

MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
151. |
Sending offensive message to someone comes under _____________ of the Indian IT Act ______ |
A. | section 66-a, 2000 |
B. | section 66-b, 2008 |
C. | section 67, 2000 |
D. | section 66-a, 2008 |
Answer» E. | |
152. |
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 71 |
D. | section 72 |
Answer» E. | |
153. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ |
A. | 2 years |
B. | 3 years |
C. | 4 years |
D. | 5 years |
Answer» C. 4 years | |
154. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» E. | |
155. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. |
A. | section 67-a |
B. | section 67-b |
C. | section 67-c |
D. | section 67-d |
Answer» B. section 67-b | |
156. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» C. section 68 | |
157. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. |
A. | section 66 |
B. | section 67 |
C. | section 68 |
D. | section 69 |
Answer» C. section 68 | |
158. |
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000? |
A. | 1 year |
B. | 2 years |
C. | 3 years |
D. | 4 years |
Answer» D. 4 years | |
159. |
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________ |
A. | 2 lacs |
B. | 3 lacs |
C. | 4 lacs |
D. | 5 lacs |
Answer» E. | |
160. |
Download copy, extract data from an open system done fraudulently is treated as _________ |
A. | cyber-warfare |
B. | cyber-security act |
C. | data-backup |
D. | cyber-crime |
Answer» E. | |
161. |
Accessing Wi-Fi dishonestly is a cyber-crime. |
A. | true |
B. | false |
Answer» B. false | |
162. |
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» C. section 68 | |
163. |
Accessing computer without prior authorization is a cyber-crimes that come under _______ |
A. | section 65 |
B. | section 66 |
C. | section 68 |
D. | section 70 |
Answer» C. section 68 | |
164. |
Cyber-crime can be categorized into ________ types. |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 6 |
Answer» D. 6 | |
165. |
Packet filtering firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» B. second generation firewalls | |
166. |
Application layer firewalls are also called ____________ |
A. | first generation firewalls |
B. | second generation firewalls |
C. | third generation firewalls |
D. | fourth generation firewalls |
Answer» D. fourth generation firewalls | |
167. |
Application level gateway firewalls are also used for configuring cache-servers. |
A. | true |
B. | false |
Answer» B. false | |
168. |
Application level gateway firewalls protect the network for specific _____________ |
A. | application layer protocol |
B. | session layer protocol |
C. | botnet attacks |
D. | network layer protocol |
Answer» B. session layer protocol | |
169. |
_____________ gateway firewalls are deployed in application-layer of OSI model. |
A. | packet filtering firewalls |
B. | circuit level gateway firewalls |
C. | application-level gateway firewalls |
D. | stateful multilayer inspection firewalls |
Answer» D. stateful multilayer inspection firewalls | |
170. |
Which of the following is a disadvantage of Circuit-level gateway firewalls? |
A. | they’re expensive |
B. | they’re complex in architecture |
C. | they do not filter individual packets |
D. | they’re complex to setup |
Answer» D. they’re complex to setup | |
171. |
Which of these comes under the advantage of Circuit-level gateway firewalls? |
A. | they maintain anonymity and also inexpensive |
B. | they are light-weight |
C. | they’re expensive yet efficient |
D. | they preserve ip address privacy yet expensive |
Answer» B. they are light-weight | |
172. |
Packet filtering firewalls are vulnerable to __________ |
A. | hardware vulnerabilities |
B. | mitm |
C. | phishing |
D. | spoofing |
Answer» E. | |
173. |
Packet filtering firewalls work effectively in _________ networks. |
A. | very simple |
B. | smaller |
C. | large |
D. | very large complex |
Answer» C. large | |
174. |
Circuit-level gateway firewalls are installed in _______ layer of OSI model. |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | network layer |
Answer» C. presentation layer | |
175. |
One advantage of Packet Filtering firewall is __________ |
A. | more efficient |
B. | less complex |
C. | less costly |
D. | very fast |
Answer» D. very fast | |
176. |
Network administrators can create their own ACL rules based on _______ ________ and _______ |
A. | address, protocols and packet attributes |
