MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
Sending offensive message to someone comes under _____________ of the Indian IT Act ______ |
| A. | section 66-a, 2000 |
| B. | section 66-b, 2008 |
| C. | section 67, 2000 |
| D. | section 66-a, 2008 |
| Answer» E. | |
| 152. |
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. |
| A. | section 65 |
| B. | section 66 |
| C. | section 71 |
| D. | section 72 |
| Answer» E. | |
| 153. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ |
| A. | 2 years |
| B. | 3 years |
| C. | 4 years |
| D. | 5 years |
| Answer» C. 4 years | |
| 154. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» E. | |
| 155. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. |
| A. | section 67-a |
| B. | section 67-b |
| C. | section 67-c |
| D. | section 67-d |
| Answer» B. section 67-b | |
| 156. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. |
| A. | section 66 |
| B. | section 67 |
| C. | section 68 |
| D. | section 69 |
| Answer» C. section 68 | |
| 157. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. |
| A. | section 66 |
| B. | section 67 |
| C. | section 68 |
| D. | section 69 |
| Answer» C. section 68 | |
| 158. |
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000? |
| A. | 1 year |
| B. | 2 years |
| C. | 3 years |
| D. | 4 years |
| Answer» D. 4 years | |
| 159. |
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________ |
| A. | 2 lacs |
| B. | 3 lacs |
| C. | 4 lacs |
| D. | 5 lacs |
| Answer» E. | |
| 160. |
Download copy, extract data from an open system done fraudulently is treated as _________ |
| A. | cyber-warfare |
| B. | cyber-security act |
| C. | data-backup |
| D. | cyber-crime |
| Answer» E. | |
| 161. |
Accessing Wi-Fi dishonestly is a cyber-crime. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 162. |
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act. |
| A. | section 65 |
| B. | section 66 |
| C. | section 68 |
| D. | section 70 |
| Answer» C. section 68 | |
| 163. |
Accessing computer without prior authorization is a cyber-crimes that come under _______ |
| A. | section 65 |
| B. | section 66 |
| C. | section 68 |
| D. | section 70 |
| Answer» C. section 68 | |
| 164. |
Cyber-crime can be categorized into ________ types. |
| A. | 4 |
| B. | 3 |
| C. | 2 |
| D. | 6 |
| Answer» D. 6 | |
| 165. |
Packet filtering firewalls are also called ____________ |
| A. | first generation firewalls |
| B. | second generation firewalls |
| C. | third generation firewalls |
| D. | fourth generation firewalls |
| Answer» B. second generation firewalls | |
| 166. |
Application layer firewalls are also called ____________ |
| A. | first generation firewalls |
| B. | second generation firewalls |
| C. | third generation firewalls |
| D. | fourth generation firewalls |
| Answer» D. fourth generation firewalls | |
| 167. |
Application level gateway firewalls are also used for configuring cache-servers. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 168. |
Application level gateway firewalls protect the network for specific _____________ |
| A. | application layer protocol |
| B. | session layer protocol |
| C. | botnet attacks |
| D. | network layer protocol |
| Answer» B. session layer protocol | |
| 169. |
_____________ gateway firewalls are deployed in application-layer of OSI model. |
| A. | packet filtering firewalls |
| B. | circuit level gateway firewalls |
| C. | application-level gateway firewalls |
| D. | stateful multilayer inspection firewalls |
| Answer» D. stateful multilayer inspection firewalls | |
| 170. |
Which of the following is a disadvantage of Circuit-level gateway firewalls? |
| A. | they’re expensive |
| B. | they’re complex in architecture |
| C. | they do not filter individual packets |
| D. | they’re complex to setup |
| Answer» D. they’re complex to setup | |
| 171. |
Which of these comes under the advantage of Circuit-level gateway firewalls? |
| A. | they maintain anonymity and also inexpensive |
| B. | they are light-weight |
| C. | they’re expensive yet efficient |
| D. | they preserve ip address privacy yet expensive |
| Answer» B. they are light-weight | |
| 172. |
Packet filtering firewalls are vulnerable to __________ |
| A. | hardware vulnerabilities |
| B. | mitm |
| C. | phishing |
| D. | spoofing |
| Answer» E. | |
| 173. |
Packet filtering firewalls work effectively in _________ networks. |
| A. | very simple |
| B. | smaller |
| C. | large |
| D. | very large complex |
| Answer» C. large | |
| 174. |
Circuit-level gateway firewalls are installed in _______ layer of OSI model. |
| A. | application layer |
| B. | session layer |
| C. | presentation layer |
| D. | network layer |
| Answer» C. presentation layer | |
| 175. |
One advantage of Packet Filtering firewall is __________ |
| A. | more efficient |
| B. | less complex |
| C. | less costly |
| D. | very fast |
