the discovered vulnerabilities
c) Updated and supported when needed
d) All of these
15) Digital Evidences must follow the requirements of the _______
a) Ideal Evidence rule
b) Best Evidence rule
ASSIGNMENT-5
c) Exchange rule
d) All of the mentioned
16) Use of Ping sweep is ______
a) Identify live systems
b) Locate live systems
c) Identify open ports
d) Locate firewall
17) Enemies of information security are _____
a) Security researchers
b) Hacktivists
c) Cyber Terrorists
d) All of these
18) Network analyzer performs ____
a) Capture all networking traffic
b) Display it all in chronological order
c) Decode what is found in human readable format
d) All of these
19) DMZ Stands for _____
a) DeMiliterized Zone
b) DeMail Zone
c) DoMain Zone
d) None
20) Device that transforms electrical signals into physical movements ___
a) Sensors
b) Actuators
c) Switches
d) Display

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy