ETI - 2 Question Bank
ETI - 2 Question Bank
Q3. The evidences or proof can be obtained from the electronic source is called the __________
A) Digital evidence B) Demonstrative evidence C) Explainable evidence D) Substantial evidence
Q5. When an incident takes place, a criminal will leave hint evidence at the scene and remove a hint from the
scene which is called as ____________
A) Locard’s Exchange principle B) Anderson’s Exchange principle
C) Charles’s Anthony principle D) Kevin Ashton principle
Q12. Connecting into network through a rogue modem attached to computer behind a firewall is an example
of ____
A) Nontechnical attacks B) Network infrastructure attack C) Operating system attack
D) Application and other specialized attack
Q13. Before performing any penetration test, through legal procedure, which key points listed below is not
mandatory?
A) Know the nature of the organization B) Characteristics of work done in the firm
C)System and network D) Type of broadband company used by the firm
Q14. _______ comprise of large portion of hacker attacks simply because every computer has one and so well
know exploits can be used against them.
A) Nontechnical attacks B) Network infrastructure attack
Q18. Attempting to gain access to a network using an employee’s credentials is called the mode of ethical
hacking
A) Local networking B) Social engineering C) Physical entry D) Remote networking
Q19. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes? SamSpade B) SuperScan C) NetScan D) Netcat
Q20. Which of the following tools is used for Networks Testing and port Scanning
A) NetCat B) SuperScan C) NetScan D) All of Above
D) To locate firewalls
Q23.When a hacker attempts to attack host via the internet it is known as what type of attack?
A) Local access B) Remote attack C) Internal attack D) Physical access