380+ Information Cyber Security (ICS) Solved MCQs

301.

Network administrators can create their own ACL rules based on _______ ________ and _______

A. address, protocols and packet attributes
B. address, protocols and security policies
C. address, policies and packet attributes
D. network topology, protocols and data packets
Answer» A. address, protocols and packet attributes
302.

One advantage of Packet Filtering firewall is __________

A. more efficient
B. less complex
C. less costly
D. very fast
Answer» C. less costly
303.

Packet filtering firewalls work effectively in _________ networks.

A. very simple
B. smaller
C. large
D. very large complex
Answer» B. smaller
304.

Packet filtering firewalls are vulnerable to __________

A. hardware vulnerabilities
B. mitm
C. phishing
D. spoofing
Answer» D. spoofing
305.

Circuit-level gateway firewalls are installed in _______ layer of OSI model.

A. application layer
B. session layer
C. presentation layer
D. network layer
Answer» B. session layer
306.

Which of these comes under the advantage of Circuit-level gateway firewalls?

A. they maintain anonymity and also inexpensive
B. they are light-weight
C. they’re expensive yet efficient
D. they preserve ip address privacy yet expensive
Answer» A. they maintain anonymity and also inexpensive
307.

Which of the following is a disadvantage of Circuit-level gateway firewalls?

A. they’re expensive
B. they’re complex in architecture
C. they do not filter individual packets
D. they’re complex to setup
Answer» C. they do not filter individual packets
308.

_____________ gateway firewalls are deployed in application-layer of OSI model.

A. packet filtering firewalls
B. circuit level gateway firewalls
C. application-level gateway firewalls
D. stateful multilayer inspection firewalls
Answer» C. application-level gateway firewalls
309.

Application level gateway firewalls protect the network for specific _____________

A. application layer protocol
B. session layer protocol
C. botnet attacks
D. network layer protocol
Answer» A. application layer protocol
310.

Application level gateway firewalls are also used for configuring cache-servers.

A. true
B. false
Answer» A. true
311.

Packet filtering firewalls are also called ____________

A. first generation firewalls
B. second generation firewalls
C. third generation firewalls
D. fourth generation firewalls
Answer» A. first generation firewalls
312.

Application layer firewalls are also called ____________

A. first generation firewalls
B. second generation firewalls
C. third generation firewalls
D. fourth generation firewalls
Answer» C. third generation firewalls
313.

Cyber-crime can be categorized into ________ types.

A. 4
B. 3
C. 2
D. 6
Answer» C. 2
314.

Accessing computer without prior authorization is a cyber-crimes that come under _______

A. section 65
B. section 66
C. section 68
D. section 70
Answer» B. section 66
315.

Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

A. section 65
B. section 66
C. section 68
D. section 70
Answer» B. section 66
316.

Accessing Wi-Fi dishonestly is a cyber-crime.

A. true
B. false
Answer» A. true
317.

Download copy, extract data from an open system done fraudulently is treated as _________

A. cyber-warfare
B. cyber-security act
C. data-backup
D. cyber-crime
Answer» D. cyber-crime
318.

Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

A. 2 lacs
B. 3 lacs
C. 4 lacs
D. 5 lacs
Answer» D. 5 lacs
319.

How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

A. 1 year
B. 2 years
C. 3 years
D. 4 years
Answer» C. 3 years
320.

Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

A. section 66
B. section 67
C. section 68
D. section 69
Answer» B. section 67
321.

IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

A. section 67-a
B. section 67-b
C. section 67-c
D. section 67-d
Answer» A. section 67-a
322.

If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
323.

Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

A. section 66
B. section 67
C. section 68
D. section 69
Answer» B. section 67
324.

Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.

A. true
B. false
Answer» A. true
325.

Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

A. 2 years
B. 3 years
C. 4 years
D. 5 years
Answer» B. 3 years
326.

Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

A. section 65
B. section 66
C. section 71
D. section 72
Answer» D. section 72
327.

Sending offensive message to someone comes under _____________ of the Indian IT Act ______

A. section 66-a, 2000
B. section 66-b, 2008
C. section 67, 2000
D. section 66-a, 2008
Answer» D. section 66-a, 2008
328.

Stealing of digital files comes under __________ of the Indian IT Act.

A. section 66-a
B. section 66-b
C. section 66-c
D. section 66-d
Answer» C. section 66-c
329.

Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.

A. true
B. false
Answer» A. true
330.

Security Measures Needed to protect during their transmission

A. file
B. data
C. packet
D. all of above
Answer» B. data
331.

                      means knowledge obtained from investigation, study , intelligence new ,facts .

A. security
B. data
C. information
D. none of these
Answer» C. information
332.

Which One of them is Passive attack?

A. denial of service
B. modify message in transit
C. replay previous message
D. obtain message contain
Answer» D. obtain message contain
333.

What is full form of DDoS?

A. derived denial of service
B. distributed denial of service
C. denial of service
D. none of these
Answer» B. distributed denial of service
334.

Symmetric key encryption is also called as?

A. public key encryption
B. private key encryption
C. both of these
D. none of these
Answer» B. private key encryption
335.

    is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» A. program policy
336.

The model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» B. osi
337.

The full form of OSI is OSI model .

A. open systems interconnection
B. open software interconnection
C. open connection
D. open system internet
Answer» A. open systems interconnection
338.

Conversion of plain text into Cipher text is called as .

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» A. encryption
339.

The is a polygraphic substitution cipher based on linear algebra.

A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Answer» A. hill cipher
340.

    is the practice of concealing a message within another message,image or file.

