On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 13

Q1 | Network administrators can create their own ACL rules based on _______ ________ and _______
  • address, protocols and packet attributes
  • address, protocols and security policies
  • address, policies and packet attributes
  • network topology, protocols and data packets
Q2 | One advantage of Packet Filtering firewall is __________
  • more efficient
  • less complex
  • less costly
  • very fast
Q3 | Packet filtering firewalls work effectively in _________ networks.
  • very simple
  • smaller
  • large
  • very large complex
Q4 | Packet filtering firewalls are vulnerable to __________
  • hardware vulnerabilities
  • mitm
  • phishing
  • spoofing
Q5 | Circuit-level gateway firewalls are installed in _______ layer of OSI model.
  • application layer
  • session layer
  • presentation layer
  • network layer
Q6 | Which of these comes under the advantage of Circuit-level gateway firewalls?
  • they maintain anonymity and also inexpensive
  • they are light-weight
  • they’re expensive yet efficient
  • they preserve ip address privacy yet expensive
Q7 | Which of the following is a disadvantage of Circuit-level gateway firewalls?
  • they’re expensive
  • they’re complex in architecture
  • they do not filter individual packets
  • they’re complex to setup
Q8 | _____________ gateway firewalls are deployed in application-layer of OSI model.
  • packet filtering firewalls
  • circuit level gateway firewalls
  • application-level gateway firewalls
  • stateful multilayer inspection firewalls
Q9 | Application level gateway firewalls protect the network for specific _____________
  • application layer protocol
  • session layer protocol
  • botnet attacks
  • network layer protocol
Q10 | Application level gateway firewalls are also used for configuring cache-servers.
  • TRUE
  • FALSE
Q11 | Packet filtering firewalls are also called ____________
  • first generation firewalls
  • second generation firewalls
  • third generation firewalls
  • fourth generation firewalls
Q12 | Application layer firewalls are also called ____________
  • first generation firewalls
  • second generation firewalls
  • third generation firewalls
  • fourth generation firewalls
Q13 | Cyber-crime can be categorized into ________ types.
  • 4
  • 3
  • 2
  • 6
Q14 | Accessing computer without prior authorization is a cyber-crimes that come under _______
  • section 65
  • section 66
  • section 68
  • section 70
Q15 | Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
  • section 65
  • section 66
  • section 68
  • section 70
Q16 | Accessing Wi-Fi dishonestly is a cyber-crime.
  • TRUE
  • FALSE
Q17 | Download copy, extract data from an open system done fraudulently is treated as _________
  • cyber-warfare
  • cyber-security act
  • data-backup
  • cyber-crime
Q18 | Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________
  • 2 lacs
  • 3 lacs
  • 4 lacs
  • 5 lacs
Q19 | How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?
  • 1 year
  • 2 years
  • 3 years
  • 4 years
Q20 | Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.
  • section 66
  • section 67
  • section 68
  • section 69
Q21 | IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.
  • section 67-a
  • section 67-b
  • section 67-c
  • section 67-d
Q22 | If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
  • 2
  • 3
  • 4
  • 5
Q23 | Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
  • section 66
  • section 67
  • section 68
  • section 69
Q24 | Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
  • TRUE
  • FALSE
Q25 | Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
  • 2 years
  • 3 years
  • 4 years
  • 5 years