This section contains more frequently asked Cyber Crime and Cyber Laws MCQs in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______

  • perform better
  • more reliable
  • more secure
  • more error-free

2. What Security tradeoff occurs while using IDS (Intrusion Detection System)?

  • Change in permission
  • Login Failures
  • Change in privilege
  • Performance degradation

3. EDI (Electronic Data Interchange) use

  • requires an extranet
  • requires value added network
  • can be done on internet
  • requires a corporate intranet

4. EDI (Electronic Data Interchange) over internet uses

  • MIME to attach EDI forms to e-mail messages
  • FTP to send business forms
  • HTTP to send business forms
  • SGML to send business forms

5. For secure EDI (Electronic Data Interchange) transmission on internet

  • MIME is used
  • S/MIME is used
  • PGP is used
  • TCP/IP is used

6. EDI (Electronic Data Interchange) standard

  • is not easily available
  • defines several hundred transaction sets for various business forms
  • is not popular
  • defines only a transmission protocol

7. By security in e-Commerce we mean
(i) Protecting an organization’s data resource from unauthorized access
(ii)Preventing disasters from happening
(iii) Authenticating messages received by an organization
(iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations

  • i, ii
  • ii, iii
  • iii, iv
  • i, iii, iv

8. A firewall is a

  • wall built to prevent fires from damaging a corporate intranet
  • security device deployed at the boundary of a company to prevent unauthorized physical access
  • security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
  • device to prevent all accesses from the internet to the corporate intranet

9. A firewall may be implemented in

  • routers which connect intranet to internet
  • bridges used in an intranet
  • expensive modem
  • user’s application programs

10. Firewall as part of a router program

  • filters only packets coming from internet
  • filters only packets going to internet
  • filters packets travelling from and to the intranet from the internet
  • ensures rapid traffic of packets for speedy e-Commerce
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook