Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 91 to 105 of 239

Q. One advantage of Packet Filtering firewall is __________

a. more efficient

b. less complex

c. less costly

d. very fast

  • c. less costly

Q. Packet filtering firewalls work effectively in _________ networks.

a. very simple

b. smaller

c. large

d. very large complex

  • b. smaller

Q. Packet filtering firewalls are vulnerable to __________

a. hardware vulnerabilities

b. mitm

c. phishing

d. spoofing

  • d. spoofing

Q. Circuit-level gateway firewalls are installed in _______ layer of OSI model.

a. application layer

b. session layer

c. presentation layer

d. network layer

  • b. session layer

Q. Which of these comes under the advantage of Circuit-level gateway firewalls?

a. they maintain anonymity and also inexpensive

b. they are light-weight

c. they’re expensive yet efficient

d. they preserve ip address privacy yet expensive

  • a. they maintain anonymity and also inexpensive

Q. Which of the following is a disadvantage of Circuit-level gateway firewalls?

a. they’re expensive

b. they’re complex in architecture

c. they do not filter individual packets

d. they’re complex to setup

  • c. they do not filter individual packets

Q. _____________ gateway firewalls are deployed in application-layer of OSI model.

a. packet filtering firewalls

b. circuit level gateway firewalls

c. application-level gateway firewalls

d. stateful multilayer inspection firewalls

  • c. application-level gateway firewalls

Q. Application level gateway firewalls protect the network for specific _____________

a. application layer protocol

b. session layer protocol

c. botnet attacks

d. network layer protocol

  • a. application layer protocol

Q. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

a. section 65

b. section 66

c. section 71

d. section 72

  • d. section 72

Q. Sending offensive message to someone comes under _____________ of the Indian IT Act ______

a. section 66-a, 2000

b. section 66-b, 2008

c. section 67, 2000

d. section 66-a, 2008

  • d. section 66-a, 2008

Q. Stealing of digital files comes under __________ of the Indian IT Act.

a. section 66-a

b. section 66-b

c. section 66-c

d. section 66-d

  • c. section 66-c

Q. DNS can use services of________using the well known port 53

a. udp

b. tcp

c. either (a) or (b)

d. none of the above

  • c. either (a) or (b)

Q. In the DNS the names are defined in _____ sturucture

a. a linear list

b. an invertred tree

c. a graph

d. none

  • b. an invertred tree

Q. The root of DNS tree is____

a. a string of characters

b. a string of 63 characters

c. an empty string

d. none

  • c. an empty string

Q. A full domain name is sequence of lables seperated by____

a. semicolons

b. dots

c. colons

d. none

  • b. dots
Subscribe Now

Get All Updates & News