Eti Question Bank Ptt2
Eti Question Bank Ptt2
1. The criminological principle which states that, when anyone, or anything, enters a crime scene he/she
takes something of the scene with him/her, and leaves something of himself/herself behind, is:
A. Locard’s Exchange Principle
B. Differential Association Theory
C. Beccaria’s Social Contract
D. None of the above
11. The process of documenting the seizure of digital evidence and, in particular, when that Evidence
changes hands, is known as:
A. Chain of custody
B. Field notes
C. Interim report
D. None of the above
19. During which phase of the Abstract Digital Forensic Model is the integrity and security of evidence
maintained?
A.Identification
B. Preservation
C. Collection
D. Examination
20. Which model does the Extended Model of Cybercrime Investigation (EMCI) follow?
A. Agile model
B. Waterfall model
C. Spiral model
D. Scrum model
24. Which of the following is NOT a common hashing algorithm used in forensics?
A. MD5
B. SHA-1
C. AES
D. SHA-256
29. Which type of malware locks users out of their system and demands payment?
A. Spyware
B. Ransomware
C. Rootkit
D. Keylogger
3. ______ is the art of exploiting the human elements to gain access to the authorised user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
D. None of the above
7. __________has now evolved to be one of the most popular automated tools for unethical hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
9. _____________ is the technique used in business organisations and firms to protect IT assets.
A. Ethical hacking
B, Unethical hacking
C. Fixing bugs
D. Internal data-breach
17. When a hacker attempts to attack a host via the Internet it is known as what type of attack?
A. Local access
B. Remote attack
C. Internal attack
D. Physical access
2. Which of the following tool is used for Network Testing and port Scanning______
A. NetCat
B. SuperScan
C. NetScan
D. All of above
4. An attacker can create an________attack by sending hundreds or thousands of e-mails a with very large
attachments.
A. Connection Attack
B. Auto responder Attack
C. Attachment Overloading Attack
D. All the above
5. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
11. Performing hacking activities with the intent on gaining visibility for an unfair situation is called
________.
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
12. Which type of hackers are invited by the software vendors to find the security flaws in their system?
A. White hat hackers
B. Black hat hackers
C. Grey hat hackers
D. Blue hat hackers
13. Select the most appropriate option for the below two statements.
I. A Dos attack can take down your internet connection
II. A Dos attack can take down your entire system
A. Both I and II are true
B. I is true II is false
C. I is false II is True
D. Both I and II are false
15. Which attack allows the attacker to execute the scripts on the victim’s browser?
A. SSL attack
B. Cookie attack
C. Banner grabbing
D. XSS attack
16. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
19. _________is used for searching multiple hosts in order to target just one specific open port.
A. Ping Sweep ‘
B. Port scan
C. Ipconfig
D. Spamming
20. ARP spoofing is often referred to as
A. Man-in-the-Middle attack
B. Denial-of-Service attack
C. Sniffing
D. Spoofing
21. What type of hacker uses hacking for political or social reasons?
A. Script Kiddie
B. Cyber Terrorist
C. Hacktivist
D. Grey Hat Hacker
23. Which tool is used for penetration testing and ethical hacking?
A. Metasploit
B. Photoshop
C. Microsoft Word
D. AutoCAD