

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Animation SY (BSC [animation]) , Bachelor of Science in Animation (BSc animation) .
301. |
Network administrators can create their own ACL rules based on _______ ________ and _______ |
A. | address, protocols and packet attributes |
B. | address, protocols and security policies |
C. | address, policies and packet attributes |
D. | network topology, protocols and data packets |
Answer» A. address, protocols and packet attributes |
302. |
One advantage of Packet Filtering firewall is __________ |
A. | more efficient |
B. | less complex |
C. | less costly |
D. | very fast |
Answer» C. less costly |
303. |
Packet filtering firewalls work effectively in _________ networks. |
A. | very simple |
B. | smaller |
C. | large |
D. | very large complex |
Answer» B. smaller |
304. |
Packet filtering firewalls are vulnerable to __________ |
A. | hardware vulnerabilities |
B. | mitm |
C. | phishing |
D. | spoofing |
Answer» D. spoofing |
305. |
Circuit-level gateway firewalls are installed in _______ layer of OSI model. |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | network layer |
Answer» B. session layer |
306. |
Which of these comes under the advantage of Circuit-level gateway firewalls? |
A. | they maintain anonymity and also inexpensive |
B. | they are light-weight |
C. | they’re expensive yet efficient |
D. | they preserve ip address privacy yet expensive |
Answer» A. they maintain anonymity and also inexpensive |
307. |
Which of the following is a disadvantage of Circuit-level gateway firewalls? |
A. | they’re expensive |
B. | they’re complex in architecture |
C. | they do not filter individual packets |
D. | they’re complex to setup |
Answer» C. they do not filter individual packets |
308. |
_____________ gateway firewalls are deployed in application-layer of OSI model. |
A. | packet filtering firewalls |
B. | circuit level gateway firewalls |
C. | application-level gateway firewalls |
D. | stateful multilayer inspection firewalls |
Answer» C. application-level gateway firewalls |
309. |
Application level gateway firewalls protect the network for specific _____________ |
A. | application layer protocol |
B. | session layer protocol |
C. | botnet attacks |
D. | network layer protocol |
Answer» A. application layer protocol |
310. |
Application level gateway firewalls are also used for configuring cache-servers. |
A. | true |
B. | false |
Answer» A. true |
311. |
Packet filtering firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» A. first generation firewalls |
312. |
Application layer firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» C. third generation firewalls |
313. |
Cyber-crime can be categorized into ________ types. |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 6 |
Answer» C. 2 |
314. |
Accessing computer without prior authorization is a cyber-crimes that come under _______ |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» B. section 66 |
315. |
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» B. section 66 |
316. |
Accessing Wi-Fi dishonestly is a cyber-crime. |
A. | true |
B. | false |
Answer» A. true |
317. |
Download copy, extract data from an open system done fraudulently is treated as _________ |
A. | cyber-warfare |
B. | cyber-security act |
C. | data-backup |
D. | cyber-crime |
Answer» D. cyber-crime |
318. |
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________ |
A. | 2 lacs |
B. | 3 lacs |
C. | 4 lacs |
D. | 5 lacs |
Answer» D. 5 lacs |
319. |
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000? |
A. | 1 year |
B. | 2 years |
C. | 3 years |
D. | 4 years |
Answer» C. 3 years |
320. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» B. section 67 |
321. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. |
A. | section 67-a |
B. | section 67-b |
C. | section 67-c |
D. | section 67-d |
Answer» A. section 67-a |
322. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 |
323. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» B. section 67 |
324. |
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs. |
A. | true |
B. | false |
Answer» A. true |
325. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ |
A. | 2 years |
B. | 3 years |
C. | 4 years |
D. | 5 years |
Answer» B. 3 years |
326. |
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 71 |
D. | section 72 |
Answer» D. section 72 |
327. |
Sending offensive message to someone comes under _____________ of the Indian IT Act ______ |
A. | section 66-a, 2000 |
B. | section 66-b, 2008 |
C. | section 67, 2000 |
D. | section 66-a, 2008 |
Answer» D. section 66-a, 2008 |
328. |
Stealing of digital files comes under __________ of the Indian IT Act. |
A. | section 66-a |
B. | section 66-b |
C. | section 66-c |
D. | section 66-d |
Answer» C. section 66-c |
329. |
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense. |
A. | true |
B. | false |
Answer» A. true |
330. |
Security Measures Needed to protect during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» B. data |
331. |
means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» C. information |
332. |
Which One of them is Passive attack? |
A. | denial of service |
B. | modify message in transit |
C. | replay previous message |
D. | obtain message contain |
Answer» D. obtain message contain |
333. |
What is full form of DDoS? |
A. | derived denial of service |
B. | distributed denial of service |
C. | denial of service |
D. | none of these |
Answer» B. distributed denial of service |
334. |
Symmetric key encryption is also called as? |
A. | public key encryption |
B. | private key encryption |
C. | both of these |
D. | none of these |
Answer» B. private key encryption |
335. |
is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» A. program policy |
336. |
The model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» B. osi |
337. |
The full form of OSI is OSI model . |
A. | open systems interconnection |
B. | open software interconnection |
C. | open connection |
D. | open system internet |
Answer» A. open systems interconnection |
338. |
Conversion of plain text into Cipher text is called as . |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» A. encryption |
339. |
The is a polygraphic substitution cipher based on linear algebra. |
A. | hill cipher |
B. | playfair cipher |
C. | affine cipher |
D. | none of these |
Answer» A. hill cipher |
340. |
is the practice of concealing a message within another message,image or file. |
A. | steganography |
B. | cryptography |
C. | cipher |
D. | receiver |
Answer» A. steganography |
341. |
In asymmetric key cryptography, the private key is kept by |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | none of these |
Answer» B. receiver |
342. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | byte cipher |
Answer» A. block cipher |
343. |
In cryptography the original message before being transform is called |
A. | simple text |
B. | plain text |
C. | empty text |
D. | filled text |
Answer» B. plain text |
344. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» A. 1 key |
345. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
A. | short |
B. | flat |
C. | long |
D. | thin |
Answer» C. long |
346. |
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not |
A. | authenticated |
B. | joined |
C. | submit |
D. | separate |
Answer» A. authenticated |
347. |
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to |
A. | other |
B. | data |
C. | keys |
D. | each other |
Answer» D. each other |
348. |
In RSA, Ф(n) = in terms of p and q. |
A. | (p)/(q) |
B. | (p)(q) |
C. | (p-1)(q-1) |
D. | (p+1)(q+1) |
Answer» C. (p-1)(q-1) |
349. |
USENET falls under which category of public key sharing? |
A. | public announcement |
B. | publicly available directory |
C. | public key authority |
D. | public key certificate |
Answer» A. public announcement |
350. |
Public key cryptography also called as |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | both a and b |
D. | none of the above |
Answer» A. asymmetric key cryptography |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.