0% found this document useful (0 votes)
27 views2 pages

ETI - 2 Question Bank

The document is a question bank containing multiple-choice questions related to digital evidence, ethical hacking, and network security concepts. It covers definitions, examples of evidence, principles of hacking, tools used in cybersecurity, and types of attacks. Each question provides options for answers, focusing on key terminology and practices in the field of cybersecurity.

Uploaded by

sanchitahiwrale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views2 pages

ETI - 2 Question Bank

The document is a question bank containing multiple-choice questions related to digital evidence, ethical hacking, and network security concepts. It covers definitions, examples of evidence, principles of hacking, tools used in cybersecurity, and types of attacks. Each question provides options for answers, focusing on key terminology and practices in the field of cybersecurity.

Uploaded by

sanchitahiwrale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Question Bank

Q1.A valid definition of digital evidence is:


A) Data stored or transmitted using a computer B) Information of probative value
C) Digital data of probative value D) Any digital evidence on a computer

Q2. Email, hard drives are examples of ____________


A) Illustrative evidence B) Electronic evidence C) Documented evidence D) Explainable evidence

Q3. The evidences or proof can be obtained from the electronic source is called the __________
A) Digital evidence B) Demonstrative evidence C) Explainable evidence D) Substantial evidence

Q4. Blood, fingerprints, DNA these are examples of____________


A) Digital evidence B) Demonstrative evidence C) Explainable evidence D) Substantial evidence

Q5. When an incident takes place, a criminal will leave hint evidence at the scene and remove a hint from the
scene which is called as ____________
A) Locard’s Exchange principle B) Anderson’s Exchange principle
C) Charles’s Anthony principle D) Kevin Ashton principle

Q6. ________ is known as testimonial.


A) Oath affidavit B) DNA samples C) Fingerprint D) Dried blood

Q7. Video surveillance can be a form of digital evidence.


A) True B) False

Q8. Rule of evidence is also known as __________


A) Law of witness B) Law of litigation C) Law of evidence D) All of the above

Q9. Ethical Hacking is also known as _____


A) Black Hat Hacking B) White Hat Hacking C) Encryption D) None of
these

Q10. Vulnerability scanning in Ethical hacking finds _____.


A) Strengths B) Weakness C) A &B D) None of these

Q11. Sequential step hacker’s uses are: _ _ _ _.


A. Maintaining Access B. Reconnaissance C. Scanning D. Gaining Access.
A) B, C, D, A B) B, A, C, D C) A, B, C, D D) D, C, B, A

Q12. Connecting into network through a rogue modem attached to computer behind a firewall is an example
of ____
A) Nontechnical attacks B) Network infrastructure attack C) Operating system attack
D) Application and other specialized attack

Q13. Before performing any penetration test, through legal procedure, which key points listed below is not
mandatory?
A) Know the nature of the organization B) Characteristics of work done in the firm
C)System and network D) Type of broadband company used by the firm

Q14. _______ comprise of large portion of hacker attacks simply because every computer has one and so well
know exploits can be used against them.
A) Nontechnical attacks B) Network infrastructure attack

C) Operating system attack D) Application and other specialized attack


Q15. Which tool is used to encrypt Email?
A) WebInspect B) QualyGuard C) PGP (pretty good privacy) D) None of the above.

Q16. Who described a dissertation on fundamentals of hacker’s attitude?


A) G. Palma B) Raymond C) Either D) Jhon
Browman

Q17. Which tool is used to crack the password?


A) Nmap B) LC4 C) ToneLOC D) Nessus

Q18. Attempting to gain access to a network using an employee’s credentials is called the mode of ethical
hacking
A) Local networking B) Social engineering C) Physical entry D) Remote networking

Q19. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes? SamSpade B) SuperScan C) NetScan D) Netcat

Q20. Which of the following tools is used for Networks Testing and port Scanning
A) NetCat B) SuperScan C) NetScan D) All of Above

Q21. Why would a ping sweep be used?


A) To identify live systems B) To locate live systems C) To identify open ports

D) To locate firewalls

Q22. Which phase of hacking performs actual attack on a network or system?


A) Reconnaissance B) Maintaining Access C) Scanning D) Gaining Access

Q23.When a hacker attempts to attack host via the internet it is known as what type of attack?
A) Local access B) Remote attack C) Internal attack D) Physical access

Q24. IDS stands for ____


A) Intrusion detection system B) Information documentation service
C) Intrusion documentation system D) None of above

Q25. What is the purpose of a Denial of Service attack?


A) Exploit a weakness in the TCP/IP stack B) To execute a Trojan on a system
C) To overload a system so it is no longer operational
D) To shutdown services by turning them off

You might also like