A. steganography
B. cryptography
C. cipher
D. receiver
Answer» A. steganography
341.

In asymmetric key cryptography, the private key is kept by                        

A. sender
B. receiver
C. sender and receiver
D. none of these
Answer» B. receiver
342.

What is data encryption standard (DES)?

A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher
Answer» A. block cipher
343.

In cryptography the original message before being transform is called

A. simple text
B. plain text
C. empty text
D. filled text
Answer» B. plain text
344.

An asymmetric-key (or public-key) cipher uses

A. 1 key
B. 2 key
C. 3 key
D. 4 key
Answer» A. 1 key
345.

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A. short
B. flat
C. long
D. thin
Answer» C. long
346.

The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

A. authenticated
B. joined
C. submit
D. separate
Answer» A. authenticated
347.

In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

A. other
B. data
C. keys
D. each other
Answer» D. each other
348.

In RSA, Ф(n) = in terms of p and q.

A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Answer» C. (p-1)(q-1)
349.

USENET falls under which category of public key sharing?

A. public announcement
B. publicly available directory
C. public key authority
D. public key certificate
Answer» A. public announcement
350.

Public key cryptography also called as                   

A. asymmetric key cryptography
B. symmetric key cryptography
C. both a and b
D. none of the above
Answer» A. asymmetric key cryptography
351.

Diffie-Hellman algorithm is widely known as                     

A. key exchange algorithm
B. key agreement algorithm
C. only a
D. both a and b
Answer» D. both a and b
352.

Hash function is used for                   

A. message authentication
B. digital signature
C. both a and b
D. only a
Answer» C. both a and b
353.

RSA algorithm is best example of                 

A. asymmetric key cryptography
B. symmetric key cryptography
C. elliptic curve cryptography
D. all of the above
Answer» A. asymmetric key cryptography
354.

IPSec is designed to provide security at the                      

A. transport layer
B. network layer
C. application layer
D. session layer
Answer» B. network layer
355.

In tunnel mode, IPSec protects the               

A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Answer» A. entire ip packet
356.

HTTPS is abbreviated as                      

A. secured hyper hypertexts transfer text transfer protocol secured protocol
B. none of the mentioned
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Answer» D. hyper text transfer protocol secure
357.

An attempt to make a computer resource unavailable to its intended users is called               

A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Answer» A. denial-of-service attack
358.

SSL primarily focuses on                   Pretty good privacy (PGP) is used in               

A. integrity and authenticity
B. integrity and non- repudiation
C. authenticity and privacy
D. confidentiality and integrity
Answer» A. integrity and authenticity
359.

                      is used for encrypting data at network level

A. ipsec
B. https
C. smtp
D. s/mime
Answer» A. ipsec
360.

WPA2 is used for security in                  

A. ethernet
B. wi-fi
C. bluetooth
D. e-mail
Answer» B. wi-fi
361.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

A. true
B. false
Answer» A. true
362.

SET stands for

A. set electronic transaction
B. secure electronic transaction
C. simple electronic transaction
D. none of the above
Answer» B. secure electronic transaction
363.

length of the IPv6 acddress is ....

A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Answer» B. 64 bits
364.

SSL provides .

A. message integrity
B. confidentiality
C. compression
D. all of the above
Answer» D. all of the above
365.

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

A. confidentiality
B. integrity
C. authenticity
D. availability
Answer» C. authenticity
366.

Which of the following are not security policies?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» C. availability
367.

Examples of User Policies is/are:

A. password policies
B. internet usage
C. system use
D. all of the above
Answer» D. all of the above
368.

           Policy ensures that the organization is maintaining standards set by specific industry regulation.

A. regulatory
B. advisory
C. availability
D. user policies
Answer» A. regulatory
369.

             Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior

A. regulatory
B. advisory
C. availability
D. user policies
Answer» B. advisory
370.

What defines the restrictions on employees such as usage?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» D. user policies
371.

Which of the following attack can actively modify communications or data?

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» C. active attacks
372.

Categories of Security Service

A. 1
B. 1 &3
C. 2& 3
D. 1,2,3
Answer» D. 1,2,3
373.

Release of Message Content and Traffic analysis are type of :

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» D. passive attacks
374.

             means when an attacker pretends to be authentic user

A. masquerade
B. replay
C. modification
D. traffic analysis
Answer» A. masquerade
375.

                       attack is when original data is modified and malicious data is inserted

A. masquerade
B. replay(rewrite)
C. modification
D. traffic analysis
Answer» B. replay(rewrite)
376.

When original data is changed to make it non-meaningful by attacker it is known as

A. masquerade
B. replay
C. modification of messages
D. traffic analysis
Answer» C. modification of messages
377.

Which is the type of attack when Network is made unavailable for user

A. masquerade
B. replay
C. modification
D. denial of service
Answer» D. denial of service
378.

Modification of Data is done in:

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» A. both active and passive attacks
379.

A process of making the encrypted text readable again.

A. decryption
B. encryption
C. network security
D. information hiding
Answer» A. decryption
380.

Assurance that authentic user is taking part in communication is:

A. authentication
B. authorization
C. access control
D. auditing
Answer» A. authentication
381.

ATM pin while withdrawing money is an example of using:

A. authentication
B. authorization
C. access control
D. auditing
Answer» A. authentication
382.

In asymmetric key cryptography, the private key is kept by

A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» B. receiver
Tags
  • Question and answers in Information Cyber Security (ICS),
  • Information Cyber Security (ICS) multiple choice questions and answers,
  • Information Cyber Security (ICS) Important MCQs,
  • Solved MCQs for Information Cyber Security (ICS),
  • Information Cyber Security (ICS) MCQs with answers PDF download