Computer Hardware and Networking/Information Cyber Security (ICS) MCQs Set 5 Sample Test,Sample questions

Question:
 A firewall protects which of the following attacks?

1.phishing

2.dumpster diving

3.denial of service (dos)

4. shoulder surfing

Posted Date:-2022-07-23 11:01:31


Question:
 Application level gateway firewalls protect the network for specific _____________

1.application layer protocol

2.session layer protocol

3.botnet attacks

4.network layer protocol

Posted Date:-2022-07-23 12:56:40


Question:
 Cyber-crime can be categorized into ________ types.

1.4

2.5

3.2

4.6

Posted Date:-2022-07-23 12:59:48


Question:
 Download copy, extract data from an open system done fraudulently is treated as _________

1.cyber-warfare

2.cyber-security act

3.data-backup

4. cyber-crime

Posted Date:-2022-07-23 13:14:46


Question:
 In the ______________ layer of OSI model, packet filtering firewalls are implemented.

1.application layer

2.session layer

3.presentation layer

4.network layer

Posted Date:-2022-07-23 11:05:29


Question:
 IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

1.section 67-a

2.section 67-b

3.section 67-c

4. section 67-d

Posted Date:-2022-07-23 13:19:00


Question:
 Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

1.section 65

2.section 66

3.section 71

4.section 72

Posted Date:-2022-07-23 13:24:02


Question:
 The __________ defines the packet filtering firewall rules.

1. access control list

2.protocols

3.policies

4.ports

Posted Date:-2022-07-23 11:06:14


Question:
 The __________ defines the packet filtering firewall rules.

1. access control list

2.protocols

3.policies

4.ports

Posted Date:-2022-07-23 11:07:23


Question:
 When a packet does not fulfil the ACL criteria, the packet is _________

1.resend

2.dropped

3.destroyed

4.acknowledged as received

Posted Date:-2022-07-23 11:08:33


Question:
. Sending offensive message to someone comes under _____________ of the Indian IT Act _____

1.section 66-a, 2000

2.section 66-b, 2008

3.section 67, 2000

4.section 66-a, 2008

Posted Date:-2022-07-23 13:25:40


Question:
Accessing computer without prior authorization is a cyber-crimes that come under _______

1.section 65

2. section 66

3. section 68

4. section 70

Posted Date:-2022-07-23 13:01:46


Question:
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

1. 2 lacs

2.3 lacs

3.4 lacs

4.5 lacs

Posted Date:-2022-07-23 13:16:05


Question:
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

1.section 66

2.section 67

3.section 68

4.section 69

Posted Date:-2022-07-23 13:17:51


Question:
Application layer firewalls are also called __________

1.first generation firewalls

2.second generation firewalls

3. third generation firewalls

4.fourth generation firewalls

Posted Date:-2022-07-23 12:58:52


Question:
Circuit-level gateway firewalls are installed in _______ layer of OSI model.

1.application layer

2.session layer

3.presentation layer

4. network layer

Posted Date:-2022-07-23 11:18:27


Question:
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

1.section 65

2.section 66

3.section 68

4.section 70

Posted Date:-2022-07-23 13:02:40


Question:
Firewall examines each ____________ that are entering or leaving the internal network.

1.emails users

2.updates

3.connections

4.data packets

Posted Date:-2022-07-23 10:59:58


Question:
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

1.1 year

2. 2 years

3. 3 years

4.4 years

Posted Date:-2022-07-23 13:16:53


Question:
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

1.2

2.3

3.4

4.5

Posted Date:-2022-07-23 13:19:49


Question:
Network administrators can create their own ACL rules based on _______ ________ and _______

1.address, protocols and packet attributes

2.address, protocols and security policies

3. address, policies and packet attributes

4.network topology, protocols and data packets

Posted Date:-2022-07-23 11:13:10


Question:
One advantage of Packet Filtering firewall is __________

1.more efficient

2.less complex

3.less costly

4.very fast

Posted Date:-2022-07-23 11:14:03


Question:
Packet filtering firewalls are also called ____________

1.first generation firewalls

2.second generation firewalls

3. third generation firewalls

4.fourth generation firewalls

Posted Date:-2022-07-23 12:57:53


Question:
Packet filtering firewalls are deployed on ________

1.routers

2.switches

3.hubs

4.repeaters

Posted Date:-2022-07-23 11:03:29


Question:
Packet filtering firewalls are vulnerable to __________

1. hardware vulnerabilities

2.mitm

3.phishing

4.spoofing

Posted Date:-2022-07-23 11:16:29


Question:
Packet filtering firewalls work effectively in _________ networks.

