Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40what is telnet? Browser Protocol Gateway Search engine 2 / 40___is the illegal access to the network or computer system. Virus Security Piracy Cracking 3 / 40Which of the following is known as Malicious software? maliciousware illegalware malware badware 4 / 40Computer virus are ___________ Naturally Occur All of the above machine Made man made 5 / 40General guidelines of computer ethics are needed for ________ All the option are correct Computer crime Cracking Protection of personal data 6 / 40When was cyber law established in Nepal? 2009 2011 2005 2007 7 / 40Thie first compter virus is _____ Creeper Blaster Sasser I Love You 8 / 40The altering of data sO that is not usable unless the changes are undone is biometrics encryption compression ergonomics 9 / 40A web address is also known as ULR URL LUR LRU 10 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. None of the options Ethics Protocol Standard 11 / 40Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Create A Stronger Connection With The Target. To Create A Ghost Server On The Network. To Hide Malicious Activity on The Network 12 / 40It is stealing ideas or creation of others. All of the above Intellectual property rights Plagiarism Piracy 13 / 40The first computer virus is _____________ Boot sector Polymorphic I Love You Creeper 14 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VNP VPN VSPN VSN 15 / 40What is a “vlog”? None Video Log Log of blog activity Video blog 16 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Trafficking Tunneling Transferring Switching 17 / 40Which Of the Following Malicious Program Do Not replicate automatically? Worm Trojan Horse Virus Zombie 18 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called None of these Phishing Spamming Spoofing 19 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Zombie Adware Spyware Malware 20 / 40To protect yourself from computer hacker, you should turn on a Script VLC Firewall Antivirus 21 / 40Which of the following is not a way of protection? Physical Security Personnel security Personal Security Piracy 22 / 40MCAfee is an example of Photo Editing Software Virus Antivirus Quick Heal 23 / 40Which of the following is known as malicious software? maliciousware illegalware malware badware 24 / 40MCAfee is an example of Quick Heal Antivirus Photo Editing Software Virus 25 / 40Firewall is a type of _________ Security Threat None of the option Virus Worm 26 / 40To protect yourself from computer hacker, you should turn on a Script Firewall Antivirus VLC 27 / 40Firewalls are used to protect against virus attacks unauthorized access data driven attacks fire attacks 28 / 40To protect a computer from virus, you should install _______ in your computer. antivirus disk cleanup backup wizard disk defragmenter 29 / 40Authentication is Hard to assure identify of user on a remote system Modification Insertion None of the option 30 / 40Which one of the following systems cannot be considered as an example of the operating systems? Microsoft Office Red Hat Linux Windows BSD Linux 31 / 40The objectives of Information technology is To build knowledge based society To make IT accessible to general public and increase employment All of the options To establish knowledge based industries 32 / 40Key logger is Firmware All of the above Spyware Antivirus 33 / 40Which of the following is/are threats for electronic payment systems? Trojan horse All of the above Computer worms Computer virus 34 / 40Authentication is ___ Insertion Modification identity of user on a remote system Integration 35 / 40Unwanted email is known as _________ Virus Spam Spyware Malware 36 / 40Junk E-mail is also known as Spoof sniffer Copple crumbs Spam 37 / 40IPv6 address length is 32 bits 64 bits 128 bits 256 bits 38 / 40Which of the following does not fall under area of cyber law? Telecommunication Law Data Protection Digital Signature Data Management 39 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Longevity Security Performance Reliability 40 / 40Which of the following is not a type of cybercrime? Installing antivirus for protection Damage to data and systems Forgery Data theft Your score isThe average score is 0% 0% Restart quiz Post Views: 2,127