Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

151.

Sending offensive message to someone comes under _____________ of the Indian IT Act ______

A. section 66-a, 2000
B. section 66-b, 2008
C. section 67, 2000
D. section 66-a, 2008
Answer» E.
152.

Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

A. section 65
B. section 66
C. section 71
D. section 72
Answer» E.
153.

Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

A. 2 years
B. 3 years
C. 4 years
D. 5 years
Answer» C. 4 years
154.

If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

A. 2
B. 3
C. 4
D. 5
Answer» E.
155.

IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

A. section 67-a
B. section 67-b
C. section 67-c
D. section 67-d
Answer» B. section 67-b
156.

Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

A. section 66
B. section 67
C. section 68
D. section 69
Answer» C. section 68
157.

Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

A. section 66
B. section 67
C. section 68
D. section 69
Answer» C. section 68
158.

How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

A. 1 year
B. 2 years
C. 3 years
D. 4 years
Answer» D. 4 years
159.

Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

A. 2 lacs
B. 3 lacs
C. 4 lacs
D. 5 lacs
Answer» E.
160.

Download copy, extract data from an open system done fraudulently is treated as _________

A. cyber-warfare
B. cyber-security act
C. data-backup
D. cyber-crime
Answer» E.
161.

Accessing Wi-Fi dishonestly is a cyber-crime.

A. true
B. false
Answer» B. false
162.

Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

A. section 65
B. section 66
C. section 68
D. section 70
Answer» C. section 68
163.

Accessing computer without prior authorization is a cyber-crimes that come under _______

A. section 65
B. section 66
C. section 68
D. section 70
Answer» C. section 68
164.

Cyber-crime can be categorized into ________ types.

A. 4
B. 3
C. 2
D. 6
Answer» D. 6
165.

Packet filtering firewalls are also called ____________

A. first generation firewalls
B. second generation firewalls
C. third generation firewalls
D. fourth generation firewalls
Answer» B. second generation firewalls
166.

Application layer firewalls are also called ____________

A. first generation firewalls
B. second generation firewalls
C. third generation firewalls
D. fourth generation firewalls
Answer» D. fourth generation firewalls
167.

Application level gateway firewalls are also used for configuring cache-servers.

A. true
B. false
Answer» B. false
168.

Application level gateway firewalls protect the network for specific _____________

A. application layer protocol
B. session layer protocol
C. botnet attacks
D. network layer protocol
Answer» B. session layer protocol
169.

_____________ gateway firewalls are deployed in application-layer of OSI model.

A. packet filtering firewalls
B. circuit level gateway firewalls
C. application-level gateway firewalls
D. stateful multilayer inspection firewalls
Answer» D. stateful multilayer inspection firewalls
170.

Which of the following is a disadvantage of Circuit-level gateway firewalls?

A. they’re expensive
B. they’re complex in architecture
C. they do not filter individual packets
D. they’re complex to setup
Answer» D. they’re complex to setup
171.

Which of these comes under the advantage of Circuit-level gateway firewalls?

A. they maintain anonymity and also inexpensive
B. they are light-weight
C. they’re expensive yet efficient
D. they preserve ip address privacy yet expensive
Answer» B. they are light-weight
172.

Packet filtering firewalls are vulnerable to __________

A. hardware vulnerabilities
B. mitm
C. phishing
D. spoofing
Answer» E.
173.

Packet filtering firewalls work effectively in _________ networks.

A. very simple
B. smaller
C. large
D. very large complex
Answer» C. large
174.

Circuit-level gateway firewalls are installed in _______ layer of OSI model.

A. application layer
B. session layer
C. presentation layer
D. network layer
Answer» C. presentation layer
175.

One advantage of Packet Filtering firewall is __________

A. more efficient
B. less complex
C. less costly
D. very fast
Answer» D. very fast
176.

Network administrators can create their own ACL rules based on _______ ________ and _______

A. address, protocols and packet attributes
B. address, protocols and security policies
C. address, policies and packet attributes
D. network topology, protocols and data packets
Answer» B. address, protocols and security policies
177.

