Beruflich Dokumente
Kultur Dokumente
In LISP, the function returns the list that results after the first element is removed (the rest f the
list), is
a) car
b) last
c) cons
d) cdr
Which of the following contains the output segments of Artificial Intelligence programming?
a) Printed language and synthesized speech
b) Manipulation of physical object
c) Locomotion
d) All of the mentioned
A series of Artificial Intelligence systems, developed by Pat Langley to explore the role of
heuristics in scientific discovery is
a) RAMD
b) BACON
c) MIT
d) DU
A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence, Presently, this technique is called
a) Turing Test
b) Algorithm
c) Boolean Algebra
d) Logarithm
Which approach to speech recognition avoids the problem caused by the variation in speech
patterns among different speakers?
a) Continuous speech recognition
b) Isolated word recognition
c) Connected word recognition
d) Speaker-dependent recognition
DARPA, the agency that has funded a great deal of American Artificial Intelligence research, is
part of the Department of
a) Defense
b) Energy
c) Education
d) Justice
. Which of these schools was not among the early leaders in Artificial Intelligence research?
a) Dartmouth University
b) Harvard University
c) Massachusetts Institute of Technology
d) Stanford University
A certain Professor at the Stanford University coined the word ‘artificial intelligence’ in 1956 at
a conference held at Dartmouth college. Can you name the Professor?
a) David Levy
b) John McCarthy
c) Joseph Weizenbaum
d) Hans Berliner
In 1985, the famous chess player David Levy beat a world champion chess program in four
straight games by using orthodox moves that confused the program. What was the name of the
chess program?
a) Kaissa
b) CRAY BLITZ
c) Golf
d) DIGDUG
The explanation facility of an expert system may be used to
a) construct a diagnostic model
b) expedite the debugging process
c) explain the system’s reasoning process
d) expedite the debugging process & explain the system’s reasoning process
The conference that launched the AI revolution in 1956 was held at?
a) Dartmouth
b) Harvard
c) New York
d) Stanford
a) simulation
b) cognitization
c) duplication
d) psychic amelioration
Graphic interfaces were first used in a Xerox product called
a) InterLISP
b) Ethernet
c) Smalltalk
d) ZetaLISP
The Al researcher who co-authored both the Handbook of Artificial Intelligence and The Fifth
Generation is
a) Bruce Lee
b) Randy Davis
c) Ed Feigenbaum
d) Mark Fox
a) frame-based CAI
b) generative CAI
c) problem-solving CAI
d) intelligent CAI
KEE is a product of
a) Teknowledge
b) IntelliCorpn
c) Texas Instruments
d) Tech knowledge
A network with named nodes and labeled arcs that can be used to represent certain natural
language grammars to facilitate parsing.
a) Tree Network
b) Star Network
c) Transition Network
d) Complete Network
Which of the factors affect the performance of learner system does not include?
a) Representation scheme used
b) Training scenario
c) Type of feedback
d) Good data structures
Which instruments are used for perceiving and acting upon the environment?
a) Sensors and Actuators
b) Sensors
c) Perceiver
d) None of the mentioned
Which element in the agent are used for selecting external actions?
a) Perceive
b) Performance
c) Learning
d) Actuator
What is an ‘agent’?
a) Perceives its environment through sensors and acting upon that environment through actuators
b) Takes input from the surroundings and uses its intelligence and performs the desired
operations
c) A embedded program controlling line following robot
d) All of the mentioned
Rational agent is the one who always does the right thing.
a) True
b) False
An omniscient agent knows the actual outcome of its actions and can act accordingly; but
omniscience is impossible in reality. Rational Agent always does the right thing; but Rationality
is possible in reality.
a) True
b) False
Satellite Image Analysis System is (Choose the one that is not applicable).
a) Episodic
b) Semi-Static
c) Single agent
d) Partially Observable
An agent is composed of
a) Architecture
b) Agent Function
c) Perception Sequence
d) Architecture and Program
MQTT is protocol.
a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things
By clicking which key the PubNub will display public, subscribe, and secret keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
The messageChannel class declares the _ class attribute that defines the key string.
a) command_key
b) command-key
c) commandkey
d) Key_command
method saves the received arguments in three attributes.
a) Init
b) Init
c) Init
d) _init_
and saves the publish and subscribe keys that we have generated with the
PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe
specifies the function that will be called when there is a new message received from
the channel.
a) Reconnect
b) Error
c) Connect
d) Callback
Specifies the function that will be called when a successful connection with the
PubNub cloud.
a) Callback
b) Error
c) Connect
d) Reconnect
The message is sent to the input queue of a message flow that contains a _
a) Subscriber
b) Server
c) Publication node
d) Client
ROSTOPIC uses at the command line for representing the content of the message.
