Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
301. |
Network administrators can create their own ACL rules based on _______ ________ and _______ |
A. | address, protocols and packet attributes |
B. | address, protocols and security policies |
C. | address, policies and packet attributes |
D. | network topology, protocols and data packets |
Answer» A. address, protocols and packet attributes |
302. |
One advantage of Packet Filtering firewall is __________ |
A. | more efficient |
B. | less complex |
C. | less costly |
D. | very fast |
Answer» C. less costly |
303. |
Packet filtering firewalls work effectively in _________ networks. |
A. | very simple |
B. | smaller |
C. | large |
D. | very large complex |
Answer» B. smaller |
304. |
Packet filtering firewalls are vulnerable to __________ |
A. | hardware vulnerabilities |
B. | mitm |
C. | phishing |
D. | spoofing |
Answer» D. spoofing |
305. |
Circuit-level gateway firewalls are installed in _______ layer of OSI model. |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | network layer |
Answer» B. session layer |
306. |
Which of these comes under the advantage of Circuit-level gateway firewalls? |
A. | they maintain anonymity and also inexpensive |
B. | they are light-weight |
C. | they’re expensive yet efficient |
D. | they preserve ip address privacy yet expensive |
Answer» A. they maintain anonymity and also inexpensive |
307. |
Which of the following is a disadvantage of Circuit-level gateway firewalls? |
A. | they’re expensive |
B. | they’re complex in architecture |
C. | they do not filter individual packets |
D. | they’re complex to setup |
Answer» C. they do not filter individual packets |
308. |
_____________ gateway firewalls are deployed in application-layer of OSI model. |
A. | packet filtering firewalls |
B. | circuit level gateway firewalls |
C. | application-level gateway firewalls |
D. | stateful multilayer inspection firewalls |
Answer» C. application-level gateway firewalls |
309. |
Application level gateway firewalls protect the network for specific _____________ |
A. | application layer protocol |
B. | session layer protocol |
C. | botnet attacks |
D. | network layer protocol |
Answer» A. application layer protocol |
310. |
Application level gateway firewalls are also used for configuring cache-servers. |
A. | true |
B. | false |
Answer» A. true |
311. |
Packet filtering firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» A. first generation firewalls |
312. |
Application layer firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» C. third generation firewalls |
313. |
Cyber-crime can be categorized into ________ types. |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 6 |
Answer» C. 2 |
314. |
Accessing computer without prior authorization is a cyber-crimes that come under _______ |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» B. section 66 |
315. |
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» B. section 66 |
316. |
Accessing Wi-Fi dishonestly is a cyber-crime. |
A. | true |
B. | false |
Answer» A. true |
317. |
Download copy, extract data from an open system done fraudulently is treated as _________ |
A. | cyber-warfare |
B. | cyber-security act |
C. | data-backup |
D. | cyber-crime |
Answer» D. cyber-crime |
318. |
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________ |
A. | 2 lacs |
B. | 3 lacs |
C. | 4 lacs |
D. | 5 lacs |
Answer» D. 5 lacs |
319. |
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000? |
A. | 1 year |
B. | 2 years |
C. | 3 years |
D. | 4 years |
Answer» C. 3 years |
320. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» B. section 67 |
321. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. |
A. | section 67-a |
B. | section 67-b |
C. | section 67-c |
D. | section 67-d |
Answer» A. section 67-a |
322. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 |
323. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» B. section 67 |
324. |
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs. |
A. | true |
B. | false |
Answer» A. true |
325. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ |
A. | 2 years |
B. | 3 years |
C. | 4 years |
D. | 5 years |
Answer» B. 3 years |
We want to make our service better for you. Please take a moment to fill out our survey.
Take Survey