Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
38 views2 pages

Eti MCQ

The document consists of a series of multiple-choice questions related to digital evidence, cyber-security, and ethical hacking principles. It covers topics such as definitions of digital evidence, criminological principles, types of evidence, hacking categories, and phases of ethical hacking. The questions aim to test knowledge on various aspects of cyber-security and the implications of hacking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views2 pages

Eti MCQ

The document consists of a series of multiple-choice questions related to digital evidence, cyber-security, and ethical hacking principles. It covers topics such as definitions of digital evidence, criminological principles, types of evidence, hacking categories, and phases of ethical hacking. The questions aim to test knowledge on various aspects of cyber-security and the implications of hacking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

A valid definition of digital evidence is_____________


A. Data stored or transmitted using a computer
B. Information of probative value
C. Digital data of probative value
D. Any digital evidence on a computer

2. The criminological principle which states that, when anyone, or anything, enters a
crime scene he/she takes something of the scene with him/her, and leaves something
of himself/herself behind, is:
A. Locard’s Exchange Principle B. Differential Association Theory
C. Beccaria’s Social Contract D. None of the above
3. The evidence must be usable in the court which is called as_______
A. Admissible B. Authentic
C. Complete D. Reliable
4. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a
type of _____________
A. Illustrative evidence B. Electronic evidence
C. Documented evidence D. Explainable evidence
5. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to
crack a system are termed as________________________
a) Black Hat hackers b) White Hat Hackers
c) Grey Hat Hackers d) Red Hat Hackers
6. Suicide Hackers are those_______________________
a) who break a system for some specific purpose with or without keeping in mind that they
may suffer long term imprisonment due to their malicious activity
b) individuals with no knowledge of codes but an expert in using hacking tools
c) who know the consequences of their hacking activities and hence try to prevent them by erasing
their digital footprints
d) who are employed in an organization to do malicious activities on other firms

7. SNMP stands for


a) Simple Network Messaging Protocol b) Simple Network Mailing Protocol
c) Simple Network Management Protocol d) Simple Network Master Protoco

8. An attacker can create an attack by sending hundreds or thousands of e-mails with very large
attachment
a) Connection Attack b) Auto responder Attack
c) Attachment Overloading Attack d) All of the above
9. __________is any action that might compromise cyber-security.
a) Threat b) Vulnerability
c) Exploit d) Attack
9. Existence of weakness in a system or network is called____________
a) Threat b) Vulnerability
c) Exploit d) Attack
10. Data masking is also known as_________
a) Data obfuscation b) Data copying
c) Data breaching d) Data duplicating
11. Ethical Hacking is also known as________

Page 1
a) Black Hat hacking b) White Hat hacking
c) Encrypting d) None of these
12. In phase the hacker exploits the network or system vulnerabilities.
a) Scanning b) Maintaining access
c) Reconnaissance d) Gaining access
13. ________ is the last phase of ethical hacking process.
a)Scanning b) Tracks clearing
c) Reconnaissance d) Reporting
14. Zero-day exploits are also called ____
a) zero-day attacks b) hidden attacks
c) un-patched attacks d) un-fixed exploits

15. _____ phase in ethical hacking is known as the pre-attack phase.


a) Reconnaissance b) Scanning
c) Gaining access d) Maintaining access

16. Possible threat to any information cannot be _______


a) reduced b) transferred
c) protected d) ignored
17. Lack of access control policy is a____________
a) Bug b) Threat
c) Vulnerability d) Attack

18. ________________of them is not a scanning tool.


a) NMAP b) Nexpose
c) Maltego d) Nessus

19. Following tool is used forNetwork Testing and port scanning


a) NetCat b) SuperScan
c) NetScan d) All of Above

20. __________is an act of hacking by the means of which a political or social message is conveyed.

a) Hacktivism b) Whistle-blowing
c) Surveillance d) Pseudonymization

21. Compromising confidential information comes under


a) Bug b) Threat
c) Vulnerability d) Attack
22. Photographs, videos, sound recordings, X-rays, maps drawing, graphs, charts is a type of
_____________
A. Illustrative evidence B. Electronic evidence
C. Documented evidence D. Explainable evidence
23.An attacker can create an attack by sending hundreds or thousands of e-mails with very large
attachments.

a) Connection Attack b) Auto responder Attack


c) Attachment Overloading Attack d) All of the above

24.__________is any action that might compromise cyber-security


a) Threat b) Vulnerability
c) Exploit d) Attack
25. Existence of weakness in a system or network is called____________
a) Threat b) Vulnerability
c) Exploit d) Attack

Page 2

You might also like