a) YAML_syntax
b) rostopic bw
c) rostopic delay
d) rostopic echo
Which command displays the band width?
a) rostopic hz
b) rostopic delay
c) rostopic echo
d) rostopic bw
Every call to publish() will return a class that conforms to the interface.
a) Batch
b) Client
c) Server
d) Future
Mobile Cloud applications move the Power and away from mobile
phone and into cloud.
a) Computing and internet
b) Data storage and computing
c) Computing and data storage
d) Internet and computing
SaaS stands for
a) Service as a Smartphone
b) Service as a software
c) Smartphone as a service
d) Software as a Service
PaaS stands as
a) Platform as a Software
b) Photo as a service
c) Platform as a Service
d) Photo as a Software
The architecture of MCC is such that various mobile devices are connected to their respective
mobile networks via
a) Software
b) Satellite
c) Access point
d) Base Station
The part of the code which involves complex computations and requires more time to execute is
referred to as _
a) Static session
b) Threshold session
c) Dynamic session
d) Critical session
Which of the following offers external chips for memory and peripheral interface circuits?
a) Microcontroller
b) Microprocessor
c) Peripheral system
d) Embedded system
What is CISC?
a) Computing instruction set complex
b) Complex instruction set computing
c) Complimentary instruction set computing
d) Complex instruction set complementary
Which of the following provides a buffer between the user and the low-level interfaces to the
hardware?
a) operating system
b) kernel
c) software
d) hardware
Which of the following enables the user to utilise the system efficiently?
a) kernel
b) operating system
c) software
d) hardware
Which of the following can make the application program hardware independent?
a) software
b) application manager
c) operating system
d) kernel
Which of the following are not dependent on the actual hardware performing the physical task?
a) applications
b) hardware
c) registers
d) parameter block
Which of the following bus can easily upgrade the system hardware?
a) control bus
b) data bus
c) VMEbus
d) bus interface unit
Which of the following becomes a limiting factor while an application program has to be
complete?
a) memory
b) peripheral
c) input
d) output
Which of the following decides which task can have the next time slot?
a) single task operating system
b) applications
c) kernel
d) software
Which of the following controls the time slicing mechanism in a multitasking operating system?
a) kernel
b) single tasking kernel
c) multitasking kernel
d) application manager
Which of the following provides a time period for the context switch?
a) timer
b) counter
c) time slice
d) time machine
Which of the following stores all the task information that the system requires?
a) task access block
b) register
c) accumulator
d) task control block
Which of the following contains all the task and their status?
a) register
b) ready list
c) access list
d) task list
Which determines the sequence and the associated task’s priority?
a) scheduling algorithm
b) ready list
c) task control block
d) application register
Which of the following can implement the message passing and control?
a) application software
b) operating system
c) software
d) kernel
How many types of messages are associated with the real-time operating system?
a) 2
b) 3
c) 4
d) 5
What are the essential tight constraint/s related to the design metrics of an embedded system?
a. System
b. Behaviour
c. RT
d. Logic
a. Single-functioned Characteristic
b. Tightly-constraint Characteristics
c. Reactive & Real time Characteristics
d. All of the above
What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
a) 65
b) 65-D
c) 67
d) 70
What is the punishment in India for stealing computer documents, assets or any software’s
source code from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000
What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components
Cracking digital identity of any individual or doing identity theft, comes under of IT
Act.
a) Section 65
b) Section 66
c) Section 68
d) Section 70
Download copy, extract data from an open system done fraudulently is treated as
a) cyber-warfare
b) cyber-security act
c) data-backup
d) cyber-crime
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around
Rs
a) 2 lacs
b) 3 lacs
c) 4 lacs
d) 5 lacs
How many years of imprisonment can an accused person face, if he/she comes under any cyber-
crime listed in section 66 of the Indian IT Act, 2000?
a) 1 year
b) 2 years
c) 3 years
d) 4 years
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-
crime that comes under of IT Act.
a) Section 66
b) Section 67
c) Section 68
d) Section 69
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes
sexually explicit digital content then under of IT Act, 2008 he/she has to pay a
legitimate amount of fine.
a) section 67-A
b) section 67-B
c) section 67-C
d) section 67-D
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of
years.
a) 2
b) 3
c) 4
d) 5
Using spy cameras in malls and shops to capture private parts of any person comes under
of IT Act, 2008.
a) Section 66
b) Section 67
c) Section 68
d) Section 69
Using spy cameras in malls and shops to capture private parts of any person comes under section
67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
a) True
b) False
Using of spy cameras in malls and shops to capture private parts of any person comes under
section 67 of IT Act, 2008 and is punished with imprisonment of
a) 2 years
b) 3 years
c) 4 years
d) 5 years
Which of the following attach is not used by LC4 to recover Windows password?
