McqMate
301. |
Network administrators can create their own ACL rules based on _______ ________ and _______ |
A. | address, protocols and packet attributes |
B. | address, protocols and security policies |
C. | address, policies and packet attributes |
D. | network topology, protocols and data packets |
Answer» A. address, protocols and packet attributes |
302. |
One advantage of Packet Filtering firewall is __________ |
A. | more efficient |
B. | less complex |
C. | less costly |
D. | very fast |
Answer» C. less costly |
303. |
Packet filtering firewalls work effectively in _________ networks. |
A. | very simple |
B. | smaller |
C. | large |
D. | very large complex |
Answer» B. smaller |
304. |
Packet filtering firewalls are vulnerable to __________ |
A. | hardware vulnerabilities |
B. | mitm |
C. | phishing |
D. | spoofing |
Answer» D. spoofing |
305. |
Circuit-level gateway firewalls are installed in _______ layer of OSI model. |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | network layer |
Answer» B. session layer |
306. |
Which of these comes under the advantage of Circuit-level gateway firewalls? |
A. | they maintain anonymity and also inexpensive |
B. | they are light-weight |
C. | they’re expensive yet efficient |
D. | they preserve ip address privacy yet expensive |
Answer» A. they maintain anonymity and also inexpensive |
307. |
Which of the following is a disadvantage of Circuit-level gateway firewalls? |
A. | they’re expensive |
B. | they’re complex in architecture |
C. | they do not filter individual packets |
D. | they’re complex to setup |
Answer» C. they do not filter individual packets |
308. |
_____________ gateway firewalls are deployed in application-layer of OSI model. |
A. | packet filtering firewalls |
B. | circuit level gateway firewalls |
C. | application-level gateway firewalls |
D. | stateful multilayer inspection firewalls |
Answer» C. application-level gateway firewalls |
309. |
Application level gateway firewalls protect the network for specific _____________ |
A. | application layer protocol |
B. | session layer protocol |
C. | botnet attacks |
D. | network layer protocol |
Answer» A. application layer protocol |
310. |
Application level gateway firewalls are also used for configuring cache-servers. |
A. | true |
B. | false |
Answer» A. true |
311. |
Packet filtering firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» A. first generation firewalls |
312. |
Application layer firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» C. third generation firewalls |
313. |
Cyber-crime can be categorized into ________ types. |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 6 |
Answer» C. 2 |
314. |
Accessing computer without prior authorization is a cyber-crimes that come under _______ |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» B. section 66 |
315. |
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» B. section 66 |
316. |
Accessing Wi-Fi dishonestly is a cyber-crime. |
A. | true |
B. | false |
Answer» A. true |
317. |
Download copy, extract data from an open system done fraudulently is treated as _________ |
A. | cyber-warfare |
B. | cyber-security act |
C. | data-backup |
D. | cyber-crime |
Answer» D. cyber-crime |
318. |
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________ |
A. | 2 lacs |
B. | 3 lacs |
C. | 4 lacs |
D. | 5 lacs |
Answer» D. 5 lacs |
319. |
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000? |
A. | 1 year |
B. | 2 years |
C. | 3 years |
D. | 4 years |
Answer» C. 3 years |
320. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» B. section 67 |
321. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. |
A. | section 67-a |
B. | section 67-b |
C. | section 67-c |
D. | section 67-d |
Answer» A. section 67-a |
322. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 |
323. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» B. section 67 |
324. |
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs. |
A. | true |
B. | false |
Answer» A. true |
325. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ |
A. | 2 years |
B. | 3 years |
C. | 4 years |
D. | 5 years |
Answer» B. 3 years |
326. |
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 71 |
D. | section 72 |
Answer» D. section 72 |
327. |
Sending offensive message to someone comes under _____________ of the Indian IT Act ______ |
A. | section 66-a, 2000 |
B. | section 66-b, 2008 |
C. | section 67, 2000 |
D. | section 66-a, 2008 |
Answer» D. section 66-a, 2008 |
328. |
Stealing of digital files comes under __________ of the Indian IT Act. |
A. | section 66-a |
B. | section 66-b |
C. | section 66-c |
D. | section 66-d |
Answer» C. section 66-c |
329. |
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense. |
A. | true |
B. | false |
Answer» A. true |
330. |
Security Measures Needed to protect during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» B. data |
331. |
means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» C. information |
332. |
Prevention of the unauthorised used of Resources refers too? |
A. | data integrity |
B. | data confidentiality |
C. | acess control |
D. | none of these |
Answer» C. acess control |
333. |
Protection against Denial by one of these parties in a communication refers to? |
A. | non-repudiation |
B. | data integrity |
C. | authentication |
D. | none of these |
Answer» A. non-repudiation |
334. |
Which One of them is Passive attack? |
