Exam 13: Understanding Cyber-Crime and Firewall Technologies in IT Act

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
Verified

D

How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

C

Circuit-level gateway firewalls are installed in _______ layer of OSI model.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

Application layer firewalls are also called ____________

(Multiple Choice)
4.9/5
(31)

Download copy, extract data from an open system done fraudulently is treated as _________

(Multiple Choice)
4.9/5
(29)

_____________ gateway firewalls are deployed in application-layer of OSI model.

(Multiple Choice)
4.8/5
(43)

Sending offensive message to someone comes under _____________ of the Indian IT Act ______

(Multiple Choice)
4.7/5
(38)

Packet filtering firewalls are also called ____________

(Multiple Choice)
4.8/5
(37)

Which of these comes under the advantage of Circuit-level gateway firewalls?

(Multiple Choice)
4.9/5
(28)

Accessing computer without prior authorization is a cyber-crimes that come under _______

(Multiple Choice)
4.8/5
(41)

Stealing of digital files comes under __________ of the Indian IT Act.

(Multiple Choice)
4.8/5
(34)

Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

(Multiple Choice)
4.8/5
(26)

If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

(Multiple Choice)
4.7/5
(25)

Any digital content which any individual creates and is not acceptable to the society, it's a cyber-crime that comes under _________ of IT Act.

(Multiple Choice)
4.9/5
(40)

Accessing Wi-Fi dishonestly is a cyber-crime.

(True/False)
4.8/5
(40)

Packet filtering firewalls work effectively in _________ networks.

(Multiple Choice)
4.9/5
(30)

Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

(Multiple Choice)
4.8/5
(36)

Network administrators can create their own ACL rules based on _______ ________ and _______

(Multiple Choice)
4.8/5
(25)

Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

(Multiple Choice)
4.9/5
(31)

IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

(Multiple Choice)
4.9/5
(28)
Showing 1 - 20 of 29
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)