IT SecurITy And Ethical Hacking

20 Questions | Total Attempts: 991

SettingsSettingsSettings
Please wait...
IT SecurITy And Ethical Hacking

Model Exam Questions for Front runner Program, of ISEH Appin


Questions and Answers
  • 1. 
    Forensic ToolKit (FTK) is a ?
    • A. 

      Software

    • B. 

      Hardware

    • C. 

      Both Hardware as well as Software

    • D. 

      None

  • 2. 
    An access token dose not contain?
    • A. 

      Security identifier

    • B. 

      Group identifier

    • C. 

      Date and time

    • D. 

      User rights and permissions

  • 3. 
    FAT stands for
    • A. 

      File allocation tables

    • B. 

      Forensic analysis tool

    • C. 

      File allocation transfer

    • D. 

      Format allocation test

  • 4. 
    CDMA stand for
    • A. 

      Code data multiple access

    • B. 

      Code division multiple access

    • C. 

      None of the above

    • D. 

      Code data management authority

  • 5. 
    International roaming is not a problem for
    • A. 

      CDMA

    • B. 

      GSM

    • C. 

      FOR BOTH

    • D. 

      NONE OF THE ABOVE

  • 6. 
    EXPLOITS DEPEND ON
    • A. 

      OS AND THEIR CONFIGURATION

    • B. 

      LAN

    • C. 

      ALL OF THE ABOVE

    • D. 

      SOFTWARE CONFIGURATION

  • 7. 
    At which layer of the OSI communication model dose bridge operate?
    • A. 

      Transport

    • B. 

      Datalink

    • C. 

      Network

    • D. 

      Physical

  • 8. 
    Power-On Passwords are function of
    • A. 

      Computer Hardware

    • B. 

      Operating System Software

    • C. 

      Application Software

    • D. 

      Peripherals

  • 9. 
    Which element of the Intellectual property law provides the creator of a work exclusive right for 17 Years?
    • A. 

      Patent

    • B. 

      Copyright

    • C. 

      Trade secret

    • D. 

      Trademark

  • 10. 
    TDMA Stands for
    • A. 

      Time Division Multiple Access

    • B. 

      Time Division Mono Application

    • C. 

      Time Data Multiple Authority

  • 11. 
    CDMA 2000-1x is network, which achieve data rates up to ...
    • A. 

      4.2mbit/s

    • B. 

      3.6mbit/s

    • C. 

      2.4mbit/s

    • D. 

      3.8mbit/s

  • 12. 
    Which of the following is evidence that is not based on personal knowledge but that was told to the witness?
    • A. 

      Best evidence

    • B. 

      Secondary evidence

    • C. 

      Conclusive evidence

    • D. 

      Hearsay evidence

  • 13. 
    Fill in the Blanks: Enhanced GPRS can provide a maximum data rate of _______ by using eight time slots.
    • A. 

      275 kbps

    • B. 

      115 kbps

    • C. 

      144 kbps

    • D. 

      384 kbps

  • 14. 
    Registry key can be altered directly with ?
    • A. 

      Control Panel

    • B. 

      Registry Editor

    • C. 

      Key Editor

    • D. 

      Control Editor

  • 15. 
    TACS Stands for ?
    • A. 

      Total Access Communication System

    • B. 

      Time And Code System

    • C. 

      Total Advanced Code System

    • D. 

      Time Access Code System

  • 16. 
    Forensic Examiners are interested in following file because these contain portions of all documents and other materials a user produce while using the computer ?
    • A. 

      Temporary

    • B. 

      Swap

    • C. 

      Slack

    • D. 

      Unallocated

  • 17. 
    Digital certificates are used in the IPSec connection, What type of network infrastructure device issue digital certificate?
    • A. 

      SECP

    • B. 

      ACS

    • C. 

      SA

    • D. 

      CA

  • 18. 
    ACL in the NT Security environment stands for
    • A. 

      Axis Control List

    • B. 

      Area Control List

    • C. 

      Account Control LIst

    • D. 

      None of these

  • 19. 
    Which of the following federal Law makes it a crime to knowingly and intentionally use cellular telephones that are altered or have been cloned?
    • A. 

      18 USC 2701

    • B. 

      18 USC 2511

    • C. 

      18 USC 2319

    • D. 

      18 USC 1029

  • 20. 
    Which of the following are the tow primary U.S.Laws that address Cybercrime?
    • A. 

      1030 and 2701

    • B. 

      2510 and 1029

    • C. 

      2510 and 2701

    • D. 

      1029 and 1030

Back to Top Back to top