MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Computer Security
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
Does OSI stand for in the OSI Security Architecure?
a) open system interface
b) open systems interconnections
c) open source initiative
d) open standard interconnections
Q.2
Filtering firewalls work effectively in _________ networks.
very simple
smaller
large
very large complex
Q.3
A hash function is used to provide message authentication, the hash function value is referred to as
message field
message digest
message score
message leap
Q.4
of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.
true
false
Q.5
Of digital files comes under __________ of the Indian IT Act.
section 66-a
section 66-b
section 66-c
section 66-d
Q.6
Offensive message to someone comes under _____________ of the Indian IT Act ______
section 66-a, 2000
section 66-b, 2008
section 67, 2000
section 66-a, 2008
Q.7
Of digital signatures for fraudulent purposes comes under __________ of IT Act.
section 65
section 66
section 71
section 72
Q.8
Of spy cameras in malls and shops to capture private parts of any person comes under sectionof IT Act,and is punished with imprisonment of ___________
2 years
3 years
4 years
5 years
Q.9
Spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
section 66
section 67
section 68
section 69
Q.10
Anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
2
3
4
5
Q.11
Actmake cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act,he/she has to pay a legitimate amount of fine.
section 67-a
section 67-b
section 67-c
section 67-d
Q.12
Digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.
section 66
section 67
section 68
section 69
Q.13
Many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in sectionof the Indian IT Act, 2000?
1 year
2 years
3 years
4 years
Q.14
Cyber-crime that comes under sectionof IT Act, the accused person gets fined of around Rs ________
2 lacs
3 lacs
4 lacs
5 lacs
Q.15
Copy, extract data from an open system done fraudulently is treated as _________
cyber-warfare
cyber-security act
data-backup
cyber-crime
Q.16
Wi-Fi dishonestly is a cyber-crime.
true
false
Q.17
Digital identity of any individual or doing identity theft, comes under __________ of IT Act.
section 65
section 66
section 68
section 70
Q.18
Computer without prior authorization is a cyber-crimes that come under _______
section 65
section 66
section 68
section 70
Q.19
Can be categorized into ________ types.
4
3
2
6
Q.20
Layer firewalls are also called ____________
first generation firewalls
second generation firewalls
third generation firewalls
fourth generation firewalls
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page