mission patwari 2020 - gillzmentortest.com · an embedded device to control its functions. a. proxy...
TRANSCRIPT
![Page 1: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/1.jpg)
MISSION PATWARI 2020
SUBSCRIBE OUR CHANNEL
PATWARI COMPUTER MCQ
PART- 6
![Page 2: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/2.jpg)
1.______ is a small-scale data center or cluster of computers designed to provide cloud computing services to mobile devices. A. Sub B. Intelligent C. Drone D. Cloudlet E. None of these
Answer Ans – D. Cloudlet A cloudlet is a small-scale data center or cluster of computers designed to quickly provide cloud computing services to mobile devices, such as smartphones, tablets and wearable devices, within close geographical proximity
![Page 3: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/3.jpg)
2.______ is an exploit that takes advantage of a vulnerable device to gain access to a network. A. Device Attack B. Edge Computing C. Drone D. Cloudlet E. None of these Answer Ans – A. Device Attack Device Attack is an exploit that takes advantage of a vulnerable device to gain access to a network.
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
![Page 4: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/4.jpg)
3.______ is the exploiting of vulnerabilities in embedded software to gain control of the device. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both (A) and (C) Answer Ans – B. Embedded Device Hacking
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
![Page 5: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/5.jpg)
4._______ is the flash memory chip that stores specialized software running on a chip in an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both (A) and (C) Answer Ans – D. Embedded Firmware
5. _______ is a device which serves as the connection point between IoT devices and the cloud A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C)
![Page 6: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/6.jpg)
Answer Ans – B. IoT Gateway
6. ________ is software that serves as an interface between components of the IoT. A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C)
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020 Answer Ans – C. IoT Middleware IoT Middleware is software that serves as an interface between components of the IoT
![Page 7: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/7.jpg)
7. ______ is a group of hacked computers, smart appliances, and Internet-connected devices that have been co-opted for illicit purposes. A. IoT Botnet B. IoT Gateway C. IoT Middleware D. IoT Cloud E. Both (A) and (C) Answer Ans – A. IoT Botnet
8._________ is a larger transmission line that carries data gathered from smaller lines that interconnect with it. A. Backbone B. Intelligent C. Drone
![Page 8: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/8.jpg)
D. Cloudlet E. None of these Answer Ans – A. Backbone
9.Which of the following is the combination of Bridge and Router? A. Backbone B. Brouter C. Baseband D. Cloudlet E. None of these Answer Ans – B. Brouter
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
![Page 9: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/9.jpg)
10. Which of the following forwards packets to computer hosts within a network but not between networks? A. Edge Router B. Core Router C. Backbone D. All of these E. None of these Answer Ans – B. Core Router
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
![Page 10: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/10.jpg)
11._______ is a small piece of data sent from a website and stored on the user’s computer by the user’s web browser while the user is browsing A. Cache B. Tracking C. Cookie D. Server Free Backup E. None of these
Answer
Ans – C. Cookie Cookie is a small piece of data sent from a website and stored on the user’s computer by the user’s web browser while the user is browsing
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
![Page 11: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/11.jpg)
12.Which of the following is a cookie that is automatically recreated after being deleted? A. Super Cookie B. HTTP only Cookie C. Zombie Cookie D. Session Cookie E. None of these
Answer
Ans – C. Zombie Cookie Zombie Cookie is a cookie that is automatically recreated after being deleted
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
![Page 12: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/12.jpg)
13.________ exists only in temporary memory while the user navigates the website. A. Super Cookie B. HTTP only Cookie C. Zombie Cookie D. Session Cookie E. None of these
Answer
Ans – D. Session Cookie
14.Session Cookie is also known as ____. A. Super Cookie
![Page 13: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/13.jpg)
B. Transient Cookie C. In-memory Cookie D. Both (A) and (B) E. Both (B) and (C)
Answer
Ans – E. Both (B) and (C)
15.______ expires at a specific date or after a specific length of time A. Super Cookie B. Persistent Cookie C. Zombie Cookie D. Session Cookie E. None of these
Answer
Ans – B. Persistent Cookie
![Page 14: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/14.jpg)
16.Persistent cookies are sometimes referred to as ______ A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Both (B) and (C)
Answer
Ans – D. Tracking Cookie Persistent cookies are sometimes referred to as Tracking Cookies.
17.A _________ can only be transmitted over an encrypted connection
![Page 15: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/15.jpg)
A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie
Answer
Ans – E. Secure Cookie
18.________is a cookie with an origin of a top-level domain A. Super Cookie B. Transient Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie
Answer
Ans – A. Super Cookie
![Page 16: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/16.jpg)
19.________ cannot be accessed by client-side APIs, such as JavaScript. A. Super Cookie B. HTTP Cookie C. In-memory Cookie D. Tracking Cookie E. Secure Cookie
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
Answer
Ans – B. HTTP Cookie
![Page 17: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/17.jpg)
20.A cookie consists of ______ A. Name B. Value C. Zero or More Attributes D. All of these E. None of these
Answer
Ans – D. All of these
SUBSCRIBE OUR CHANNEL MISSION PATWARI 2020
![Page 18: MISSION PATWARI 2020 - gillzmentortest.com · an embedded device to control its functions. A. Proxy Hacking B. Embedded Device Hacking C. Proxy Hijacking D. Embedded Firmware E. Both](https://reader036.vdocuments.mx/reader036/viewer/2022081613/5fbe377ee45dca19a043c696/html5/thumbnails/18.jpg)
MISSION PATWARI 2020
SUBSCRIBE OUR CHANNEL