| Answer» D. very fast | |
| 176. |
Network administrators can create their own ACL rules based on _______ ________ and _______ |
| A. | address, protocols and packet attributes |
| B. | address, protocols and security policies |
| C. | address, policies and packet attributes |
| D. | network topology, protocols and data packets |
| Answer» B. address, protocols and security policies | |
| 177. |
When a packet does not fulfil the ACL criteria, the packet is _________ |
| A. | resend |
| B. | dropped |
| C. | destroyed |
| D. | acknowledged as received |
| Answer» C. destroyed | |
| 178. |
ACL stands for _____________ |
| A. | access condition list |
| B. | anti-control list |
| C. | access control logs |
| D. | access control list |
| Answer» E. | |
| 179. |
The __________ defines the packet filtering firewall rules. |
| A. | access control list |
| B. | protocols |
| C. | policies |
| D. | ports |
| Answer» B. protocols | |
| 180. |
In the ______________ layer of OSI model, packet filtering firewalls are implemented. |
| A. | application layer |
| B. | session layer |
| C. | presentation layer |
| D. | network layer |
| Answer» E. | |
| 181. |
Packet filtering firewalls are deployed on ________ |
| A. | routers |
| B. | switches |
| C. | hubs |
| D. | repeaters |
| Answer» B. switches | |
| 182. |
A firewall protects which of the following attacks? |
| A. | phishing |
| B. | dumpster diving |
| C. | denial of service (dos) |
| D. | shoulder surfing |
| Answer» D. shoulder surfing | |
| 183. |
There are ______ types of firewall. |
| A. | 5 |
| B. | 4 |
| C. | 3 |
| D. | 2 |
| Answer» C. 3 | |
| 184. |
Firewall examines each ____________ that are entering or leaving the internal network. |
| A. | emails users |
| B. | updates |
| C. | connections |
| D. | data packets |
| Answer» E. | |
| 185. |
Which of the following is not a software firewall? |
| A. | windows firewall |
| B. | outpost firewall pro |
| C. | endian firewall |
| D. | linksys firewall |
| Answer» E. | |
| 186. |
Firewalls can be of _______ kinds. |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» D. 4 | |
| 187. |
Which layer of the OSI reference model does IPsec work at? |
| A. | layer 1 |
| B. | layer 2 |
| C. | layer 3 |
| D. | layer 4 |
| Answer» D. layer 4 | |
| 188. |
_________ is software that is installed using an internet connection or they come by-default with operating systems. |
| A. | hardware firewall |
| B. | software firewall |
| C. | stateful inspection firewall |
| D. | microsoft firewall |
| Answer» C. stateful inspection firewall | |
| 189. |
Which layer of the OSI reference model does PPTP work at? |
| A. | layer 1 |
| B. | layer 2 |
| C. | layer 3 |
| D. | layer 4 |
| Answer» C. layer 3 | |
| 190. |
_________________ is the kind of firewall is connected between the device and the network connecting to internet. |
| A. | hardware firewall |
| B. | software firewall |
| C. | stateful inspection firewall |
| D. | microsoft firewall |
| Answer» B. software firewall | |
| 191. |
ESP (Encapsulating Security Protocol) is defined in which of the following standards? |
| A. | ipsec |
| B. | pptp |
| C. | ppp |
| D. | l2tp |
| Answer» B. pptp | |
| 192. |
Which layer 3 protocols can be transmitted over an L2TP VPN? |
| A. | only ip |
| B. | only ipx |
| C. | only icmp |
| D. | ip and ipx |
| Answer» E. | |
| 193. |
L2F was developed by which company? |
| A. | microsoft |
| B. | cisco |
| C. | blizzard entertainment |
| D. | ietf |
| Answer» C. blizzard entertainment | |
| 194. |
Traffic in a VPN is NOT ____________ |
| A. | invisible from public networks |
| B. | logically separated from other traffic |
| C. | accessible from unauthorized public networks |
| D. | restricted to a single protocol in ipsec |
| Answer» D. restricted to a single protocol in ipsec | |
| 195. |
Which of the following statements is NOT true concerning VPNs? |
| A. | financially rewarding compared to leased lines |
| B. | allows remote workers to access corporate data |
| C. | allows lan-to-lan connectivity over public networks |
| D. | is the backbone of the internet |
| Answer» E. | |
| 196. |
When were VPNs introduced into the commercial world? |
| A. | early 80’s |
| B. | late 80’s |
| C. | early 90’s |
| D. | late 90’s |
| Answer» E. | |
| 197. |
What protocol is NOT used in the operation of a VPN? |
| A. | pptp |
| B. | ipsec |
| C. | ymum |
| D. | l2tp |
| Answer» D. l2tp | |
| 198. |
__________ is used for encrypting data at network level. |
| A. | ipsec |
| B. | https |
| C. | smtp |
| D. | s/mime |
| Answer» B. https | |
| 199. |
Which of the following is not a secured mail transferring methodology? |
| A. | pop3 |
| B. | ssmtp |
| C. | mail using pgp |
| D. | s/mime |
| Answer» B. ssmtp | |
| 200. |
PGP offers _____ block ciphers for message encryption. |
| A. | triple-des |
| B. | cast |
| C. | idea |
| D. | all of the mentioned |
| Answer» E. | |