MCQ Eti
MCQ Eti
**Answer: C**
2. What are the three general categories of computer systems that can contain digital
evidence?
**Answer: D**
B. Communication systems
B. Communication systems
**Answer: C**
B. Communication systems
**Answer: B**
6. What criminological principle states that when someone enters a crime scene, they leave
something and take something?
**Answer: A**
7. Which is not a procedure to establish a chain of custody?
**Answer: C**
C. Encryption
D. None of these
**Answer: B**
A. Strengths
B. Weakness
C. A & B
D. None of these
**Answer: B**
10. Sequential step hackers use are:
**Answer: C**
11. ______ is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering
B. IT Engineering
C. Ethical Hacking
**Answer: A**
**Answer: A**
13. Which tool is used to crack passwords?
A. Nmap
B. LC4
C. ToneLOC
D. Nessus
**Answer: B**
A. WebInspect
B. QualyGuard
**Answer: C**
**Answer: D**
16. A packet with no flags set is what type of scan?
A. TCP
B. XMAS
C. IDLE
D. NULL
**Answer: D**
**Answer: C**
A. 22
B. 80
C. 20
D. 23
**Answer: D**
19. Which Nmap scan does not completely open a TCP connection?
B. TCP scan
D. ACK scan
**Answer: A**