mission patwari 2020 - gillzmentortest.com · an embedded device to control its functions. a. proxy...

19
MISSION PATWARI 2020 SUBSCRIBE OUR CHANNEL PATWARI COMPUTER MCQ PART- 6

Upload: others

Post on 17-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 2: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

1.______ is a small-scale data center or cluster of computers designed to provide cloud computing services to mobile devices. A. Sub B. Intelligent C. Drone D. Cloudlet E. None of these

Answer Ans – D. Cloudlet A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity

Page 3: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

2.______ is an exploit that takes advantage of a vulnerable device to gain access to a network. A. Device Attack B. Edge Computing C. Drone D. Cloudlet E. None of these Answer Ans – A. Device Attack Device Attack is an exploit that takes advantage of a vulnerable device to gain access to a network.

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020

Page 4: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

3.______ is the exploiting of vulnerabilities in embedded software to gain control of the device. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both (A) and (C) Answer Ans – B. Embedded Device Hacking

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020

Page 5: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

4._______ is the flash memory chip that stores specialized software running on a chip in an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both (A) and (C) Answer Ans – D. Embedded Firmware

5. _______ is a device which serves as the connection point between IoT devices and the cloud A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C)

Page 6: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

Answer Ans – B. IoT Gateway

6. ________ is software that serves as an interface between components of the IoT. A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C)

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020 Answer Ans – C. IoT Middleware IoT Middleware is software that serves as an interface between components of the IoT

Page 7: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

7. ______ is a group of hacked computers, smart appliances, and Internet-connected devices that have been co-opted for illicit purposes. A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C) Answer Ans – A. IoT Botnet

8._________ is a larger transmission line that carries data gathered from smaller lines that interconnect with it. A. Backbone B. Intelligent C. Drone

Page 8: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

D. Cloudlet E. None of these Answer Ans – A. Backbone

9.Which of the following is the combination of Bridge and Router? A. Backbone B. Brouter C. Baseband D. Cloudlet E. None of these Answer Ans – B. Brouter

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020

Page 9: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

10. Which of the following forwards packets to computer hosts within a network but not between networks? A. Edge Router B. Core Router C. Backbone D. All of these E. None of these Answer Ans – B. Core Router

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020

Page 10: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

11._______ is a small piece of data sent from a website and stored on the user’s computer by the user’s web browser while the user is browsing A. Cache B. Tracking C. Cookie D. Server Free Backup E. None of these

Answer

Ans – C. Cookie Cookie is a small piece of data sent from a website and stored on the user’s computer by the user’s web browser while the user is browsing

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020

Page 11: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

12.Which of the following is a cookie that is automatically recreated after being deleted? A. Super Cookie B. HTTP only Cookie C. Zombie Cookie D. Session Cookie E. None of these

Answer

Ans – C. Zombie Cookie Zombie Cookie is a cookie that is automatically recreated after being deleted

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020

Page 12: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

13.________ exists only in temporary memory while the user navigates the website. A. Super Cookie B. HTTP only Cookie C. Zombie Cookie D. Session Cookie E. None of these

Answer

Ans – D. Session Cookie

14.Session Cookie is also known as ____. A. Super Cookie

Page 13: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

B. Transient Cookie C. In-memory Cookie D. Both (A) and (B) E. Both (B) and (C)

Answer

Ans – E. Both (B) and (C)

15.______ expires at a specific date or after a specific length of time A. Super Cookie B. Persistent Cookie C. Zombie Cookie D. Session Cookie E. None of these

Answer

Ans – B. Persistent Cookie

Page 14: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

16.Persistent cookies are sometimes referred to as ______ A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Both (B) and (C)

Answer

Ans – D. Tracking Cookie Persistent cookies are sometimes referred to as Tracking Cookies.

17.A _________ can only be transmitted over an encrypted connection

Page 15: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie

Answer

Ans – E. Secure Cookie

18.________is a cookie with an origin of a top-level domain A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie

Answer

Ans – A. Super Cookie

Page 16: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

19.________ cannot be accessed by client-side APIs, such as JavaScript. A. Super Cookie B. HTTP Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020

Answer

Ans – B. HTTP Cookie

Page 17: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

20.A cookie consists of ______ A. Name B. Value C. Zero or More Attributes D. All of these E. None of these

Answer

Ans – D. All of these

SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020

Page 19: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both

PATWARI COMPUTER MCQ

PART- 6