Deck 13: Understanding Cyber-Crime and Firewall Technologies in IT Act

ملء الشاشة (f)
exit full mode
سؤال
Network administrators can create their own ACL rules based on _______ ________ and _______

A)address, protocols and packet attributes
B)address, protocols and security policies
C)address, policies and packet attributes
D)network topology, protocols and data packets
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One advantage of Packet Filtering firewall is __________

A)more efficient
B)less complex
C)less costly
D)very fast
سؤال
Packet filtering firewalls work effectively in _________ networks.

A)very simple
B)smaller
C)large
D)very large complex
سؤال
Packet filtering firewalls are vulnerable to __________

A)hardware vulnerabilities
B)mitm
C)phishing
D)spoofing
سؤال
Circuit-level gateway firewalls are installed in _______ layer of OSI model.

A)application layer
B)session layer
C)presentation layer
D)network layer
سؤال
Which of these comes under the advantage of Circuit-level gateway firewalls?

A)they maintain anonymity and also inexpensive
B)they are light-weight
C)they're expensive yet efficient
D)they preserve ip address privacy yet expensive
سؤال
Which of the following is a disadvantage of Circuit-level gateway firewalls?

A)they're expensive
B)they're complex in architecture
C)they do not filter individual packets
D)they're complex to setup
سؤال
_____________ gateway firewalls are deployed in application-layer of OSI model.

A)packet filtering firewalls
B)circuit level gateway firewalls
C)application-level gateway firewalls
D)stateful multilayer inspection firewalls
سؤال
Application level gateway firewalls protect the network for specific _____________

A)application layer protocol
B)session layer protocol
C)botnet attacks
D)network layer protocol
سؤال
Application level gateway firewalls are also used for configuring cache-servers.
سؤال
Packet filtering firewalls are also called ____________

A)first generation firewalls
B)second generation firewalls
C)third generation firewalls
D)fourth generation firewalls
سؤال
Application layer firewalls are also called ____________

A)first generation firewalls
B)second generation firewalls
C)third generation firewalls
D)fourth generation firewalls
سؤال
Cyber-crime can be categorized into ________ types.

A)4
B)3
C)2
D)6
سؤال
Accessing computer without prior authorization is a cyber-crimes that come under _______

A)section 65
B)section 66
C)section 68
D)section 70
سؤال
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

A)section 65
B)section 66
C)section 68
D)section 70
سؤال
Accessing Wi-Fi dishonestly is a cyber-crime.
سؤال
Download copy, extract data from an open system done fraudulently is treated as _________

A)cyber-warfare
B)cyber-security act
C)data-backup
D)cyber-crime
سؤال
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

A)2 lacs
B)3 lacs
C)4 lacs
D)5 lacs
سؤال
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

A)1 year
B)2 years
C)3 years
D)4 years
سؤال
Any digital content which any individual creates and is not acceptable to the society, it's a cyber-crime that comes under _________ of IT Act.

A)section 66
B)section 67
C)section 68
D)section 69
سؤال
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

A)section 67-a
B)section 67-b
C)section 67-c
D)section 67-d
سؤال
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

A)2
B)3
C)4
D)5
سؤال
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

A)section 66
B)section 67
C)section 68
D)section 69
سؤال
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
سؤال
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

A)2 years
B)3 years
C)4 years
D)5 years
سؤال
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

A)section 65
B)section 66
C)section 71
D)section 72
سؤال
Sending offensive message to someone comes under _____________ of the Indian IT Act ______

A)section 66-a, 2000
B)section 66-b, 2008
C)section 67, 2000
D)section 66-a, 2008
سؤال
Stealing of digital files comes under __________ of the Indian IT Act.

A)section 66-a
B)section 66-b
C)section 66-c
D)section 66-d
سؤال
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Understanding Cyber-Crime and Firewall Technologies in IT Act
1
Network administrators can create their own ACL rules based on _______ ________ and _______

A)address, protocols and packet attributes
B)address, protocols and security policies
C)address, policies and packet attributes
D)network topology, protocols and data packets
address, protocols and packet attributes
2
One advantage of Packet Filtering firewall is __________

A)more efficient
B)less complex
C)less costly
D)very fast
less costly
3
Packet filtering firewalls work effectively in _________ networks.

A)very simple
B)smaller
C)large
D)very large complex
smaller
4
Packet filtering firewalls are vulnerable to __________

A)hardware vulnerabilities
B)mitm
C)phishing
D)spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
5
Circuit-level gateway firewalls are installed in _______ layer of OSI model.

A)application layer
B)session layer
C)presentation layer
D)network layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of these comes under the advantage of Circuit-level gateway firewalls?

A)they maintain anonymity and also inexpensive
B)they are light-weight
C)they're expensive yet efficient
D)they preserve ip address privacy yet expensive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is a disadvantage of Circuit-level gateway firewalls?

A)they're expensive
B)they're complex in architecture
C)they do not filter individual packets
D)they're complex to setup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
8
_____________ gateway firewalls are deployed in application-layer of OSI model.

A)packet filtering firewalls
B)circuit level gateway firewalls
C)application-level gateway firewalls
D)stateful multilayer inspection firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
9
Application level gateway firewalls protect the network for specific _____________

A)application layer protocol
B)session layer protocol
C)botnet attacks
D)network layer protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
10
Application level gateway firewalls are also used for configuring cache-servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
11
Packet filtering firewalls are also called ____________

A)first generation firewalls
B)second generation firewalls
C)third generation firewalls
D)fourth generation firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
12
Application layer firewalls are also called ____________

A)first generation firewalls
B)second generation firewalls
C)third generation firewalls
D)fourth generation firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
13
Cyber-crime can be categorized into ________ types.

A)4
B)3
C)2
D)6
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
14
Accessing computer without prior authorization is a cyber-crimes that come under _______

A)section 65
B)section 66
C)section 68
D)section 70
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
15
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

A)section 65
B)section 66
C)section 68
D)section 70
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
16
Accessing Wi-Fi dishonestly is a cyber-crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
17
Download copy, extract data from an open system done fraudulently is treated as _________

A)cyber-warfare
B)cyber-security act
C)data-backup
D)cyber-crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
18
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

A)2 lacs
B)3 lacs
C)4 lacs
D)5 lacs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
19
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

A)1 year
B)2 years
C)3 years
D)4 years
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
20
Any digital content which any individual creates and is not acceptable to the society, it's a cyber-crime that comes under _________ of IT Act.

A)section 66
B)section 67
C)section 68
D)section 69
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
21
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

A)section 67-a
B)section 67-b
C)section 67-c
D)section 67-d
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
22
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

A)2
B)3
C)4
D)5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
23
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

A)section 66
B)section 67
C)section 68
D)section 69
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
24
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
25
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

A)2 years
B)3 years
C)4 years
D)5 years
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
26
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

A)section 65
B)section 66
C)section 71
D)section 72
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
27
Sending offensive message to someone comes under _____________ of the Indian IT Act ______

A)section 66-a, 2000
B)section 66-b, 2008
C)section 67, 2000
D)section 66-a, 2008
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
28
Stealing of digital files comes under __________ of the Indian IT Act.

A)section 66-a
B)section 66-b
C)section 66-c
D)section 66-d
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
29
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.