1. very simple

2.smaller

3.large

4. very large complex

Posted Date:-2022-07-23 11:15:41


Question:
Stealing of digital files comes under __________ of the Indian IT Act.

1. A. section 66-a

2.section 66-b

3.section 66-c

4.section 66-d

Posted Date:-2022-07-23 13:27:31


Question:
There are ______ types of firewall.

1.5

2.4

3.3

4.2

Posted Date:-2022-07-23 11:02:22


Question:
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

1.2 years

2.3 years

3.4 years

4.5 years

Posted Date:-2022-07-23 13:22:20


Question:
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

1.section 66 B. section 67 C. D.

2.section 67

3. section 68

4.section 69

Posted Date:-2022-07-23 13:21:12


Question:
Which of the following is a disadvantage of Circuit-level gateway firewalls?

1.they’re expensive

2.they’re complex in architecture

3. they do not filter individual packets

4. they’re complex to setup

Posted Date:-2022-07-23 11:22:12


Question:
Which of the following is not a software firewall?

1. windows firewall

2.outpost firewall pro

3.endian firewall

4.linksys firewall

Posted Date:-2022-07-23 10:58:57


Question:
Which of these comes under the advantage of Circuit-level gateway firewalls?

1. they maintain anonymity and also inexpensive

2.they are light-weight

3.they’re expensive yet efficient

4.they preserve ip address privacy yet expensive

Posted Date:-2022-07-23 11:19:50


Question:
____ gateway firewalls are deployed in application-layer of OSI model.

1.packet filtering firewalls

2.circuit level gateway firewalls

3.application-level gateway firewalls

4.stateful multilayer inspection firewalls

Posted Date:-2022-07-23 12:55:30


Question:
_________ is software that is installed using an internet connection or they come by-default with operating systems.

1.hardware firewall

2.software firewall

3.stateful inspection firewall

4. microsoft firewall

Posted Date:-2022-07-23 10:57:42


More MCQS

  1. MCQ Questions from Computer Hardware Concept
  2. Computer Communication and Networking MCQS Quiz
  3. Computer Hardware Quiz Set 1
  4. Computer Hardware Quiz Set 2
  5. Computer Hardware Quiz Set 3
  6. Computer Hardware Quiz Set 4
  7. Computer Hardware Quiz Set 5
  8. Computer Hardware Quiz Set 6
  9. Computer Hardware Quiz Set 7
  10. Computer Hardware Quiz Set 8
  11. Computer Hardware Multiple Choice Questions(MCQs) and Answers
  12. Graphics Hardware and Display devices Input Devices
  13. Computer Hardware MCQ GK Questions Set 1
  14. Computer Hardware MCQ GK Questions Set 2
  15. Computer Hardware Multiple Choice Questions
  16. CDMA Multiple Choice Questions
  17. Network Security Multiple Choice questions
  18. Opengl Multiple Choice Questions
  19. Opengl Multiple Choice Questions.
  20. Web Development Multiple-choice Questions
  21. WiFi Multiple Choice Questions
  22. 4G Multiple Choice Question
  23. NETWORK MODELS MCQ
  24. INTERNET AND PROTOCOLS MCQ SET 1
  25. INTERNET AND PROTOCOLS MCQ SET 2
  26. INTERNET AND PROTOCOLS MCQ SET 3
  27. INTERNET AND PROTOCOLS MCQ SET 4
  28. INTERNET AND PROTOCOLS MCQ SET 5
  29. NETWORKING /PHYSICAL LAYER SET 1
  30. NETWORKING /PHYSICAL LAYER SET 2
  31. NETWORKING /PHYSICAL LAYER SET 3
  32. NETWORKING /PHYSICAL LAYER SET 4
  33. Information and Network Security Set 1
  34. Information and Network Security Set 2
  35. Information Cyber Security (ICS) MCQs Set 1
  36. Information Cyber Security (ICS) MCQs Set 2
  37. Information Cyber Security (ICS) MCQs Set 3
  38. Information Cyber Security (ICS) MCQs Set 4
  39. Information Cyber Security (ICS) MCQs Set 5
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!