A. | denial of service |
B. | modify message in transit |
C. | replay previous message |
D. | obtain message contain |
Answer» D. obtain message contain |
335. |
What is lying of IP address called as? |
A. | ip spoofing |
B. | ip scamming |
C. | ip lying |
D. | none of theses |
Answer» A. ip spoofing |
336. |
What is full form of DDoS? |
A. | derived denial of service |
B. | distributed denial of service |
C. | denial of service |
D. | none of these |
Answer» B. distributed denial of service |
337. |
A hacker guessing suggested password to a program is call as? |
A. | password guessing |
B. | dictionary attack |
C. | default password attack |
D. | none of these |
Answer» C. default password attack |
338. |
Symmetric key encryption is also called as? |
A. | public key encryption |
B. | private key encryption |
C. | both of these |
D. | none of these |
Answer» B. private key encryption |
339. |
Conversion of Cypher text to plain text? |
A. | encryption |
B. | decryption |
C. | simple text |
D. | none of these |
Answer» B. decryption |
340. |
is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» A. program policy |
341. |
An act of protecting information from unauthorised disclouser to an entity.- |
A. | intergrity |
B. | avability |
C. | confidentiality |
D. | none of these |
Answer» C. confidentiality |
342. |
A way to ensure that the entity is indeed what it claims to be.- |
A. | authentication |
B. | accountability |
C. | identification |
D. | security |
Answer» A. authentication |
343. |
The model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» B. osi |
344. |
The full form of OSI is OSI model . |
A. | open systems interconnection |
B. | open software interconnection |
C. | open connection |
D. | open system internet |
Answer» A. open systems interconnection |
345. |
The technique in which when one character is replaced by another Character is called as? |
A. | transposition |
B. | substitution |
C. | combinational |
D. | none of these |
Answer» B. substitution |
346. |
Conversion of plain text into Cipher text is called as . |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» A. encryption |
347. |
In Symmetric schemes requires both parties to share how many secret key? |
A. | one |
B. | two |
C. | three |
D. | four |
Answer» A. one |
348. |
Blum Blum Shub Generator is based on which Algorithm? |
A. | private key |
B. | public key |
C. | both a & b |
D. | none of these |
Answer» B. public key |
349. |
In DES step both LPT and RPT undergoes in how much key Rounds? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» B. 16 |
350. |
What is the 4th step in DES Algorithm? |
A. | key transformation |
B. | s-box substitution |
C. | p-box permutation |
D. | expansion permutation |
Answer» C. p-box permutation |
351. |
In AES in which Round Subkeys are Generated from Original key for each round? |
A. | key expansion |
B. | initial round |
C. | finale round |
D. | none of these |
Answer» A. key expansion |
352. |
AES stands for? |
A. | authorized encryption standard |
B. | advance encryption standard |
C. | advance encryption strategy |
D. | none of these |
Answer» B. advance encryption standard |
353. |
Which of them is type of Cipher? |
A. | stream cipher |
B. | block cipher |
C. | both of them |
D. | none of these |
Answer» C. both of them |
354. |
The message which is not understandable is called as? |
A. | cipher text |
B. | plain text |
C. | hidden text |
D. | both a & c |
Answer» A. cipher text |
355. |
The is a polygraphic substitution cipher based on linear algebra. |
A. | hill cipher |
B. | playfair cipher |
C. | affine cipher |
D. | none of these |
Answer» A. hill cipher |
356. |
is the practice of concealing a message within another message,image or file. |
A. | steganography |
B. | cryptography |
C. | cipher |
D. | receiver |
Answer» A. steganography |
357. |
In asymmetric key cryptography, the private key is kept by |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | none of these |
Answer» B. receiver |
358. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | byte cipher |
Answer» A. block cipher |
359. |
In cryptography the original message before being transform is called |
A. | simple text |
B. | plain text |
C. | empty text |
D. | filled text |
Answer» B. plain text |
360. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» A. 1 key |
361. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
A. | short |
B. | flat |
C. | long |
D. | thin |
Answer» C. long |
362. |
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not |
A. | authenticated |
B. | joined |
C. | submit |
D. | separate |
Answer» A. authenticated |
363. |
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to |
A. | other |
B. | data |
C. | keys |
D. | each other |
Answer» D. each other |
364. |
For RSA to work, the value of P must be less than the value of |
A. | p |
B. | q |
C. | n |
D. | r |
Answer» C. n |
365. |
In RSA, Ф(n) = in terms of p and q. |
A. | (p)/(q) |
B. | (p)(q) |
C. | (p-1)(q-1) |
D. | (p+1)(q+1) |
Answer» C. (p-1)(q-1) |
366. |
In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n). |
A. | true |
B. | false |
Answer» B. false |
367. |
RSA is also a stream cipher like Merkel-Hellman. |
A. | true |
B. | false |
Answer» A. true |
368. |
USENET falls under which category of public key sharing? |
A. | public announcement |
B. | publicly available directory |
C. | public key authority |
D. | public key certificate |
Answer» A. public announcement |
