![Mcqmate logo](https://mcqmate.com/public/images/logos/logo-black.png)
![Mcqmate logo](https://mcqmate.com/public/images/logos/logo-white.png)
McqMate
301. |
Network administrators can create their own ACL rules based on _______ ________ and _______ |
A. | address, protocols and packet attributes |
B. | address, protocols and security policies |
C. | address, policies and packet attributes |
D. | network topology, protocols and data packets |
Answer» A. address, protocols and packet attributes |
302. |
One advantage of Packet Filtering firewall is __________ |
A. | more efficient |
B. | less complex |
C. | less costly |
D. | very fast |
Answer» C. less costly |
303. |
Packet filtering firewalls work effectively in _________ networks. |
A. | very simple |
B. | smaller |
C. | large |
D. | very large complex |
Answer» B. smaller |
304. |
Packet filtering firewalls are vulnerable to __________ |
A. | hardware vulnerabilities |
B. | mitm |
C. | phishing |
D. | spoofing |
Answer» D. spoofing |
305. |
Circuit-level gateway firewalls are installed in _______ layer of OSI model. |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | network layer |
Answer» B. session layer |
306. |
Which of these comes under the advantage of Circuit-level gateway firewalls? |
A. | they maintain anonymity and also inexpensive |
B. | they are light-weight |
C. | they’re expensive yet efficient |
D. | they preserve ip address privacy yet expensive |
Answer» A. they maintain anonymity and also inexpensive |
307. |
Which of the following is a disadvantage of Circuit-level gateway firewalls? |
A. | they’re expensive |
B. | they’re complex in architecture |
C. | they do not filter individual packets |
D. | they’re complex to setup |
Answer» C. they do not filter individual packets |
308. |
_____________ gateway firewalls are deployed in application-layer of OSI model. |
A. | packet filtering firewalls |
B. | circuit level gateway firewalls |
C. | application-level gateway firewalls |
D. | stateful multilayer inspection firewalls |
Answer» C. application-level gateway firewalls |
309. |
Application level gateway firewalls protect the network for specific _____________ |
A. | application layer protocol |
B. | session layer protocol |
C. | botnet attacks |
D. | network layer protocol |
Answer» A. application layer protocol |
310. |
Application level gateway firewalls are also used for configuring cache-servers. |
A. | true |
B. | false |
Answer» A. true |
311. |
Packet filtering firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» A. first generation firewalls |
312. |
Application layer firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» C. third generation firewalls |
313. |
Cyber-crime can be categorized into ________ types. |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 6 |
Answer» C. 2 |
314. |
Accessing computer without prior authorization is a cyber-crimes that come under _______ |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» B. section 66 |
315. |
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» B. section 66 |
316. |
Accessing Wi-Fi dishonestly is a cyber-crime. |
A. | true |
B. | false |
Answer» A. true |
317. |
Download copy, extract data from an open system done fraudulently is treated as _________ |
A. | cyber-warfare |
B. | cyber-security act |
C. | data-backup |
D. | cyber-crime |
Answer» D. cyber-crime |
318. |
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________ |
A. | 2 lacs |
B. | 3 lacs |
C. | 4 lacs |
D. | 5 lacs |
Answer» D. 5 lacs |
319. |
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000? |
A. | 1 year |
B. | 2 years |
C. | 3 years |
D. | 4 years |
Answer» C. 3 years |
320. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» B. section 67 |
321. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. |
A. | section 67-a |
B. | section 67-b |
C. | section 67-c |
D. | section 67-d |
Answer» A. section 67-a |
322. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 |
323. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» B. section 67 |
324. |
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs. |
A. | true |
B. | false |
Answer» A. true |
325. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ |
A. | 2 years |
B. | 3 years |
C. | 4 years |
D. | 5 years |
Answer» B. 3 years |
326. |
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 71 |
D. | section 72 |
Answer» D. section 72 |
327. |
Sending offensive message to someone comes under _____________ of the Indian IT Act ______ |
A. | section 66-a, 2000 |
B. | section 66-b, 2008 |
C. | section 67, 2000 |
D. | section 66-a, 2008 |
Answer» D. section 66-a, 2008 |
328. |
Stealing of digital files comes under __________ of the Indian IT Act. |
A. | section 66-a |
B. | section 66-b |
C. | section 66-c |
D. | section 66-d |
Answer» C. section 66-c |
329. |
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense. |
A. | true |
B. | false |
Answer» A. true |
330. |
Security Measures Needed to protect during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» B. data |
331. |
means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» C. information |
332. |
Which One of them is Passive attack? |
A. | denial of service |
B. | modify message in transit |
C. | replay previous message |
D. | obtain message contain |
Answer» D. obtain message contain |
333. |
What is full form of DDoS? |
A. | derived denial of service |
B. | distributed denial of service |
C. | denial of service |
D. | none of these |
Answer» B. distributed denial of service |
334. |
Symmetric key encryption is also called as? |
A. | public key encryption |
B. | private key encryption |
C. | both of these |
D. | none of these |
Answer» B. private key encryption |
335. |
is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» A. program policy |
336. |
The model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» B. osi |
337. |
The full form of OSI is OSI model . |
A. | open systems interconnection |
B. | open software interconnection |
C. | open connection |
D. | open system internet |
Answer» A. open systems interconnection |
338. |
Conversion of plain text into Cipher text is called as . |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» A. encryption |
339. |
The is a polygraphic substitution cipher based on linear algebra. |
A. | hill cipher |
B. | playfair cipher |
C. | affine cipher |
D. | none of these |
Answer» A. hill cipher |
340. |
is the practice of concealing a message within another message,image or file. |
A. | steganography |
B. | cryptography |
C. | cipher |
D. | receiver |
Answer» A. steganography |
341. |