B. | address, protocols and security policies |
C. | address, policies and packet attributes |
D. | network topology, protocols and data packets |
Answer» B. address, protocols and security policies | |
177. |
When a packet does not fulfil the ACL criteria, the packet is _________ |
A. | resend |
B. | dropped |
C. | destroyed |
D. | acknowledged as received |
Answer» C. destroyed | |
178. |
ACL stands for _____________ |
A. | access condition list |
B. | anti-control list |
C. | access control logs |
D. | access control list |
Answer» E. | |
179. |
The __________ defines the packet filtering firewall rules. |
A. | access control list |
B. | protocols |
C. | policies |
D. | ports |
Answer» B. protocols | |
180. |
In the ______________ layer of OSI model, packet filtering firewalls are implemented. |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | network layer |
Answer» E. | |
181. |
Packet filtering firewalls are deployed on ________ |
A. | routers |
B. | switches |
C. | hubs |
D. | repeaters |
Answer» B. switches | |
182. |
A firewall protects which of the following attacks? |
A. | phishing |
B. | dumpster diving |
C. | denial of service (dos) |
D. | shoulder surfing |
Answer» D. shoulder surfing | |
183. |
There are ______ types of firewall. |
A. | 5 |
B. | 4 |
C. | 3 |
D. | 2 |
Answer» C. 3 | |
184. |
Firewall examines each ____________ that are entering or leaving the internal network. |
A. | emails users |
B. | updates |
C. | connections |
D. | data packets |
Answer» E. | |
185. |
Which of the following is not a software firewall? |
A. | windows firewall |
B. | outpost firewall pro |
C. | endian firewall |
D. | linksys firewall |
Answer» E. | |
186. |
Firewalls can be of _______ kinds. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» D. 4 | |
187. |
Which layer of the OSI reference model does IPsec work at? |
A. | layer 1 |
B. | layer 2 |
C. | layer 3 |
D. | layer 4 |
Answer» D. layer 4 | |
188. |
_________ is software that is installed using an internet connection or they come by-default with operating systems. |
A. | hardware firewall |
B. | software firewall |
C. | stateful inspection firewall |
D. | microsoft firewall |
Answer» C. stateful inspection firewall | |
189. |
Which layer of the OSI reference model does PPTP work at? |
A. | layer 1 |
B. | layer 2 |
C. | layer 3 |
D. | layer 4 |
Answer» C. layer 3 | |
190. |
_________________ is the kind of firewall is connected between the device and the network connecting to internet. |
A. | hardware firewall |
B. | software firewall |
C. | stateful inspection firewall |
D. | microsoft firewall |
Answer» B. software firewall | |
191. |
ESP (Encapsulating Security Protocol) is defined in which of the following standards? |
A. | ipsec |
B. | pptp |
C. | ppp |
D. | l2tp |
Answer» B. pptp | |
192. |
Which layer 3 protocols can be transmitted over an L2TP VPN? |
A. | only ip |
B. | only ipx |
C. | only icmp |
D. | ip and ipx |
Answer» E. | |
193. |
L2F was developed by which company? |
A. | microsoft |
B. | cisco |
C. | blizzard entertainment |
D. | ietf |
Answer» C. blizzard entertainment | |
194. |
Traffic in a VPN is NOT ____________ |
A. | invisible from public networks |
B. | logically separated from other traffic |
C. | accessible from unauthorized public networks |
D. | restricted to a single protocol in ipsec |
Answer» D. restricted to a single protocol in ipsec | |
195. |
Which of the following statements is NOT true concerning VPNs? |
A. | financially rewarding compared to leased lines |
B. | allows remote workers to access corporate data |
C. | allows lan-to-lan connectivity over public networks |
D. | is the backbone of the internet |
Answer» E. | |
196. |
When were VPNs introduced into the commercial world? |
A. | early 80’s |
B. | late 80’s |
C. | early 90’s |
D. | late 90’s |
Answer» E. | |
197. |
What protocol is NOT used in the operation of a VPN? |
A. | pptp |
B. | ipsec |
C. | ymum |
D. | l2tp |
Answer» D. l2tp | |
198. |
__________ is used for encrypting data at network level. |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» B. https | |
199. |
Which of the following is not a secured mail transferring methodology? |
A. | pop3 |
B. | ssmtp |
C. | mail using pgp |
D. | s/mime |
Answer» B. ssmtp | |
200. |
PGP offers _____ block ciphers for message encryption. |
A. | triple-des |
B. | cast |
C. | idea |
D. | all of the mentioned |
Answer» E. | |