A firewall protects which of the following attacks?
1.phishing
2.dumpster diving
3.denial of service (dos)
4. shoulder surfing
Posted Date:-2022-07-23 11:01:31
Application level gateway firewalls protect the network for specific _____________
1.application layer protocol
2.session layer protocol
3.botnet attacks
4.network layer protocol
Posted Date:-2022-07-23 12:56:40
Cyber-crime can be categorized into ________ types.
1.4
2.5
3.2
4.6
Posted Date:-2022-07-23 12:59:48
Download copy, extract data from an open system done fraudulently is treated as _________
1.cyber-warfare
2.cyber-security act
3.data-backup
4. cyber-crime
Posted Date:-2022-07-23 13:14:46
In the ______________ layer of OSI model, packet filtering firewalls are implemented.
1.application layer
2.session layer
3.presentation layer
4.network layer
Posted Date:-2022-07-23 11:05:29
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.
1.section 67-a
2.section 67-b
3.section 67-c
4. section 67-d
Posted Date:-2022-07-23 13:19:00
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
1.section 65
2.section 66
3.section 71
4.section 72
Posted Date:-2022-07-23 13:24:02
The __________ defines the packet filtering firewall rules.
1. access control list
2.protocols
3.policies
4.ports
Posted Date:-2022-07-23 11:06:14
The __________ defines the packet filtering firewall rules.
1. access control list
2.protocols
3.policies
4.ports
Posted Date:-2022-07-23 11:07:23
When a packet does not fulfil the ACL criteria, the packet is _________
1.resend
2.dropped
3.destroyed
4.acknowledged as received
Posted Date:-2022-07-23 11:08:33
. Sending offensive message to someone comes under _____________ of the Indian IT Act _____
1.section 66-a, 2000
2.section 66-b, 2008
3.section 67, 2000
4.section 66-a, 2008
Posted Date:-2022-07-23 13:25:40
Accessing computer without prior authorization is a cyber-crimes that come under _______
1.section 65
2. section 66
3. section 68
4. section 70
Posted Date:-2022-07-23 13:01:46
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________
1. 2 lacs
2.3 lacs
3.4 lacs
4.5 lacs
Posted Date:-2022-07-23 13:16:05
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.
1.section 66
2.section 67
3.section 68
4.section 69
Posted Date:-2022-07-23 13:17:51
Application layer firewalls are also called __________
1.first generation firewalls
2.second generation firewalls
3. third generation firewalls
4.fourth generation firewalls
Posted Date:-2022-07-23 12:58:52
Circuit-level gateway firewalls are installed in _______ layer of OSI model.
1.application layer
2.session layer
3.presentation layer
4. network layer
Posted Date:-2022-07-23 11:18:27
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
1.section 65
2.section 66
3.section 68
4.section 70
Posted Date:-2022-07-23 13:02:40
Firewall examines each ____________ that are entering or leaving the internal network.
1.emails users
2.updates
3.connections
4.data packets
Posted Date:-2022-07-23 10:59:58
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?
1.1 year
2. 2 years
3. 3 years
4.4 years
Posted Date:-2022-07-23 13:16:53
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
1.2
2.3
3.4
4.5
Posted Date:-2022-07-23 13:19:49
Network administrators can create their own ACL rules based on _______ ________ and _______
1.address, protocols and packet attributes
2.address, protocols and security policies
3. address, policies and packet attributes
4.network topology, protocols and data packets
Posted Date:-2022-07-23 11:13:10
One advantage of Packet Filtering firewall is __________
1.more efficient
2.less complex
3.less costly
4.very fast
Posted Date:-2022-07-23 11:14:03
Packet filtering firewalls are also called ____________
1.first generation firewalls
2.second generation firewalls
3. third generation firewalls
4.fourth generation firewalls
Posted Date:-2022-07-23 12:57:53
Packet filtering firewalls are deployed on ________
1.routers
2.switches
3.hubs
4.repeaters
Posted Date:-2022-07-23 11:03:29
Packet filtering firewalls are vulnerable to __________
1. hardware vulnerabilities
2.mitm
3.phishing
4.spoofing
Posted Date:-2022-07-23 11:16:29
Packet filtering firewalls work effectively in _________ networks.
1. very simple
2.smaller
3.large
4. very large complex
Posted Date:-2022-07-23 11:15:41
Stealing of digital files comes under __________ of the Indian IT Act.
1. A. section 66-a
2.section 66-b
3.section 66-c
4.section 66-d
Posted Date:-2022-07-23 13:27:31
There are ______ types of firewall.
1.5
2.4
3.3
4.2
Posted Date:-2022-07-23 11:02:22
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
1.2 years
2.3 years
3.4 years
4.5 years
Posted Date:-2022-07-23 13:22:20
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
1.section 66 B. section 67 C. D.
2.section 67
3. section 68
4.section 69
Posted Date:-2022-07-23 13:21:12
Which of the following is a disadvantage of Circuit-level gateway firewalls?
1.they’re expensive
2.they’re complex in architecture
3. they do not filter individual packets
4. they’re complex to setup
Posted Date:-2022-07-23 11:22:12
Which of the following is not a software firewall?
1. windows firewall
2.outpost firewall pro
3.endian firewall
4.linksys firewall
Posted Date:-2022-07-23 10:58:57
Which of these comes under the advantage of Circuit-level gateway firewalls?
1. they maintain anonymity and also inexpensive
2.they are light-weight
3.they’re expensive yet efficient
4.they preserve ip address privacy yet expensive
Posted Date:-2022-07-23 11:19:50
____ gateway firewalls are deployed in application-layer of OSI model.
1.packet filtering firewalls
2.circuit level gateway firewalls
3.application-level gateway firewalls
4.stateful multilayer inspection firewalls
Posted Date:-2022-07-23 12:55:30
_________ is software that is installed using an internet connection or they come by-default with operating systems.
1.hardware firewall
2.software firewall
3.stateful inspection firewall
4. microsoft firewall
Posted Date:-2022-07-23 10:57:42