New Questions Set
New Questions Set
A. Disk
B. Network Topoplogy
Answer optionc
Marks 1
A. Deep Learning
B.          Machine Learning
C.            Neural Network
D. Artificial Intelligence
Answer optiona
Marks 1
3 Brokers in MQTT
C. Both a and b
Answer optiona
Marks 1
Answer optiond
Marks 1
A. Deep Learning
B. Machine Learning
C. Neural Network
D. Artificial Intelligence
Answer optionb
Marks 1
A. Data
              Information
B.
              Knowledge
C.
              Intelligence
D.
     Answer   optiona
Marks 1
Answer optiond
Marks 1
A. linux
B. Palm OS
Answer optiond
    Marks     1
              ________ can recognize the shapes of the
9
              letters and convert it into editable text.
Answer optiond
Marks 1
Answer optionc
Marks 1
              IOT Level 2
B.
              IOT Level 3
C.
              IOT Level 4
D.
Answer optionb
Marks 1
              Websocket APIs
B.
              Both a and b
C.
Answer optiona
Marks 1
              In Deep Environment
A.
              Integrated Development Environment
B.
              IDE
D.
Answer optionc
Marks 1
Answer optionb
Marks 1
Answer optiond
Marks 1
              IEEE 802.15.4
A.
              IEEE 802.3
B.
              IEEE 802.11
C.
              IEEE 802.16
D.
Answer optionb
Marks 1
              Readiness
A.
              Review
C.
              Deployment
D.
Answer optionc
Marks 1
Answer optionb
Marks 1
              connectivity
B.
     Answer   optiona
 Marks        1
              Substantial Evidence
A.
              Illustrative evidence
B.
              Electronic Evidence
C.
              Documented Evidence
D.
Answer optionc
Marks 1
              air-conditioners, refrigerators
A.
              manufacturing processes
B.
Answer optionb
Marks 1
              Level-3
B.
              Level-4
C.
              Level-2
D.
Answer optiond
Marks 2
              None of these
D.
Answer optionc
Marks 1
              UDP
A.
              TCP
B.
              HTTP
C.
              CoAP
D.
Answer optiona
Marks 1
              Active hacking
A.
              Hacktivism
B.
              Activism
C.
              Black-hat hacking
D.
Answer optionb
Marks 1
              Asset to be protected
A.
              Support by Organization
C.
Marks 1
              All of these
D.
Answer optionb
Marks 1
     Answer   optiond
 Marks        1
              Pre-Attack
A.
              Attack
B.
              Post-attack
C.
              Reconnaissance
D.
Answer optiond
Marks 1
              None
D.
Answer optiond
Marks 1
              Ns
B.
              Sn
C.
              Ns
D.
Answer optionc
Marks 1
              Messaging application
A.
              Email
B.
              A and B
C.
              None
D.
Answer optiond
Marks 1
              Embedded System
A.
              Cyber Security
B.
              Artificial Intelligence
C.
              Internet of Things
D.
Answer optionc
Marks 1
              Big Data
A.
              Hacking
B.
              security
D.
Answer optionc
Marks 1
              Awareness
A.
              Planning
B.
              Storage
C.
          Collection
D.
Answer optiona
Marks 1
          Computer security
A.
          Computer Evidence
B.
          comuter network
C.
          computer Graphics
D.
Answer optionb
Marks 1
          OT Level 2
A.
          IOT Level 1
B.
          IOT Level 4
C.
          IOT Level 3
D.
 Answer   optionc
 Marks    1
          simple integer
B.
          simple symbol
C.
          simple string
D.
Answer optiond
Marks 1
          LTE
A.
          UMTS
B.
          CDMA
C.
          CDMA 2000
D.
Answer optiona
 Marks    1
          Protocols are 802.3 Cellular,802.11 WiFi,802.1 5.4-
40        LRWPAN.
          Application Layer
A.
          Transport Layer
B.
          Network Layer
C.
          Link Layer
D.
Answer optionb
Marks 1
          Heuristic Processing
A.
          Cognitive science
B.
          Relative Symbolism
C.
          Pattern Matching
D.
Answer optionc
Marks 1
          Whatsapp
B.
          Gmail
C.
          All Of these.
D.
Answer optionc
Marks 1
Answer optiond
Marks 1
          non-technical attack
D.
Answer optionb
Marks 1
          Evaluating Result
A.
          All of these
D.
Answer optiona
Marks 1
          None
D.
 Answer   optiona
Marks 1
Answer optionb
Marks 1
Answer optionc
 Marks    1
49        ________ pushed the logical formalism to integrate reasoning with Knowledge
          Bertrand Russel
A.
          Marvin Minsky
B.
          Charles Babbage
C.
          Aristotle
D.
Answer optiond
Marks 1
          firewall
A.
          Antivirus
B.
          Both A and B
C.
          None
D.
Answer optionb
Marks 1
A.        Application hacking
         Network Hacking
B.
         Both A & B
C.
         None
D.
Answer optiona
Marks 1
         Ping scan
A.
         Port scan
B.
         Ping sweep
C.
         II of above
D.
Answer optionb
Marks 1
Answer optiond
Marks 1
         Nontechnical attacks
A.
         Operating-system attacks
B.
         Network-infrastructure attacks
C.
Answer optiond
Mark 1
         Script kiddies
A.
         Hacktivist
B.
         Phreaker
C.
         Cracker
D.
Answer   optiond
Marks    1
         Elite Hackers
B.
Answer optionb
Marks 1
Answer optionc
Marks    1
         Case: The complainant received an obscene e-mail from an
         unknown e-mail ID. The complainant also noticed that
58       obscene profiles along with photographs of his daughter
         had been uploaded on matrimonial sites.
         a-b-c-d
A.
         b-a-d-c
B.
         b-a-c-d
C.
         d-b-a-c
D.
Answer optionc
Marks 1
         John Macarthy
A.
         Michael Anderson
B.
         Allen Turing
C.
         Mary Shelley
D.
Answer optionb
Marks 1
         Reasoning
B.
         Search
C.
Answer optiond
Marks 1
         None
D.
Answer optiond
Marks 1
         Sniffelet
A.
         PromiscDetect
B.
         Netflow traffic analyzer
C.
         All of above
D.
Answer optionc
Marks 1
         Password
A.
         Hash analysis
B.
Answer optiona
Marks 1
         development
B.
         None
D.
Answer   optionb
Marks 1
         Irrelevant Evidence
A.
         Relevant Evidence
B.
         Positive Evidence
C.
         Legal Evidence
D.
Answer optionc
Marks 1
         802.3
A.
         802.11
B.
         802.15.4
C.
         802.16
D.
Answer optionb
Marks    1
         IoT devices may support a number of _______ protocols and
67       can communicate with other devices and also with the
         infrastructure
         Internet
A.
         Interoperable communication
B.
         Intra system
C.
         Intranet
D.
Answer optionb
Marks 1
         None
D.
Answer optionb
Marks 1
         Publish Subscribe
B.
         Push-Pull
C.
         exclusive Pair
D.
Answer optiona
Marks 1
         Logic
A.
         Reasoning
B.
         Language
C.
Answer optiond
Marks 1
         request-response
A.
         publish-subscribe
B.
         push-pull
C.
         Exclusive pair
D.
Answer optiona
Marks 1
         service
A.
         Management
B.
         Security
C.
         Application
D.
Answer optionc
Marks 1
         16 bit
A.
         32 bit
B.
         64 bit
C.
         8 bit
D.
Answer   optionb
Marks 1
         Data
A.
         Information
B.
         Knowledge
C.
         Intelligence
D.
Answer optiona
Marks 1
         Port scanning
A.
         Network scanning
B.
         CT-scan
C.
         Vulnerability scanning
D.
Answer optiond
Marks    1
         To access the security of the system one must understand
76
         of the hacker.
         Hobbies
A.
         Mindset
B.
         none of these
C.
         Hobbies
D.
Answer optionc
Marks 1
         LC4
A.
         pwdump
B.
         SuperScan
D.
Answer optiona
Marks 1
         IP addresses
C.
Answer optionc
Marks 1
         Exchange Rule
C.
Answer optionb
Marks 1
         Routing Tables
A.
         Main Memory
B.
         Log files
C.
         Cached Data
D.
Answer optiond
Marks 1
         Communication systems
B.
Answer optionc
Marks 1
         In digital forensic field ______are the set of moral principles that regulate the use
82
         of computers.
         carefully
C.
Marks 1
         wireless
A.
         Optic
B.
         Magnetic
C.
         original
D.
Answer optionc
Marks 1
A. In Deep Environment
Answer optionb
Marks 1
         Artificial Intelligence
A.
         Machine Learning
B.
         Neural Network
C.
         Deep Learning
D.
Answer optionb
Marks 2
86 Brokers in MQTT
C. Both a and b
Marks 1
Answer optionb
Marks 1
         Agile Model
A.
         Spiral Model
B.
         Waterfall Model
C.
         None Of these
D.
Answer   optionc
Marks 1
         Link Layer
A.
         Network Layer
B.
         Transport Layer
C.
         Application Layer
D.
Answer optionb
Marks 1
         Destructive
A.
         Defensive
B.
         Attacking
C.
         Analyzing
D.
Answer optionc
Marks    1
91       Type 2 Artificial Intelligence machines are _____
         Super Al
A.
         General Al
B.
         Weak Al
C.
Answer optionc
Marks 1
         wireless
A.
         Optic
B.
         Magnetic
C.
         original
D.
Answer optionc
Marks 1
Answer optionc
Marks 1
Answer optiona
Marks 1
         Active hacking
A.
         Hacktivism
B.
         Activism
C.
         Black-hat hacking
D.
Answer optiona
Marks 1
         Link Layer
A.
         Network Layer
B.
         Transport Layer
C.
         Application Layer
D.
Answer optiond
Marks 1
Answer optiond
Marks 1
         Messaging application
A.
         Email
B.
         A and B
C.
         None
D.
Answer optiond
Marks 1
         Examine
A.
         Hypothesis
B.
         Analysis
C.
         Report
D.
Answer   optiond
Marks    1
100 How many phases are extra in ADFM as comparing with RMDFR
         5
A.
         4
B.
         3
C.
         8
D.
Answer optionb
Marks 1
         Intelligent Robots
A.
         Industrial Robots
B.
         Military Robots
C.
         Domestic Robots
D.
Answer optiond
Marks 1
         IP addresses
C.
Answer optiona
Marks 1
Answer optionb
Marks    1
104      HTTP port number is _____
A. 80
B. 22
C. 64
D. 32
Answer optionb
Marks 2
         Publisher
A.
         Subscriber
B.
         Both a and b
C.
Answer optiond
Marks    1
106      WebSocket APIs follow model.
         Push-Pull Communication
C.
Answer optiond
Marks 2
         Bluetooth, ZigBee
A.
         Wi-FI,GPRS
B.
         EDGE
C.
Answer optiond
Marks 2
         Temperature
A.
         Humidity
B.
         motion
C.
         Gas
D.
Answer optionc
Marks 1
         Physical Network
B.
         Intranet
C.
         None Of these
D.
Answer optiona
Marks 1
         Information
A.
         Knowledge
B.
         Intelligence
C.
         Information
D.
Answer optiond
Marks 1
         Device
A.
         Communication
B.
         service
C.
         Management
D.
Answer optionc
Marks 1
         Embedded System
A.
         Cyber Security
B.
         Internet of Things
C.
         Artificial Intelligence
D.
Answer   optionc
Marks    1
Answer optiond
Marks 2
         during failure
B.
         after failure
C.
         in advance
D.
Answer optiona
Marks 2
         Electronic evidence
A.
         Documented evidence
B.
         substantial evidence
C.
         Explainable evidence
D.
Answer optiond
Marks 1
         Admissible
A.
         Complete
B.
         Authentic
C.
Answer optionc
Marks 2
         Non-Volaile
A.
         Static Information
B.
         Highly volatile
C.
         Legal Informaion
D.
Answer optiond
Marks 2
         digital evidence
A.
         Explainable evidence
B.
         demonstrative evidence
C.
         substantial evidence
D.
Answer optiona
Marks 2
         Super Al
A.
         General Al
B.
         Weak Al
C.
Answer optiona
Marks    2
         While performing digital forensics investigation, in which
120      media an examination should never be performed ?
         wireless
A.
         Optic
B.
         Magnetic
C.
         original
D.
Answer optionb
Marks 2
Answer optiona
Marks
         2
  :
         Hackers usfeful in finding bugs and vulnerabilities in a
122      system & don't intend to crack a system are
Answer optiona
Marks 1
         Active hacking
A.
         Hacktivism
B.
         Activism
C.
         Black-hat hacking
D.
Answer optionb
Marks    2
         _______ layer determines how the packets are coded and
124      signaled by the hardware device over the medium to which
         the host is attached.
         Link Layer
A.
         Network Layer
B.
         Transport Layer
C.
         Application Layer
D.
Answer optionc
Marks: 1
Answer optiona
Marks 1
         Messaging application
A.
         Email
B.
         A and B
C.
         None
D.
Answer optionb
Marks 1
         Examine
A.
         Hypothesis
B.
         Analysis
C.
         Report
D.
Answer optionb
Marks 2
128 How many phases are extra in ADFM as comparing with RMDFR
A. 5
B.       4
C.       3
D. 8
Answer optiona
Marks 2
         Intelligent Robots
A.
         Industrial Robots
B.
         Military Robots
C.
         Domestic Robots
D.
Answer optionc
Marks 2
         IP addresses
C.
Marks: 2
Answer optiond
Marks 1
A. 80
B. 22
C. 64
D. 32
Answer optionc
Marks    1
133      ______ is an object responsible for data distribution
         Publisher
A.
         Subscriber
B.
         Both a and b
C.
Answer optiona
Marks: 1
         Bluetooth, ZigBee
A.
         Wi-FI,GPRS
B.
         EDGE
C.
Answer optiona
Marks 1
         Temperature
A.
         Humidity
B.
         motion
C.
         Gas
D.
Answer optionb
Marks 2
         Physical Network
B.
         Intranet
C.
         None of these
D.
Answer optionc
Marks 2
         Information
A.
         Knowledge
B.
         Intelligence
C.
         Information
D.
Answer optionb
Marks 1
         Device
A.
         Communication
B.
         service
C.
         Management
D.
Answer optionb
Marks: 1
         Embedded System
A.
         Cyber Security
B.
         Internet of Things
C.
         Artificial Intelligence
D.
Answer   optionc
Marks    1
Answer optionb
Marks 1
         during failure
B.
         after failure
C.
         In advance
D.
Answer optiond
Marks    1
         A proof that is introduced in the form of physical object
142      is referred as ______
         Electronic evidence
A.
         Documented evidence
B.
         substantial evidence
C.
         Explainable evidence
D.
Answer optiona
Marks 1
         Admissible
A.
         Complete
B.
         Authentic
C.
Answer optionb
Marks 2