Eti MCQ QB
Eti MCQ QB
Eti MCQ QB
This Online Exam is for Final Year students of Computer Engineering Group of MSBTE
affiliated Polytechnic.
Date : 21-05-2020
Time 10.00 to 11.30am.
Email address *
0 of 0 points
Full Name *
Institute Name *
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 1/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Institute Code *
Enrollment number *
63 of 70 points
Narrow AI
General AI
Neural AI
Feedback
Narrow AI
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 2/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
2. DARPA, the agency that has funded a great deal of American AI 1/1
research, is part of the Department of:
Defence
Energy
Education
Jastice
Feedback
Defence
3. The conference that launched the AI revolution in 1956 was held at: 1/1
Dartmouth
Harvard
New York
Stanford
Feedback
Dartmouth
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 3/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
4. What is the term used for describing the judgmental or commonsense 1/1
part of problem solving?
Heuristic
Critical
Value based
Analytical
Feedback
Heuristic
Correct answer
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 4/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
David Levy
John McCarthy
Joseph Weizenbaum
Hans Berliner
Feedback
John McCarthy
7. The ability to recover and read deleted or damaged files from a 1/1
criminal’s computer is an example of a law enforcement specialty called?
Robotics
Simulation
Computer Forensics
Animation
Feedback
Computer Forensics
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 5/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
8. What are the important parts of the mobile device which used in 1/1
Digital forensic?
SIM
RAM
ROM
EMMC chip
Feedback
EMMC chip
9. Using what, data hiding in encrypted images be carried out in digital 1/1
forensics?
Acquisition.
Steganography.
Live analysis
Hashing.
Other:
Feedback
Steganography
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 6/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
e-mail harassment
Falsification of data
Sabotage
Identification of data
Feedback
11. Which file is used to store the user entered password? 1/1
.exe
.txt
.iso
.sam
Feedback
.sam
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 7/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Data mining
Data carving
Meta data
Data Spoofing.
Feedback
Data mining
13. What is first step to Handle Retrieving Data from an Encrypted Hard 1/1
Drive?
Formatting disk
Storing data
Deleting files.
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 8/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
14. In phase investigator transfers the relevant data from a venue out of 1/1
physical or administrative control of the investigator to a controlled
location
Preservation phase
Survey phase
Documentation phase
Reconstruction phase
Presentation phase
Feedback
Survey phase
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsco… 9/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
16. A set of instruction compiled into a program that perform a particular 1/1
task is known as:
Hardware.
CPU
Motherboard
Software
Feedback
Software
A copy is made onto forensically sterile media. New media should always be used if
available.
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 10/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
18. To collect and analyze the digital evidence that was obtained from the 1/1
physical investigation phase, is the goal of which phase?
Review phase.
Deployment phase.
Feedback
Review phase
Deployment phase
Feedback
Deployment phase
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 11/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
20. Which phase entails a review of the whole investigation and identifies 1/1
area of improvement?
Review phase.
Deployment phase
Feedback
Review phase.
G. Palmar
J. Korn
Michael Anderson
S.Ciardhuain.
Feedback
Michael Anderson
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 12/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Forensic
Crime
Cyber Crime
Evidence
Feedback
forensic
23. Who proposed End to End Digital Investigation Process (EEDIP)? 1/1
G. Palmar
Stephenson
Michael Anderson
S.Ciardhuain
Feedback
Stephenson.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 13/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 14/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
27. What are the three general categories of computer systems that can 1/1
contain digital evidence?
Desktop, laptop,server
Hardware, software,networks
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 15/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Open computersystems
Communication systems
Embedded computersystems
Correct answer
Communication systems
Offenders who are unaware of them leave behind more clues than they otherwise
would have.
Feedback
Offenders who are unaware of them leave behind more clues than they otherwise would
have.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 16/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
30. Private networks can be a richer source of evidence than the Internet 0/1
because:
Correct answer
31. The criminological principle which states that, when anyone, or 2/2
anything, enters a crime scene he/she takes something of the scene with
him/her, and leaves something of himself/herself behind, is:
Differential AssociationTheory
Beccaria’s SocialContract
None of theabove
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 17/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Encryption.
None ofthese.
Feedback
Strengths.
Weakness.
A &B
None of these.
Feedback
Weakness.
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 18/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
G. Palma.
Raymond.
Either.
Jhon Browman
Feedback
Raymond.
Fix identifiesweakness
Steal thedata
No correct answers
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 19/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Nmap
LC4
ToneLOC
Nessus
Feedback
LC4
37. Which tool is used for depth analysis of a web application? 2/2
Whisker
Superscan
Nikto
Kismet
Feedback
Whisker
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 20/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
38. Which hacker try to distribute political or social message through 2/2
their work?
Black hathacker
Hactivist
Scriptkiddes
White hathacker
Feedback
Hactivist
39. A penetration tester must identify and keep in mind the & 2/2
requirements of a firm while evaluating the security postures.
hacking techniques
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 21/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
40. Before performing any penetration test, through legal procedure, 2/2
which key points listed below is not mandatory?
Feedback
Script Kiddies
Feedback
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 22/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
42. Which of the following tool is used for Windows for network queries 2/2
from DNS lookups to trace routes?
SamSpade
SuperScan
NetScan
Netcat
Feedback
SamSpade
43. Which Nmap scan is does not completely open a TCP connection? 2/2
SYN stealthscan
TCP scan
XMAS treescan
ACKscan
Feedback
SYN stealthscan
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 23/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Feedback
Local networking
Social engineering
Physical entry
Remote networking
Feedback
Local networking
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 24/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
Reconnaissance
Maintaining Access
Gaining Access
Scanning
Feedback
Gaining Access
47. Which type of hacker represents the highest risk to your network? 0/2
black-hathackers
grey-hathackers
script kiddies
disgruntled employees
Correct answer
disgruntled employees
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 25/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
General Purpose
Special Purpose
Feedback
Special Purpose
Data communication
Monitoring
control
All of above
Feedback
Monitoring
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 26/27
21/05/2020 State Level Online Exam for Emerging Trends in Computer Engineering and Information Technology(22618)
ASIC
ASSP
CPU
CPLD
Feedback
CPU
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy
Forms
https://docs.google.com/forms/d/e/1FAIpQLSewPHDBW8z6BupgS-RKxbAZmZAz_W-rKu0CPZcACA733SoVyw/viewscore?viewsc… 27/27