0% found this document useful (0 votes)
15 views12 pages

MCQ Eti

The document contains multiple choice questions related to Emerging Trends in Computer & Information Technology, focusing on digital evidence, ethical hacking, and network security. It covers definitions, principles, tools, and techniques relevant to computer systems and hacking practices. Each question is followed by the correct answer, providing a comprehensive overview of the subject matter.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views12 pages

MCQ Eti

The document contains multiple choice questions related to Emerging Trends in Computer & Information Technology, focusing on digital evidence, ethical hacking, and network security. It covers definitions, principles, tools, and techniques relevant to computer systems and hacking practices. Each question is followed by the correct answer, providing a comprehensive overview of the subject matter.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Subject Name : Emerging Trends In Computer & Information Technology

Multiple Choice Questions from ETI-Unit4-5-6

1. A valid definition of digital evidence is:

A. Data stored or transmitted using a computer

B. Information of probative value

C. Digital data of probative value

D. Any digital evidence on a computer

**Answer: C**

2. What are the three general categories of computer systems that can contain digital
evidence?

A. Desktop, laptop, server

B. Personal computer, Internet, mobile telephone

C. Hardware, software, networks

D. Open computer systems, communication systems, and embedded systems

**Answer: D**

3. In terms of digital evidence, a hard drive is an example of:

A. Open computer systems

B. Communication systems

C. Embedded computer systems

D. None of the above


**Answer: A**

4. In terms of digital evidence, a mobile telephone is an example of:

A. Open computer systems

B. Communication systems

C. Embedded computer systems

D. None of the above

**Answer: C**

5. In terms of digital evidence, the Internet is an example of:

A. Open computer systems

B. Communication systems

C. Embedded computer systems

D. None of the above

**Answer: B**

6. What criminological principle states that when someone enters a crime scene, they leave
something and take something?

A. Locard’s Exchange Principle

B. Differential Association Theory

C. Beccaria’s Social Contract

D. None of the above

**Answer: A**
7. Which is not a procedure to establish a chain of custody?

A. Save the original materials

B. Take photos of physical evidence

C. Don’t take screenshots of digital evidence content

D. Document date, time, and any other information of receipt

**Answer: C**

8. Ethical Hacking is also known as:

A. Black Hat Hacking

B. White Hat Hacking

C. Encryption

D. None of these

**Answer: B**

9. Vulnerability scanning in Ethical hacking finds:

A. Strengths

B. Weakness

C. A & B

D. None of these

**Answer: B**
10. Sequential step hackers use are:

A. Maintaining Access, Reconnaissance, Scanning, Gaining Access

B. Reconnaissance, Maintaining Access, Scanning, Gaining Access

C. Reconnaissance, Scanning, Gaining Access, Maintaining Access

D. Gaining Access, Scanning, Reconnaissance, Maintaining Access

**Answer: C**

11. ______ is the art of exploiting the human elements to gain access to the authorized user.

A. Social Engineering

B. IT Engineering

C. Ethical Hacking

D. None of the above

**Answer: A**

12. The term "cracker" refers to:

A. Black hat hacker

B. White hat hacker

C. Grey hat hacker

D. None of the above

**Answer: A**
13. Which tool is used to crack passwords?

A. Nmap

B. LC4

C. ToneLOC

D. Nessus

**Answer: B**

14. Which tool is used to encrypt Email?

A. WebInspect

B. QualyGuard

C. PGP (Pretty Good Privacy)

D. None of the above

**Answer: C**

15. Performing a shoulder surfing to check someone’s password is:

A. A good ethical practice

B. Not so good ethical practice

C. Very good social engineering

D. A bad ethical practice

**Answer: D**
16. A packet with no flags set is what type of scan?

A. TCP

B. XMAS

C. IDLE

D. NULL

**Answer: D**

17. What does SNMP stand for?

A. Simple Network Messaging Protocol

B. Simple Network Mailing Protocol

C. Simple Network Management Protocol

D. Simple Network Master Protocol

**Answer: C**

18. What port does Telnet use?

A. 22

B. 80

C. 20

D. 23

**Answer: D**
19. Which Nmap scan does not completely open a TCP connection?

A. SYN stealth scan

B. TCP scan

C. XMAS tree scan

D. ACK scan

**Answer: A**

20. What is the purpose of Denial of Service attacks?

A. Exploit weakness in TCP/IP stack

B. Execute a Trojan horse on a system

C. Overload a system to render it non-operational

D. Shut down services by turning them off

21. Phishing is a form of:


A. Spamming
B. Identity Theft
C. Impersonation
D. Scanning
Answer: C
22 Wireshark is a:
A. Network protocol analysis tool
B. Network connection security tool
C. Connection analyzer
D. Packet filter
Answer: A
22. Which of the following is not a characteristic of ethical hacker? A.
Excellent knowledge of Windows
B. Understands network vulnerabilities
C. Patience, persistence, and perseverance
D. Has the highest level of security for the organization
Answer: D
23. Which protocol is vulnerable and widely used?
A. TCL
B. SSL
C. FTP
D. SMTP
Answer: B
24. IDS stands for:
A. Intrusion Detection System
B. Internal Data Sync
C. Information Detection System
D. Intranet Defense Service
Answer: A
25. The first phase of hacking is:
A. Availability compromise
B. Integrity compromise
C. Confidentiality compromise
D. Authentication breach
Answer: C
26. The hacker type that represents the highest risk to your network:
A. Black-hat hacker
B. Grey-hat hacker
C. Script kiddies
D. Disgruntled employees
Answer: D
27. A rogue access point mimicking a legit one is called:
A. ARP Poisoning
B. Evil Twin
C. Session Hijacking
D. MAC Spoofing
Answer: B
28. What is used to identify live systems in a network?
A. Port scan
B. Ping Sweep
C. Traceroute
D. ARIN Lookup
Answer: B
29. Which scanning type is not part of the three main scanning types?
A. Network scanning
B. Vulnerability scanning
C. Interactive scanning
D. Port scanning
Answer: C
30. What framework enables easy point-and-click vulnerability cracking?
A.Net
B.Metasploit
C.Zeus
D. Ettercap
Answer: B
31. What is used for SNMP enumeration?
A. IP Network Browser
B. Whois
C. Nslookup
D. ARP Monitor
Answer: A
32. Tool that performs network analysis in multiprotocol environments:
A. Snort
B. SuperScan
C. Burp Suite
D. EtterPeak
Answer: D
33. The hacking act of leaking company data without permission is:
A. Legal if accidental
B. Criminal offense
C. Best practice if intent is good
D. Not covered under IT law
Answer: B
34. What is the best reason for proxy server usage by hackers?
A. Faster network access
B. Hiding malicious activity
C. To create ghost servers
D. Improving access to logs
Answer: B
35. A hacker trying to gain visibility for a political cause is a:
A. Black-hat
B. Activist
C. Hacktivist
D. Grey-hat
Answer: C
36. Which protocol is mainly used for network monitoring?
A. FTP
B. SNMP
C. RELNET
D. ARP
Answer: B
37. Which scanning method does Nmap use that avoids full connection?
A. SYN stealth scan
B. Full TCP scan
C. UDP scan
D. Banner grabbing
Answer: A
38. What type of evidence includes email and hard drives?
A. Illustrative evidence
B. Electronic evidence
C. Documented evidence
D. Explainable evidence
Answer: B
39. Which of the following is used to find weaknesses in systems?
A. Hacker
B. Social Engineer
C. Developer
D. None of the above
Answer: A

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy