Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge

Information Security and Cyber Law

1 / 40

What is a “vlog”?

2 / 40

Which of the following is/are threats for electronic payment systems?

3 / 40

Thie first compter virus is _____

4 / 40

In the computer networks, the encryption techniques are primarily used for improving the ______

5 / 40

It is stealing ideas or creation of others.

6 / 40

Key logger is

7 / 40

IPv6 address length is

8 / 40

The first computer virus is _____________

9 / 40

Computer virus are ___________

10 / 40

MCAfee is an example of

11 / 40

Firewalls are used to protect against

12 / 40

When was cyber law established in Nepal?

13 / 40

Authentication is ___

14 / 40

________ is a set of rules for determining moral standards or socially acceptable behavior.

15 / 40

what is telnet?

16 / 40

Which of the following does not fall under area of cyber law?

17 / 40

The objectives of Information technology is

18 / 40

Authentication is

19 / 40

To protect a computer from virus, you should install _______ in your computer.

20 / 40

Unwanted email is known as _________

21 / 40

Which of the following is not a way of protection?

22 / 40

The altering of data sO that is not usable unless the changes are undone is

23 / 40

Which Of the Following Malicious Program Do Not replicate automatically?

24 / 40

______________ monitors the user activities on internet and transmit that information in the background someone else.

25 / 40

Which one of the following systems cannot be considered as an example of the operating systems?

26 / 40

General guidelines of computer ethics are needed for ________

27 / 40

___is the illegal access to the network or computer system.

28 / 40

Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection...

29 / 40

Firewall is a type of _________

30 / 40

To protect yourself from computer hacker, you should turn on a

31 / 40

What is used to carry traffic of one protocol over the network that does not support that protocol directly ______

32 / 40

To protect yourself from computer hacker, you should turn on a

33 / 40

A web address is also known as

34 / 40

Which of the following is not a type of cybercrime?

35 / 40

MCAfee is an example of

36 / 40

Junk E-mail is also known as

37 / 40

Which of the following is known as malicious software?

38 / 40

Why Would A Hacker Use A Proxy Server?

39 / 40

A hacker contacts your phone or E-mail and attempts to acquire your password is called

40 / 40

Which of the following is known as Malicious software?

Your score is

The average score is 55%

0%