369. |
PGP makes use of which cryptographic algorithm? |
A. | rsa |
B. | aes |
C. | des |
D. | robin |
Answer» A. rsa |
370. |
Public key cryptography also called as |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | both a and b |
D. | none of the above |
Answer» A. asymmetric key cryptography |
371. |
ECC stands for |
A. | elliptic curve cryptography |
B. | elliptic cryptography curve |
C. | error correcting code |
D. | none of the above |
Answer» A. elliptic curve cryptography |
372. |
Diffie-Hellman algorithm is widely known as |
A. | key exchange algorithm |
B. | key agreement algorithm |
C. | only a |
D. | both a and b |
Answer» D. both a and b |
373. |
Hash function is used for |
A. | message authentication |
B. | digital signature |
C. | both a and b |
D. | only a |
Answer» C. both a and b |
374. |
RSA algorithm is best example of |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | elliptic curve cryptography |
D. | all of the above |
Answer» A. asymmetric key cryptography |
375. |
IPSec is designed to provide security at the |
A. | transport layer |
B. | network layer |
C. | application layer |
D. | session layer |
Answer» B. network layer |
376. |
In tunnel mode, IPSec protects the |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» A. entire ip packet |
377. |
HTTPS is abbreviated as |
A. | secured hyper hypertexts transfer text transfer protocol secured protocol |
B. | none of the mentioned |
C. | hyperlinked text transfer protocol secured |
D. | hyper text transfer protocol secure |
Answer» D. hyper text transfer protocol secure |
378. |
An attempt to make a computer resource unavailable to its intended users is called |
A. | denial-of-service attack |
B. | virus attack |
C. | worms attack |
D. | botnet process |
Answer» A. denial-of-service attack |
379. |
SSL primarily focuses on Pretty good privacy (PGP) is used in |
A. | integrity and authenticity |
B. | integrity and non- repudiation |
C. | authenticity and privacy |
D. | confidentiality and integrity |
Answer» A. integrity and authenticity |
380. |
is used for encrypting data at network level |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» A. ipsec |
381. |
WPA2 is used for security in |
A. | ethernet |
B. | wi-fi |
C. | bluetooth |
D. | |
Answer» B. wi-fi |
382. |
Which of the following is not a strong security protocol |
A. | ssl |
B. | httpl |
C. | smtp |
D. | sftp |
Answer» C. smtp |
383. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection. |
A. | true |
B. | false |
Answer» A. true |
384. |
IPSec operates in..... different modes |
A. | 3 |
B. | 2 |
C. | 4 |
D. | 5 |
Answer» B. 2 |
385. |
length of the IPv4 address is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» A. 32 bits |
386. |
Internet Key Exchange has .... phases and modes of operations |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 5 |
Answer» C. 2 |
387. |
PGP is abbreviated as |
A. | pretty good privacy |
B. | pretty good policy |
C. | policy good privacy |
D. | pretty good protection |
Answer» A. pretty good privacy |
388. |
SET stands for |
A. | set electronic transaction |
B. | secure electronic transaction |
C. | simple electronic transaction |
D. | none of the above |
Answer» B. secure electronic transaction |
389. |
Transport layer Protocol consists of ... main components |
A. | 2 |
B. | 1 |
C. | 3 |
D. | 4 |
Answer» A. 2 |
390. |
length of the IPv6 acddress is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» B. 64 bits |
391. |
SSL provides . |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» D. all of the above |
392. |
IPSec provides ....protocols for network layer |
A. | 7 |
B. | 3 |
C. | 1 |
D. | 4 |
Answer» A. 7 |
393. |
length of the IPv6 header is.... |
A. | 64 bits |
B. | 16 bits |
C. | 32 bits |
D. | 8 bits |
Answer» C. 32 bits |
394. |
According to the CIA Triad, which of the below-mentioned element is not considered in the triad? |
A. | confidentiality |
B. | integrity |
C. | authenticity |
D. | availability |
Answer» C. authenticity |
395. |
CIA triad is also known as |
A. | nic (non-repudiation, integrity, confidentiality) |
B. | aic (availability, integrity, confidentiality) |
C. | ain (availability, integrity, non-repudiation) |
D. | aic (authenticity, integrity, confidentiality) |
Answer» B. aic (availability, integrity, confidentiality) |
396. |
of information means, only authorised users are capable of accessing the information. |
A. | confidentiality |
B. | integrity |
C. | non-repudiation |
D. | availability |
Answer» A. confidentiality |
397. |
means the protection of data from modification by unknown users. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | non-repudiation |
Answer» B. integrity |
398. |
When you use the word it means you are protecting your data from getting disclosed. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | availability |
Answer» A. confidentiality |
399. |
When integrity is lacking in a security system, occurs. |
A. | database hacking |
B. | data deletion |
C. | data tampering |
D. | data leakage |
Answer» C. data tampering |
400. |
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? |
A. | they help understanding hacking better |
B. | they are key elements to a security breach |
C. | they help understands security and its components better |
D. | they help to understand the cyber-crime better |
Answer» C. they help understands security and its components better |
Done Reading?