Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40What is a “vlog”? Video blog None Log of blog activity Video Log 2 / 40Which of the following is/are threats for electronic payment systems? Computer virus Computer worms Trojan horse All of the above 3 / 40Thie first compter virus is _____ Blaster Creeper I Love You Sasser 4 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Reliability Longevity Performance Security 5 / 40It is stealing ideas or creation of others. Piracy Plagiarism All of the above Intellectual property rights 6 / 40Key logger is Antivirus All of the above Firmware Spyware 7 / 40IPv6 address length is 32 bits 256 bits 64 bits 128 bits 8 / 40The first computer virus is _____________ Boot sector Creeper I Love You Polymorphic 9 / 40Computer virus are ___________ man made All of the above Naturally Occur machine Made 10 / 40MCAfee is an example of Antivirus Photo Editing Software Quick Heal Virus 11 / 40Firewalls are used to protect against virus attacks unauthorized access data driven attacks fire attacks 12 / 40When was cyber law established in Nepal? 2011 2009 2005 2007 13 / 40Authentication is ___ Integration Modification identity of user on a remote system Insertion 14 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Ethics None of the options Protocol Standard 15 / 40what is telnet? Search engine Browser Gateway Protocol 16 / 40Which of the following does not fall under area of cyber law? Digital Signature Data Management Data Protection Telecommunication Law 17 / 40The objectives of Information technology is All of the options To establish knowledge based industries To make IT accessible to general public and increase employment To build knowledge based society 18 / 40Authentication is Hard to assure identify of user on a remote system Insertion Modification None of the option 19 / 40To protect a computer from virus, you should install _______ in your computer. backup wizard antivirus disk cleanup disk defragmenter 20 / 40Unwanted email is known as _________ Spyware Virus Malware Spam 21 / 40Which of the following is not a way of protection? Personnel security Piracy Personal Security Physical Security 22 / 40The altering of data sO that is not usable unless the changes are undone is encryption ergonomics biometrics compression 23 / 40Which Of the Following Malicious Program Do Not replicate automatically? Zombie Virus Worm Trojan Horse 24 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Malware Spyware Zombie Adware 25 / 40Which one of the following systems cannot be considered as an example of the operating systems? Red Hat Linux BSD Linux Windows Microsoft Office 26 / 40General guidelines of computer ethics are needed for ________ All the option are correct Cracking Computer crime Protection of personal data 27 / 40___is the illegal access to the network or computer system. Cracking Virus Security Piracy 28 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VPN VSN VSPN VNP 29 / 40Firewall is a type of _________ Virus None of the option Worm Security Threat 30 / 40To protect yourself from computer hacker, you should turn on a Firewall Script VLC Antivirus 31 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Switching Transferring Tunneling Trafficking 32 / 40To protect yourself from computer hacker, you should turn on a VLC Firewall Script Antivirus 33 / 40A web address is also known as ULR LRU LUR URL 34 / 40Which of the following is not a type of cybercrime? Forgery Data theft Damage to data and systems Installing antivirus for protection 35 / 40MCAfee is an example of Photo Editing Software Virus Quick Heal Antivirus 36 / 40Junk E-mail is also known as sniffer Spam Spoof Copple crumbs 37 / 40Which of the following is known as malicious software? illegalware maliciousware malware badware 38 / 40Why Would A Hacker Use A Proxy Server? To Create A Stronger Connection With The Target. To Obtain A Remote Access Connection. To Create A Ghost Server On The Network. To Hide Malicious Activity on The Network 39 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Phishing None of these Spamming Spoofing 40 / 40Which of the following is known as Malicious software? maliciousware badware malware illegalware Your score isThe average score is 55% 0% Restart quiz Post Views: 1,259