When a packet does not fulfil the ACL criteria, the packet is _________

A. resend
B. dropped
C. destroyed
D. acknowledged as received
Answer» C. destroyed
178.

ACL stands for _____________

A. access condition list
B. anti-control list
C. access control logs
D. access control list
Answer» E.
179.

The __________ defines the packet filtering firewall rules.

A. access control list
B. protocols
C. policies
D. ports
Answer» B. protocols
180.

In the ______________ layer of OSI model, packet filtering firewalls are implemented.

A. application layer
B. session layer
C. presentation layer
D. network layer
Answer» E.
181.

Packet filtering firewalls are deployed on ________

A. routers
B. switches
C. hubs
D. repeaters
Answer» B. switches
182.

A firewall protects which of the following attacks?

A. phishing
B. dumpster diving
C. denial of service (dos)
D. shoulder surfing
Answer» D. shoulder surfing
183.

There are ______ types of firewall.

A. 5
B. 4
C. 3
D. 2
Answer» C. 3
184.

Firewall examines each ____________ that are entering or leaving the internal network.

A. emails users
B. updates
C. connections
D. data packets
Answer» E.
185.

Which of the following is not a software firewall?

A. windows firewall
B. outpost firewall pro
C. endian firewall
D. linksys firewall
Answer» E.
186.

Firewalls can be of _______ kinds.

A. 1
B. 2
C. 3
D. 4
Answer» D. 4
187.

Which layer of the OSI reference model does IPsec work at?

A. layer 1
B. layer 2
C. layer 3
D. layer 4
Answer» D. layer 4
188.

_________ is software that is installed using an internet connection or they come by-default with operating systems.

A. hardware firewall
B. software firewall
C. stateful inspection firewall
D. microsoft firewall
Answer» C. stateful inspection firewall
189.

Which layer of the OSI reference model does PPTP work at?

A. layer 1
B. layer 2
C. layer 3
D. layer 4
Answer» C. layer 3
190.

_________________ is the kind of firewall is connected between the device and the network connecting to internet.

A. hardware firewall
B. software firewall
C. stateful inspection firewall
D. microsoft firewall
Answer» B. software firewall
191.

ESP (Encapsulating Security Protocol) is defined in which of the following standards?

A. ipsec
B. pptp
C. ppp
D. l2tp
Answer» B. pptp
192.

Which layer 3 protocols can be transmitted over an L2TP VPN?

A. only ip
B. only ipx
C. only icmp
D. ip and ipx
Answer» E.
193.

L2F was developed by which company?

A. microsoft
B. cisco
C. blizzard entertainment
D. ietf
Answer» C. blizzard entertainment
194.

Traffic in a VPN is NOT ____________

A. invisible from public networks
B. logically separated from other traffic
C. accessible from unauthorized public networks
D. restricted to a single protocol in ipsec
Answer» D. restricted to a single protocol in ipsec
195.

Which of the following statements is NOT true concerning VPNs?

A. financially rewarding compared to leased lines
B. allows remote workers to access corporate data
C. allows lan-to-lan connectivity over public networks
D. is the backbone of the internet
Answer» E.
196.

When were VPNs introduced into the commercial world?

A. early 80’s
B. late 80’s
C. early 90’s
D. late 90’s
Answer» E.
197.

What protocol is NOT used in the operation of a VPN?

A. pptp
B. ipsec
C. ymum
D. l2tp
Answer» D. l2tp
198.

__________ is used for encrypting data at network level.

A. ipsec
B. https
C. smtp
D. s/mime
Answer» B. https
199.

Which of the following is not a secured mail transferring methodology?

A. pop3
B. ssmtp
C. mail using pgp
D. s/mime
Answer» B. ssmtp
200.

PGP offers _____ block ciphers for message encryption.

A. triple-des
B. cast
C. idea
D. all of the mentioned
Answer» E.