a) Brute-force attack
b) Dictionary attack
c) MiTM attack
d) Hybrid attacks
is the world’s most popular vulnerability scanner used in companies for checking
vulnerabilities in the network.
a) Wireshark
b) Nessus
c) Snort
d) WebInspect
5. ToneLoc is abbreviated as
a) Tone Locking
b) Tone Locator
c) Tone Locker
d) Tune Locator
is a platform that essentially keeps the log of data from networks, devices as
well as applications in a single location.
a) EventLog Analyser
b) NordVPN
c) Wireshark
d) PacketFilter Analyzer
. helps in protecting businesses against data breaches that may make threats
to cloud.
a) Centrify
b) Mailbox Exchange Recovery
c) Nessus
d) Dashline
is a popular corporate security tool that is used to detect the attack on email with
cloud only services.
a) Cain and Abel
b) Proofpoint
c) Angry IP Scanner
d) Ettercap
Which of the following deals with network intrusion detection and real-time traffic analysis?
a) John the Ripper
b) L0phtCrack
c) Snort
d) Nessus
Wireshark is a tool.
a) network protocol analysis
b) network connection security
c) connection analysis
d) defending malicious packet-filtering
is the sum of all the possible points in software or system where unauthorized users
can enter as well as extract data from the system.
a) Attack vector
b) Attack surface
c) Attack point
d) Attack arena
is the cyclic practice for identifying & classifying and then solving the
vulnerabilities in a system.
a) Bug protection
b) Bug bounty
c) Vulnerability measurement
d) Vulnerability management
Remote exploits is that type of exploits acts over any network to exploit on security
vulnerability.
a) True
b) False
type of exploit requires accessing to any vulnerable system for enhancing privilege for
an attacker to run the exploit.
a) Local exploits
b) Remote exploits
c) System exploits
d) Network exploits
is the timeframe from when the loophole in security was introduced till the time
when the bug was fixed.
a) Time-frame of vulnerability
b) Window of vulnerability
c) Time-lap of vulnerability
d) Entry-door of vulnerability
ISMS is abbreviated as _
a) Information Server Management System
b) Information Security Management Software
c) Internet Server Management System
d) Information Security Management System
has now evolved to be one of the most popular automated tools for unethical
hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
Leaking your company data to the outside network without prior permission of senior authority is
a crime.
a) True
b) False
Before performing any penetration test, through legal procedure, which key points listed below is
not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False
After performing the ethical hacker should never disclose client information to
other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
. helps to classify arguments and situations, better understand a cyber-crime and helps
to determine appropriate actions.
a) Cyber-ethics
b) Social ethics
c) Cyber-bullying
d) Corporate behaviour
A tries to formulate a web resource occupied or busy its users by flooding the
URL of the victim with unlimited requests than the server can handle.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
During a DoS attack, the regular traffic on the target will be either dawdling
down or entirely interrupted.
a) network
b) system
c) website
d) router
DoS is abbreviated as
a) Denial of Service
b) Distribution of Server
c) Distribution of Service
d) Denial of Server
A DoS attack coming from a large number of IP addresses, making it hard to manually filter or
crash the traffic from such sources is known as a _
a) GoS attack
b) PDoS attack
c) DoS attack
d) DDoS attack
Which of the following do not comes under network layer DoS flooding?
a) UDP flooding
b) HTTP Flooding
c) SYN flooding
d) NTP Amplification
Which of the following do not comes under network layer DoS flooding?
a) DNS amplification
b) UDP flooding
c) DNS query flooding
d) NTP Amplification
DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per
second (PPS).
a) True
b) False
A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network
infrastructures.
a) True
b) False
Which of the following type of data, phishers cannot steal from its target victims?
a) bank details
b) phone number
c) passwords
d) apps installed in the mobile
was the first type of phishing where the phishers developed an algorithm for
generating random credit card numbers.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
= voice + phishing.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Email-based phishing
. or smishing is one of the simplest types of phishing where the target victims
may get a fake order detail with a cancellation link.
a) Algo-based phishing
b) SMS phishing
c) Domain Phishing
d) Spear phishing
are programs or devices that capture the vital information from the target
network or particular network.
a) Routers
b) Trappers
c) Wireless-crackers
d) Sniffers
A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all
your data transmitted on its division.
a) True
b) False
A on the whole turns your system’s NIC to the licentious mode so that it can
listen to all your data transmitted on its division.
a) Phishing site
b) Sniffer tool
c) Password cracker
d) NIC cracker
In sniffing, the network traffic is not only supervised & locked but also be can
be altered in different ways to accomplish the attack.
a) passive
b) signal
c) network
d) active
are those devices which can be plugged into your network at the hardware
level & it can monitor traffic.
a) Hardware sniffers & analyzers
b) Hardware protocol analyzers
c) Hardware protocol sniffers
d) Hardware traffic sniffers and observers