Exam 13: Understanding Cyber-Crime and Firewall Technologies in IT Act
Exam 1: Cybersecurity and Network Protocols23 Questions
Exam 2: DNS, IDS/IPS, and Digital Investigations9 Questions
Exam 3: Investigative Techniques and Digital Evidence in Crime Investigations5 Questions
Exam 4: Information Security and Encryption Terminology23 Questions
Exam 5: Cryptography and Data Protection22 Questions
Exam 6: Cryptography and VPNS23 Questions
Exam 7: Cryptography and Security Measures in Network Communication23 Questions
Exam 8: Cryptography Terminology and Techniques25 Questions
Exam 9: Cryptography and Network Security22 Questions
Exam 10: Information Security and Network Protocols23 Questions
Exam 11: Cryptography and Cryptographic Protocols23 Questions
Exam 12: Security Protocols, VPNS, and Firewalls21 Questions
Exam 13: Understanding Cyber-Crime and Firewall Technologies in IT Act29 Questions
Select questions type
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
D
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
C
Circuit-level gateway firewalls are installed in _______ layer of OSI model.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
Download copy, extract data from an open system done fraudulently is treated as _________
(Multiple Choice)
4.9/5
(29)
_____________ gateway firewalls are deployed in application-layer of OSI model.
(Multiple Choice)
4.8/5
(43)
Sending offensive message to someone comes under _____________ of the Indian IT Act ______
(Multiple Choice)
4.7/5
(38)
Which of these comes under the advantage of Circuit-level gateway firewalls?
(Multiple Choice)
4.9/5
(28)
Accessing computer without prior authorization is a cyber-crimes that come under _______
(Multiple Choice)
4.8/5
(41)
Stealing of digital files comes under __________ of the Indian IT Act.
(Multiple Choice)
4.8/5
(34)
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
(Multiple Choice)
4.8/5
(26)
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
(Multiple Choice)
4.7/5
(25)
Any digital content which any individual creates and is not acceptable to the society, it's a cyber-crime that comes under _________ of IT Act.
(Multiple Choice)
4.9/5
(40)
Packet filtering firewalls work effectively in _________ networks.
(Multiple Choice)
4.9/5
(30)
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
(Multiple Choice)
4.8/5
(36)
Network administrators can create their own ACL rules based on _______ ________ and _______
(Multiple Choice)
4.8/5
(25)
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
(Multiple Choice)
4.9/5
(31)
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.
(Multiple Choice)
4.9/5
(28)
Showing 1 - 20 of 29
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)