Q.1
Does OSI stand for in the OSI Security Architecure?
  • a) open system interface
  • b) open systems interconnections
  • c) open source initiative
  • d) open standard interconnections
Q.2
Filtering firewalls work effectively in _________ networks.
  • very simple
  • smaller
  • large
  • very large complex
Q.3
A hash function is used to provide message authentication, the hash function value is referred to as
  • message field
  • message digest
  • message score
  • message leap
Q.4
of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.
  • true
  • false
Q.5
Of digital files comes under __________ of the Indian IT Act.
  • section 66-a
  • section 66-b
  • section 66-c
  • section 66-d
Q.6
Offensive message to someone comes under _____________ of the Indian IT Act ______
  • section 66-a, 2000
  • section 66-b, 2008
  • section 67, 2000
  • section 66-a, 2008
Q.7
Of digital signatures for fraudulent purposes comes under __________ of IT Act.
  • section 65
  • section 66
  • section 71
  • section 72
Q.8
Of spy cameras in malls and shops to capture private parts of any person comes under sectionof IT Act,and is punished with imprisonment of ___________
  • 2 years
  • 3 years
  • 4 years
  • 5 years
Q.9
Spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
  • section 66
  • section 67
  • section 68
  • section 69
Q.10
Anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
  • 2
  • 3
  • 4
  • 5
Q.11
Actmake cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act,he/she has to pay a legitimate amount of fine.
  • section 67-a
  • section 67-b
  • section 67-c
  • section 67-d
Q.12
Digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.
  • section 66
  • section 67
  • section 68
  • section 69
Q.13
Many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in sectionof the Indian IT Act, 2000?
  • 1 year
  • 2 years
  • 3 years
  • 4 years
Q.14
Cyber-crime that comes under sectionof IT Act, the accused person gets fined of around Rs ________
  • 2 lacs
  • 3 lacs
  • 4 lacs
  • 5 lacs
Q.15
Copy, extract data from an open system done fraudulently is treated as _________
  • cyber-warfare
  • cyber-security act
  • data-backup
  • cyber-crime
Q.16
Wi-Fi dishonestly is a cyber-crime.
  • true
  • false
Q.17
Digital identity of any individual or doing identity theft, comes under __________ of IT Act.
  • section 65
  • section 66
  • section 68
  • section 70
Q.18
Computer without prior authorization is a cyber-crimes that come under _______
  • section 65
  • section 66
  • section 68
  • section 70
Q.19
Can be categorized into ________ types.
  • 4
  • 3
  • 2
  • 6
Q.20
Layer firewalls are also called ____________
  • first generation firewalls
  • second generation firewalls
  • third generation firewalls
  • fourth generation firewalls
0 h : 0 m : 1 s