Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer
Q. One advantage of Packet Filtering firewall is __________
a. more efficient
b. less complex
c. less costly
d. very fast
Q. Packet filtering firewalls work effectively in _________ networks.
a. very simple
b. smaller
c. large
d. very large complex
Q. Packet filtering firewalls are vulnerable to __________
a. hardware vulnerabilities
b. mitm
c. phishing
d. spoofing
Q. Circuit-level gateway firewalls are installed in _______ layer of OSI model.
a. application layer
b. session layer
c. presentation layer
d. network layer
Q. Which of these comes under the advantage of Circuit-level gateway firewalls?
a. they maintain anonymity and also inexpensive
b. they are light-weight
c. they’re expensive yet efficient
d. they preserve ip address privacy yet expensive
Q. Which of the following is a disadvantage of Circuit-level gateway firewalls?
a. they’re expensive
b. they’re complex in architecture
c. they do not filter individual packets
d. they’re complex to setup
Q. _____________ gateway firewalls are deployed in application-layer of OSI model.
a. packet filtering firewalls
b. circuit level gateway firewalls
c. application-level gateway firewalls
d. stateful multilayer inspection firewalls
Q. Application level gateway firewalls protect the network for specific _____________
a. application layer protocol
b. session layer protocol
c. botnet attacks
d. network layer protocol
Q. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
a. section 65
b. section 66
c. section 71
d. section 72
Q. Sending offensive message to someone comes under _____________ of the Indian IT Act ______
a. section 66-a, 2000
b. section 66-b, 2008
c. section 67, 2000
d. section 66-a, 2008
Q. Stealing of digital files comes under __________ of the Indian IT Act.
a. section 66-a
b. section 66-b
c. section 66-c
d. section 66-d
Q. DNS can use services of________using the well known port 53
a. udp
b. tcp
c. either (a) or (b)
d. none of the above
Q. In the DNS the names are defined in _____ sturucture
a. a linear list
b. an invertred tree
c. a graph
d. none
Q. The root of DNS tree is____
a. a string of characters
b. a string of 63 characters
c. an empty string
d. none
Q. A full domain name is sequence of lables seperated by____
a. semicolons
b. dots
c. colons
d. none