IT Security And Ethical Hacking

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Surajappin
S
Surajappin
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,100
Questions: 20 | Attempts: 1,100

SettingsSettingsSettings
IT SecurITy And Ethical Hacking - Quiz

Model Exam Questions for Front runner Program, of ISEH Appin


Questions and Answers
  • 1. 

    Forensic ToolKit (FTK) is a ?

    • A.

      Software

    • B.

      Hardware

    • C.

      Both Hardware as well as Software

    • D.

      None

    Correct Answer
    A. Software
    Explanation
    FTK (Forensic ToolKit) is a software used in digital forensics. It is designed to assist investigators in analyzing and recovering data from electronic devices. FTK provides various tools and features to facilitate the examination of digital evidence, such as keyword searches, data carving, and email analysis. It allows investigators to extract and analyze information from computers, smartphones, and other digital devices. Therefore, FTK is a software tool used in the field of forensic investigations.

    Rate this question:

  • 2. 

    An access token dose not contain?

    • A.

      Security identifier

    • B.

      Group identifier

    • C.

      Date and time

    • D.

      User rights and permissions

    Correct Answer
    B. Group identifier
    Explanation
    An access token is a form of authentication that is used to verify the identity and permissions of a user in a computer system. It contains information such as the security identifier (SID) which uniquely identifies the user, the date and time when the token was issued, and the user's rights and permissions. However, it does not contain a group identifier, which is used to identify the user's group memberships within the system.

    Rate this question:

  • 3. 

    FAT stands for

    • A.

      File allocation tables

    • B.

      Forensic analysis tool

    • C.

      File allocation transfer

    • D.

      Format allocation test

    Correct Answer
    A. File allocation tables
    Explanation
    FAT stands for file allocation tables. This is a data structure used by computer operating systems to organize and manage files on a storage device, such as a hard drive or a flash drive. The file allocation tables keep track of which clusters on the storage device are allocated to each file, allowing the operating system to locate and access the files efficiently.

    Rate this question:

  • 4. 

    CDMA stand for

    • A.

      Code data multiple access

    • B.

      Code division multiple access

    • C.

      None of the above

    • D.

      Code data management authority

    Correct Answer
    B. Code division multiple access
    Explanation
    CDMA stands for Code Division Multiple Access. This technology is used in telecommunications to allow multiple users to share the same frequency band simultaneously. It works by assigning a unique code to each user, which allows their signals to be separated and distinguished from each other. This enables more efficient use of the available bandwidth and increases the capacity of the network. Code Division Multiple Access is a widely used technology in mobile communication systems, including 3G and 4G networks.

    Rate this question:

  • 5. 

    International roaming is not a problem for

    • A.

      CDMA

    • B.

      GSM

    • C.

      FOR BOTH

    • D.

      NONE OF THE ABOVE

    Correct Answer
    B. GSM
    Explanation
    GSM (Global System for Mobile Communications) is a standard for mobile communication that is widely used around the world. Unlike CDMA (Code Division Multiple Access), which is primarily used in North America and a few other countries, GSM is used by the majority of countries globally. As a result, GSM networks have extensive international roaming agreements in place, making it easier for GSM users to travel and use their mobile devices in different countries without any major issues. Therefore, international roaming is not a problem for GSM users.

    Rate this question:

  • 6. 

    EXPLOITS DEPEND ON

    • A.

      OS AND THEIR CONFIGURATION

    • B.

      LAN

    • C.

      ALL OF THE ABOVE

    • D.

      SOFTWARE CONFIGURATION

    Correct Answer
    C. ALL OF THE ABOVE
    Explanation
    The correct answer is ALL OF THE ABOVE. Exploits can depend on various factors such as the operating system and its configuration, the local area network (LAN) setup, and the software configuration. These factors can create vulnerabilities that attackers can exploit to gain unauthorized access or cause harm to a system. Therefore, it is important to consider all of these aspects when assessing and securing a system against potential exploits.

    Rate this question:

  • 7. 