In asymmetric key cryptography, the private key is kept by |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | none of these |
Answer» B. receiver |
342. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | byte cipher |
Answer» A. block cipher |
343. |
In cryptography the original message before being transform is called |
A. | simple text |
B. | plain text |
C. | empty text |
D. | filled text |
Answer» B. plain text |
344. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» A. 1 key |
345. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
A. | short |
B. | flat |
C. | long |
D. | thin |
Answer» C. long |
346. |
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not |
A. | authenticated |
B. | joined |
C. | submit |
D. | separate |
Answer» A. authenticated |
347. |
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to |
A. | other |
B. | data |
C. | keys |
D. | each other |
Answer» D. each other |
348. |
In RSA, Ф(n) = in terms of p and q. |
A. | (p)/(q) |
B. | (p)(q) |
C. | (p-1)(q-1) |
D. | (p+1)(q+1) |
Answer» C. (p-1)(q-1) |
349. |
USENET falls under which category of public key sharing? |
A. | public announcement |
B. | publicly available directory |
C. | public key authority |
D. | public key certificate |
Answer» A. public announcement |
350. |
Public key cryptography also called as |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | both a and b |
D. | none of the above |
Answer» A. asymmetric key cryptography |
351. |
Diffie-Hellman algorithm is widely known as |
A. | key exchange algorithm |
B. | key agreement algorithm |
C. | only a |
D. | both a and b |
Answer» D. both a and b |
352. |
Hash function is used for |
A. | message authentication |
B. | digital signature |
C. | both a and b |
D. | only a |
Answer» C. both a and b |
353. |
RSA algorithm is best example of |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | elliptic curve cryptography |
D. | all of the above |
Answer» A. asymmetric key cryptography |
354. |
IPSec is designed to provide security at the |
A. | transport layer |
B. | network layer |
C. | application layer |
D. | session layer |
Answer» B. network layer |
355. |
In tunnel mode, IPSec protects the |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» A. entire ip packet |
356. |
HTTPS is abbreviated as |
A. | secured hyper hypertexts transfer text transfer protocol secured protocol |
B. | none of the mentioned |
C. | hyperlinked text transfer protocol secured |
D. | hyper text transfer protocol secure |
Answer» D. hyper text transfer protocol secure |
357. |
An attempt to make a computer resource unavailable to its intended users is called |
A. | denial-of-service attack |
B. | virus attack |
C. | worms attack |
D. | botnet process |
Answer» A. denial-of-service attack |
358. |
SSL primarily focuses on Pretty good privacy (PGP) is used in |
A. | integrity and authenticity |
B. | integrity and non- repudiation |
C. | authenticity and privacy |
D. | confidentiality and integrity |
Answer» A. integrity and authenticity |
359. |
is used for encrypting data at network level |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» A. ipsec |
360. |
WPA2 is used for security in |
A. | ethernet |
B. | wi-fi |
C. | bluetooth |
D. | |
Answer» B. wi-fi |
361. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection. |
A. | true |
B. | false |
Answer» A. true |
362. |
SET stands for |
A. | set electronic transaction |
B. | secure electronic transaction |
C. | simple electronic transaction |
D. | none of the above |
Answer» B. secure electronic transaction |
363. |
length of the IPv6 acddress is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» B. 64 bits |
364. |
SSL provides . |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» D. all of the above |
365. |
According to the CIA Triad, which of the below-mentioned element is not considered in the triad? |
A. | confidentiality |
B. | integrity |
C. | authenticity |
D. | availability |
Answer» C. authenticity |
366. |
Which of the following are not security policies? |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» C. availability |
367. |
Examples of User Policies is/are: |
A. | password policies |
B. | internet usage |
C. | system use |
D. | all of the above |
Answer» D. all of the above |
368. |
Policy ensures that the organization is maintaining standards set by specific industry regulation. |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» A. regulatory |
369. |
Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» B. advisory |
370. |
What defines the restrictions on employees such as usage? |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» D. user policies |
371. |
Which of the following attack can actively modify communications or data? |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» C. active attacks |
372. |
Categories of Security Service |
A. | 1 |
B. | 1 &3 |
C. | 2& 3 |
D. | 1,2,3 |
Answer» D. 1,2,3 |
373. |
Release of Message Content and Traffic analysis are type of : |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» D. passive attacks |
374. |
means when an attacker pretends to be authentic user |
A. | masquerade |
B. | replay |
C. | modification |
D. | traffic analysis |
Answer» A. masquerade |
375. |
attack is when original data is modified and malicious data is inserted |
A. | masquerade |
B. | replay(rewrite) |
C. | modification |
D. | traffic analysis |
Answer» B. replay(rewrite) |
376. |
When original data is changed to make it non-meaningful by attacker it is known as |
A. | masquerade |
B. | replay |
C. | modification of messages |
D. | traffic analysis |
Answer» C. modification of messages |
377. |
Which is the type of attack when Network is made unavailable for user |
A. | masquerade |
B. | replay |
C. | modification |
D. | denial of service |
Answer» D. denial of service |
378. |
Modification of Data is done in: |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» A. both active and passive attacks |
379. |
A process of making the encrypted text readable again. |
A. | decryption |
B. | encryption |
C. | network security |
D. | information hiding |
Answer» A. decryption |
380. |
Assurance that authentic user is taking part in communication is: |
A. | authentication |
B. | authorization |
C. | access control |
D. | auditing |
Answer» A. authentication |
381. |
ATM pin while withdrawing money is an example of using: |
A. | authentication |
B. | authorization |
C. | access control |
D. | auditing |
Answer» A. authentication |
382. |
In asymmetric key cryptography, the private key is kept by |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» B. receiver |
Done Reading?