This section contains more frequently asked Cyber Crime and Cyber Laws MCQs in the various competitive exams.
1. A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______
- perform better
- more reliable
- more secure
- more error-free
2. What Security tradeoff occurs while using IDS (Intrusion Detection System)?
- Change in permission
- Login Failures
- Change in privilege
- Performance degradation
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system
3. EDI (Electronic Data Interchange) use
- requires an extranet
- requires value added network
- can be done on internet
- requires a corporate intranet
EDI is a standardized method for transferring data between different computer systems or computer networks. It is commonly used for e-commerce purposes, such as sending orders to warehouses, tracking shipments, and creating invoices.
4. EDI (Electronic Data Interchange) over internet uses
- MIME to attach EDI forms to e-mail messages
- FTP to send business forms
- HTTP to send business forms
- SGML to send business forms
5. For secure EDI (Electronic Data Interchange) transmission on internet
- MIME is used
- S/MIME is used
- PGP is used
- TCP/IP is used
6. EDI (Electronic Data Interchange) standard
- is not easily available
- defines several hundred transaction sets for various business forms
- is not popular
- defines only a transmission protocol
- i, ii
- ii, iii
- iii, iv
- i, iii, iv
8. A firewall is a
- wall built to prevent fires from damaging a corporate intranet
- security device deployed at the boundary of a company to prevent unauthorized physical access
- security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
- device to prevent all accesses from the internet to the corporate intranet
9. A firewall may be implemented in
- routers which connect intranet to internet
- bridges used in an intranet
- expensive modem
- user’s application programs
10. Firewall as part of a router program
- filters only packets coming from internet
- filters only packets going to internet
- filters packets travelling from and to the intranet from the internet
- ensures rapid traffic of packets for speedy e-Commerce