    At which layer of the OSI communication model dose bridge operate?

    • A.

      Transport

    • B.

      Datalink

    • C.

      Network

    • D.

      Physical

    Correct Answer
    B. Datalink
    Explanation
    Bridges operate at the data link layer of the OSI communication model. The data link layer is responsible for the reliable transfer of data between two directly connected nodes on a network. Bridges are devices that connect multiple local area networks (LANs) together and forward data packets between them based on their MAC addresses. They use the data link layer protocols, such as Ethernet, to accomplish this task. Therefore, the correct answer is datalink.

    Rate this question:

  • 8. 

    Power-On Passwords are function of

    • A.

      Computer Hardware

    • B.

      Operating System Software

    • C.

      Application Software

    • D.

      Peripherals

    Correct Answer
    A. Computer Hardware
    Explanation
    Power-On Passwords are a function of computer hardware because they are implemented at the hardware level. These passwords are typically stored in the computer's BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface), which are firmware interfaces that control the hardware components of the computer. When the computer is powered on, the BIOS or UEFI prompts the user to enter the power-on password before allowing access to the operating system and other software. Therefore, the power-on password feature is directly tied to the computer's hardware and is independent of the operating system, application software, or peripherals.

    Rate this question:

  • 9. 

    Which element of the Intellectual property law provides the creator of a work exclusive right for 17 Years?

    • A.

      Patent

    • B.

      Copyright

    • C.

      Trade secret

    • D.

      Trademark

    Correct Answer
    A. Patent
    Explanation
    Patent law provides the creator of a work exclusive rights for 17 years. A patent is a form of intellectual property protection that grants the inventor or creator exclusive rights to their invention or creation. This means that during the 17-year period, the creator has the sole authority to make, use, or sell their invention, preventing others from doing so without their permission. Patents are typically granted for inventions that are new, useful, and non-obvious, and they provide a legal framework to encourage innovation and protect the rights of inventors.

    Rate this question:

  • 10. 

    TDMA Stands for

    • A.

      Time Division Multiple Access

    • B.

      Time Division Mono Application

    • C.

      Time Data Multiple Authority

    Correct Answer
    A. Time Division Multiple Access
    Explanation
    TDMA stands for Time Division Multiple Access. This is a technique used in telecommunications to allow multiple users to share the same frequency channel by dividing the signal into different time slots. Each user is assigned a specific time slot during which they can transmit their data. This allows for efficient use of the available bandwidth and enables multiple users to access the network simultaneously without interference.

    Rate this question:

  • 11. 

    CDMA 2000-1x is network, which achieve data rates up to ...

    • A.

      4.2mbit/s

    • B.

      3.6mbit/s

    • C.

      2.4mbit/s

    • D.

      3.8mbit/s

    Correct Answer
    C. 2.4mbit/s
    Explanation
    CDMA 2000-1x is a network that achieves data rates up to 2.4mbit/s.

    Rate this question:

  • 12. 

    Which of the following is evidence that is not based on personal knowledge but that was told to the witness?

    • A.

      Best evidence

    • B.

      Secondary evidence

    • C.

      Conclusive evidence

    • D.

      Hearsay evidence

    Correct Answer
    D. Hearsay evidence
    Explanation
    Hearsay evidence refers to information that is not based on the personal knowledge of the witness but rather on what someone else has told them. It is considered unreliable because it is second-hand information and can be easily distorted or manipulated. Therefore, hearsay evidence is not considered strong or credible evidence in legal proceedings.

    Rate this question:

  • 13. 

    Fill in the Blanks: Enhanced GPRS can provide a maximum data rate of _______ by using eight time slots.

    • A.

      275 kbps

    • B.

      115 kbps

    • C.

      144 kbps

    • D.

      384 kbps

    Correct Answer
    D. 384 kbps
    Explanation
    Enhanced GPRS can provide a maximum data rate of 384 kbps by using eight time slots. This means that with the use of eight time slots, the Enhanced GPRS technology is capable of transmitting data at a speed of 384 kilobits per second.

    Rate this question:

  • 14. 

    Registry key can be altered directly with ?

    • A.

      Control Panel

    • B.

      Registry Editor

    • C.

      Key Editor

    • D.

      Control Editor

    Correct Answer
    B. Registry Editor
    Explanation
    The correct answer is "Registry Editor". The Registry Editor is a tool in Windows operating systems that allows users to view, edit, and manipulate the system registry. The registry is a hierarchical database that stores configuration settings and options for the operating system, hardware, and installed software. By using the Registry Editor, users can directly alter registry keys, which can have a significant impact on the functioning of the system and installed software.

    Rate this question:

  • 15. 

    TACS Stands for ?

    • A.

      Total Access Communication System

    • B.

      Time And Code System

    • C.

      Total Advanced Code System

    • D.

      Time Access Code System

    Correct Answer
    A. Total Access Communication System
    Explanation
    TACS stands for Total Access Communication System. This system refers to a first-generation analog cellular phone system that was introduced in the 1980s. It was primarily used in Europe and other parts of the world. TACS allowed for improved communication by providing total access to the cellular network.

    Rate this question:

  • 16. 

    Forensic Examiners are interested in following file because these contain portions of all documents and other materials a user produce while using the computer ?

    • A.

      Temporary

    • B.

      Swap

    • C.

      Slack

    • D.

      Unallocated

    Correct Answer
    B. Swap
    Explanation
    Forensic examiners are interested in following the swap file because it contains portions of all documents and other materials a user produces while using the computer. The swap file is a type of temporary file that the computer uses to store data that cannot fit into its physical memory. It acts as a virtual memory extension and allows the computer to efficiently manage its resources. Therefore, the swap file can provide valuable evidence and information about the user's activities and files accessed on the computer.

    Rate this question:

  • 17. 

    Digital certificates are used in the IPSec connection, What type of network infrastructure device issue digital certificate?

    • A.

      SECP

    • B.

      ACS

    • C.

      SA

    • D.

      CA

    Correct Answer
    D. CA
    Explanation
    CA stands for Certificate Authority. A Certificate Authority is a trusted third-party entity that issues digital certificates. These certificates are used in IPSec connections to authenticate the identity of the communicating parties and ensure the confidentiality and integrity of the data being transmitted. The CA verifies the identity of the entities requesting the certificate and signs the certificate, thereby attesting to its authenticity. The CA plays a crucial role in establishing a secure and trusted connection between network devices in an IPSec infrastructure.

    Rate this question:

  • 18. 

    ACL in the NT Security environment stands for

    • A.

      Axis Control List

    • B.

      Area Control List

    • C.

      Account Control LIst

    • D.

      None of these

    Correct Answer
    D. None of these
  • 19. 

    Which of the following federal Law makes it a crime to knowingly and intentionally use cellular telephones that are altered or have been cloned?

    • A.

      18 USC 2701

    • B.

      18 USC 2511

    • C.

      18 USC 2319

    • D.

      18 USC 1029

    Correct Answer
    D. 18 USC 1029
    Explanation
    18 USC 1029 is the correct answer because it is the federal law that specifically addresses the crime of knowingly and intentionally using altered or cloned cellular telephones. This law prohibits the fraudulent use of access devices, including altered or cloned cell phones, and imposes criminal penalties for such actions. The other options, 18 USC 2701, 18 USC 2511, and 18 USC 2319, do not specifically pertain to the crime described in the question.

    Rate this question:

  • 20. 

    Which of the following are the tow primary U.S.Laws that address Cybercrime?

    • A.

      1030 and 2701

    • B.

      2510 and 1029

    • C.

      2510 and 2701

    • D.

      1029 and 1030

    Correct Answer
    C. 2510 and 2701
    Explanation
    The correct answer is 2510 and 2701. These are the two primary U.S. laws that address cybercrime.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 25, 2010
    Quiz Created by
    Surajappin
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.