Information Cyber Security Set 13
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 13
Q1 | Network administrators can create their own ACL rules based on _______ ________ and _______
- address, protocols and packet attributes
- address, protocols and security policies
- address, policies and packet attributes
- network topology, protocols and data packets
Q2 | One advantage of Packet Filtering firewall is __________
- more efficient
- less complex
- less costly
- very fast
Q3 | Packet filtering firewalls work effectively in _________ networks.
- very simple
- smaller
- large
- very large complex
Q4 | Packet filtering firewalls are vulnerable to __________
- hardware vulnerabilities
- mitm
- phishing
- spoofing
Q5 | Circuit-level gateway firewalls are installed in _______ layer of OSI model.
- application layer
- session layer
- presentation layer
- network layer
Q6 | Which of these comes under the advantage of Circuit-level gateway firewalls?
- they maintain anonymity and also inexpensive
- they are light-weight
- they’re expensive yet efficient
- they preserve ip address privacy yet expensive
Q7 | Which of the following is a disadvantage of Circuit-level gateway firewalls?
- they’re expensive
- they’re complex in architecture
- they do not filter individual packets
- they’re complex to setup
Q8 | _____________ gateway firewalls are deployed in application-layer of OSI model.
- packet filtering firewalls
- circuit level gateway firewalls
- application-level gateway firewalls
- stateful multilayer inspection firewalls
Q9 | Application level gateway firewalls protect the network for specific _____________
- application layer protocol
- session layer protocol
- botnet attacks
- network layer protocol
Q10 | Application level gateway firewalls are also used for configuring cache-servers.
- TRUE
- FALSE
Q11 | Packet filtering firewalls are also called ____________
- first generation firewalls
- second generation firewalls
- third generation firewalls
- fourth generation firewalls
Q12 | Application layer firewalls are also called ____________
- first generation firewalls
- second generation firewalls
- third generation firewalls
- fourth generation firewalls
Q13 | Cyber-crime can be categorized into ________ types.
- 4
- 3
- 2
- 6
Q14 | Accessing computer without prior authorization is a cyber-crimes that come under _______
- section 65
- section 66
- section 68
- section 70
Q15 | Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
- section 65
- section 66
- section 68
- section 70
Q16 | Accessing Wi-Fi dishonestly is a cyber-crime.
- TRUE
- FALSE
Q17 | Download copy, extract data from an open system done fraudulently is treated as _________
- cyber-warfare
- cyber-security act
- data-backup
- cyber-crime
Q18 | Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________
- 2 lacs
- 3 lacs
- 4 lacs
- 5 lacs
Q19 | How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?
- 1 year
- 2 years
- 3 years
- 4 years
Q20 | Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.
- section 66
- section 67
- section 68
- section 69
Q21 | IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.
- section 67-a
- section 67-b
- section 67-c
- section 67-d
Q22 | If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
- 2
- 3
- 4
- 5
Q23 | Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
- section 66
- section 67
- section 68
- section 69
Q24 | Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
- TRUE
- FALSE
Q25 | Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
- 2 years
- 3 years
- 4 years
- 5 years