Quiznetik

Information Cyber Security (ICS) | Set 4

1. Network administrators can create their own ACL rules based on _______ ________ and _______

Correct : A. address, protocols and packet attributes

2. One advantage of Packet Filtering firewall is __________

Correct : C. less costly

3. Packet filtering firewalls work effectively in _________ networks.

Correct : B. smaller

4. Packet filtering firewalls are vulnerable to __________

Correct : D. spoofing

5. Circuit-level gateway firewalls are installed in _______ layer of OSI model.

Correct : B. session layer

6. Which of these comes under the advantage of Circuit-level gateway firewalls?

Correct : A. they maintain anonymity and also inexpensive

7. Which of the following is a disadvantage of Circuit-level gateway firewalls?

Correct : C. they do not filter individual packets

8. _____________ gateway firewalls are deployed in application-layer of OSI model.

Correct : C. application-level gateway firewalls

9. Application level gateway firewalls protect the network for specific _____________

Correct : A. application layer protocol

10. Application level gateway firewalls are also used for configuring cache-servers.

Correct : A. true

11. Packet filtering firewalls are also called ____________

Correct : A. first generation firewalls

12. Application layer firewalls are also called ____________

Correct : C. third generation firewalls

13. Cyber-crime can be categorized into ________ types.

Correct : C. 2

14. Accessing computer without prior authorization is a cyber-crimes that come under _______

Correct : B. section 66

15. Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

Correct : B. section 66

16. Accessing Wi-Fi dishonestly is a cyber-crime.

Correct : A. true

17. Download copy, extract data from an open system done fraudulently is treated as _________

Correct : D. cyber-crime

18. Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

Correct : D. 5 lacs

19. How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

Correct : C. 3 years

20. Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

Correct : B. section 67

21. IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

Correct : A. section 67-a

22. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

Correct : D. 5

23. Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

Correct : B. section 67

24. Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.

Correct : A. true

25. Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

Correct : B. 3 years

26. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

Correct : D. section 72

27. Sending offensive message to someone comes under _____________ of the Indian IT Act ______

Correct : D. section 66-a, 2008

28. Stealing of digital files comes under __________ of the Indian IT Act.

Correct : C. section 66-c

29. Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.

Correct : A. true