In the course of conducting forensic analysis, which of the following actions are carried out?

Question:

In the course of conducting forensic analysis, which of the following actions are carried out?

A.

critical thinking

B.

fusion

C.

validation

D.

all of the above

Answer» d. all of the above

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which one of the following is a cryptographic protocol used to secure HTTP connection?

Question:

Which one of the following is a cryptographic protocol used to secure HTTP connection?

A.

stream control transmission protocol (sctp)

B.

transport layer security (tsl)

C.

explicit congestion notification (ecn)

D.

resource reservation protocol

Answer» b. transport layer security (tsl)

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which of the following are supervised learning applications

Question:

Which of the following are supervised learning applications

A.

spam detection, pattern detection, natural language processing

B.

image classification, real-time visual tracking

C.

autonomous car driving, logistic optimization

D.

bioinformatics, speech recognition

Answer» a. spam detection, pattern detection, natural language processing

Note: The above multiple-choice question is for all general and Competitive Exams in India

The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format

Question:

The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format

A.

8

B.

7

C.

3

D.

5

Answer» b. 7

Note: The above multiple-choice question is for all general and Competitive Exams in India

The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

Question:

The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

A.

vulnerability attack

B.

bandwidth flooding

C.

connection flooding

D.

all of the mentioned

Answer» c. connection flooding

Note: The above multiple-choice question is for all general and Competitive Exams in India

HTTP client requests by establishing a __________ connection to a particular port on the server.

Question:

HTTP client requests by establishing a __________ connection to a particular port on the server.

A.

user datagram protocol

B.

transmission control protocol

C.

broader gateway protocol

D.

none of the mentioned

Answer» b. transmission control protocol

Note: The above multiple-choice question is for all general and Competitive Exams in India

A point-to-point protocol over ethernet is a network protocol for

Question:

A point-to-point protocol over ethernet is a network protocol for

A.

encapsulating ppp frames inside ethernet frames

B.

encapsulating ehternet framse inside ppp frames

C.

for security of ethernet frames

D.

for security of ppp frames

Answer» a. encapsulating ppp frames inside ethernet frames

Note: The above multiple-choice question is for all general and Competitive Exams in India