Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40Which of the following is known as malicious software? badware illegalware maliciousware malware 2 / 40When was cyber law established in Nepal? 2009 2011 2007 2005 3 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Zombie Adware Spyware Malware 4 / 40The altering of data sO that is not usable unless the changes are undone is compression encryption ergonomics biometrics 5 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VSPN VPN VNP VSN 6 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Spoofing Phishing None of these Spamming 7 / 40The objectives of Information technology is To make IT accessible to general public and increase employment All of the options To build knowledge based society To establish knowledge based industries 8 / 40___is the illegal access to the network or computer system. Security Piracy Virus Cracking 9 / 40A web address is also known as ULR LUR URL LRU 10 / 40Which one of the following systems cannot be considered as an example of the operating systems? Windows Microsoft Office Red Hat Linux BSD Linux 11 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. None of the options Ethics Protocol Standard 12 / 40Thie first compter virus is _____ I Love You Creeper Sasser Blaster 13 / 40MCAfee is an example of Virus Antivirus Quick Heal Photo Editing Software 14 / 40To protect yourself from computer hacker, you should turn on a VLC Script Firewall Antivirus 15 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Security Performance Reliability Longevity 16 / 40Key logger is All of the above Firmware Spyware Antivirus 17 / 40What is a “vlog”? Log of blog activity None Video blog Video Log 18 / 40what is telnet? Gateway Protocol Search engine Browser 19 / 40Firewall is a type of _________ None of the option Security Threat Worm Virus 20 / 40Unwanted email is known as _________ Malware Virus Spyware Spam 21 / 40To protect yourself from computer hacker, you should turn on a Firewall VLC Antivirus Script 22 / 40Firewalls are used to protect against virus attacks data driven attacks fire attacks unauthorized access 23 / 40It is stealing ideas or creation of others. Plagiarism Intellectual property rights All of the above Piracy 24 / 40Authentication is Hard to assure identify of user on a remote system None of the option Modification Insertion 25 / 40IPv6 address length is 256 bits 64 bits 128 bits 32 bits 26 / 40Which of the following is not a type of cybercrime? Data theft Installing antivirus for protection Forgery Damage to data and systems 27 / 40Which of the following is known as Malicious software? badware illegalware maliciousware malware 28 / 40To protect a computer from virus, you should install _______ in your computer. disk defragmenter antivirus backup wizard disk cleanup 29 / 40Authentication is ___ Modification identity of user on a remote system Insertion Integration 30 / 40General guidelines of computer ethics are needed for ________ Computer crime Protection of personal data All the option are correct Cracking 31 / 40Which of the following does not fall under area of cyber law? Telecommunication Law Data Protection Digital Signature Data Management 32 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Tunneling Transferring Switching Trafficking 33 / 40Which Of the Following Malicious Program Do Not replicate automatically? Virus Worm Trojan Horse Zombie 34 / 40MCAfee is an example of Antivirus Quick Heal Photo Editing Software Virus 35 / 40Junk E-mail is also known as Spoof Copple crumbs Spam sniffer 36 / 40Which of the following is/are threats for electronic payment systems? Trojan horse Computer virus Computer worms All of the above 37 / 40Computer virus are ___________ Naturally Occur man made machine Made All of the above 38 / 40The first computer virus is _____________ I Love You Polymorphic Boot sector Creeper 39 / 40Why Would A Hacker Use A Proxy Server? To Hide Malicious Activity on The Network To Create A Stronger Connection With The Target. To Obtain A Remote Access Connection. To Create A Ghost Server On The Network. 40 / 40Which of the following is not a way of protection? Piracy Personal Security Physical Security Personnel security Your score isThe average score is 0% 0% Restart quiz Post Views: 1,921