Information Cyber Security (ICS) Solved MCQs

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide

301.

Network administrators can create their own ACL rules based on _______ ________ and _______

A. address, protocols and packet attributes
B. address, protocols and security policies
C. address, policies and packet attributes
D. network topology, protocols and data packets
Answer» A. address, protocols and packet attributes
302.

One advantage of Packet Filtering firewall is __________

A. more efficient
B. less complex
C. less costly
D. very fast
Answer» C. less costly
303.

Packet filtering firewalls work effectively in _________ networks.

A. very simple
B. smaller
C. large
D. very large complex
Answer» B. smaller
304.

Packet filtering firewalls are vulnerable to __________

A. hardware vulnerabilities
B. mitm
C. phishing
D. spoofing
Answer» D. spoofing
305.

Circuit-level gateway firewalls are installed in _______ layer of OSI model.

A. application layer
B. session layer
C. presentation layer
D. network layer
Answer» B. session layer
306.

Which of these comes under the advantage of Circuit-level gateway firewalls?

A. they maintain anonymity and also inexpensive
B. they are light-weight
C. they’re expensive yet efficient
D. they preserve ip address privacy yet expensive
Answer» A. they maintain anonymity and also inexpensive
307.

Which of the following is a disadvantage of Circuit-level gateway firewalls?

A. they’re expensive
B. they’re complex in architecture
C. they do not filter individual packets
D. they’re complex to setup
Answer» C. they do not filter individual packets
308.

_____________ gateway firewalls are deployed in application-layer of OSI model.

A. packet filtering firewalls
B. circuit level gateway firewalls
C. application-level gateway firewalls
D. stateful multilayer inspection firewalls
Answer» C. application-level gateway firewalls
309.

Application level gateway firewalls protect the network for specific _____________

A. application layer protocol
B. session layer protocol
C. botnet attacks
D. network layer protocol
Answer» A. application layer protocol
310.

Application level gateway firewalls are also used for configuring cache-servers.

A. true
B. false
Answer» A. true
311.

Packet filtering firewalls are also called ____________

A. first generation firewalls
B. second generation firewalls
C. third generation firewalls
D. fourth generation firewalls
Answer» A. first generation firewalls
312.

Application layer firewalls are also called ____________

A. first generation firewalls
B. second generation firewalls
C. third generation firewalls
D. fourth generation firewalls
Answer» C. third generation firewalls
313.

Cyber-crime can be categorized into ________ types.

A. 4
B. 3
C. 2
D. 6
Answer» C. 2
314.

Accessing computer without prior authorization is a cyber-crimes that come under _______

A. section 65
B. section 66
C. section 68
D. section 70
Answer» B. section 66
315.

Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

A. section 65
B. section 66
C. section 68
D. section 70
Answer» B. section 66
316.

Accessing Wi-Fi dishonestly is a cyber-crime.

A. true
B. false
Answer» A. true
317.

Download copy, extract data from an open system done fraudulently is treated as _________

A. cyber-warfare
B. cyber-security act
C. data-backup
D. cyber-crime
Answer» D. cyber-crime
318.

Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

A. 2 lacs
B. 3 lacs
C. 4 lacs
D. 5 lacs
Answer» D. 5 lacs
319.

How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

A. 1 year
B. 2 years
C. 3 years
D. 4 years
Answer» C. 3 years
320.

Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

A. section 66
B. section 67
C. section 68
D. section 69
Answer» B. section 67
321.

IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

A. section 67-a
B. section 67-b
C. section 67-c
D. section 67-d
Answer» A. section 67-a
322.

If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
323.

Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

A. section 66
B. section 67
C. section 68
D. section 69
Answer» B. section 67
324.

Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.

A. true
B. false
Answer» A. true
325.

Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

A. 2 years
B. 3 years
C. 4 years
D. 5 years
Answer» B. 3 years
Tags
Question and answers in Information Cyber Security (ICS), Information Cyber Security (ICS) multiple choice questions and answers, Information Cyber Security (ICS) Important MCQs, Solved MCQs for Information Cyber Security (ICS), Information Cyber Security (ICS) MCQs with answers PDF download

Help us improve!

We want to make our service better for you. Please take a moment to fill out our survey.

Take Survey