Question Bank
Q1.A valid definition of digital evidence is:
A) Data stored or transmitted using a computer B) Information of probative value
C) Digital data of probative value D) Any digital evidence on a computer
Q2. Email, hard drives are examples of ____________
A) Illustrative evidence B) Electronic evidence C) Documented evidence D) Explainable evidence
Q3. The evidences or proof can be obtained from the electronic source is called the __________
A) Digital evidence B) Demonstrative evidence C) Explainable evidence D) Substantial evidence
Q4. Blood, fingerprints, DNA these are examples of____________
A) Digital evidence B) Demonstrative evidence C) Explainable evidence D) Substantial evidence
Q5. When an incident takes place, a criminal will leave hint evidence at the scene and remove a hint from the
scene which is called as ____________
A) Locard’s Exchange principle B) Anderson’s Exchange principle
C) Charles’s Anthony principle D) Kevin Ashton principle
Q6. ________ is known as testimonial.
A) Oath affidavit B) DNA samples C) Fingerprint D) Dried blood
Q7. Video surveillance can be a form of digital evidence.
A) True B) False
Q8. Rule of evidence is also known as __________
A) Law of witness B) Law of litigation C) Law of evidence D) All of the above
Q9. Ethical Hacking is also known as _____
A) Black Hat Hacking B) White Hat Hacking C) Encryption D) None of
these
Q10. Vulnerability scanning in Ethical hacking finds _____.
A) Strengths B) Weakness C) A &B D) None of these
Q11. Sequential step hacker’s uses are: _ _ _ _.
A. Maintaining Access B. Reconnaissance C. Scanning D. Gaining Access.
A) B, C, D, A B) B, A, C, D C) A, B, C, D D) D, C, B, A
Q12. Connecting into network through a rogue modem attached to computer behind a firewall is an example
of ____
A) Nontechnical attacks B) Network infrastructure attack C) Operating system attack
D) Application and other specialized attack
Q13. Before performing any penetration test, through legal procedure, which key points listed below is not
mandatory?
A) Know the nature of the organization B) Characteristics of work done in the firm
C)System and network D) Type of broadband company used by the firm
Q14. _______ comprise of large portion of hacker attacks simply because every computer has one and so well
know exploits can be used against them.
A) Nontechnical attacks B) Network infrastructure attack
C) Operating system attack D) Application and other specialized attack
Q15. Which tool is used to encrypt Email?
A) WebInspect B) QualyGuard C) PGP (pretty good privacy) D) None of the above.
Q16. Who described a dissertation on fundamentals of hacker’s attitude?
A) G. Palma B) Raymond C) Either D) Jhon
Browman
Q17. Which tool is used to crack the password?
A) Nmap B) LC4 C) ToneLOC D) Nessus
Q18. Attempting to gain access to a network using an employee’s credentials is called the mode of ethical
hacking
A) Local networking B) Social engineering C) Physical entry D) Remote networking
Q19. Which of the following tool is used for Windows for network queries from DNS lookups to
trace routes? SamSpade B) SuperScan C) NetScan D) Netcat
Q20. Which of the following tools is used for Networks Testing and port Scanning
A) NetCat B) SuperScan C) NetScan D) All of Above
Q21. Why would a ping sweep be used?
A) To identify live systems B) To locate live systems C) To identify open ports
D) To locate firewalls
Q22. Which phase of hacking performs actual attack on a network or system?
A) Reconnaissance B) Maintaining Access C) Scanning D) Gaining Access
Q23.When a hacker attempts to attack host via the internet it is known as what type of attack?
A) Local access B) Remote attack C) Internal attack D) Physical access
Q24. IDS stands for ____
A) Intrusion detection system B) Information documentation service
C) Intrusion documentation system D) None of above
Q25. What is the purpose of a Denial of Service attack?
A) Exploit a weakness in the TCP/IP stack B) To execute a Trojan on a system
C) To overload a system so it is no longer operational
D) To shutdown services by turning them off