Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40Which of the following is/are threats for electronic payment systems? Computer worms All of the above Computer virus Trojan horse 2 / 40MCAfee is an example of Virus Antivirus Photo Editing Software Quick Heal 3 / 40To protect yourself from computer hacker, you should turn on a Antivirus VLC Firewall Script 4 / 40Which of the following is not a type of cybercrime? Installing antivirus for protection Damage to data and systems Data theft Forgery 5 / 40To protect yourself from computer hacker, you should turn on a Script Firewall Antivirus VLC 6 / 40Which one of the following systems cannot be considered as an example of the operating systems? Microsoft Office Red Hat Linux BSD Linux Windows 7 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Security Reliability Performance Longevity 8 / 40Computer virus are ___________ man made machine Made Naturally Occur All of the above 9 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Standard None of the options Ethics Protocol 10 / 40The objectives of Information technology is To make IT accessible to general public and increase employment To establish knowledge based industries To build knowledge based society All of the options 11 / 40MCAfee is an example of Virus Photo Editing Software Antivirus Quick Heal 12 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VSN VNP VPN VSPN 13 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Adware Zombie Malware Spyware 14 / 40It is stealing ideas or creation of others. Intellectual property rights Plagiarism All of the above Piracy 15 / 40Junk E-mail is also known as Spoof Copple crumbs Spam sniffer 16 / 40___is the illegal access to the network or computer system. Piracy Cracking Security Virus 17 / 40A web address is also known as LRU ULR URL LUR 18 / 40Authentication is Hard to assure identify of user on a remote system Modification Insertion None of the option 19 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called None of these Spoofing Spamming Phishing 20 / 40When was cyber law established in Nepal? 2007 2005 2011 2009 21 / 40To protect a computer from virus, you should install _______ in your computer. antivirus disk defragmenter disk cleanup backup wizard 22 / 40What is a “vlog”? Video Log Log of blog activity Video blog None 23 / 40Authentication is ___ Insertion identity of user on a remote system Modification Integration 24 / 40what is telnet? Search engine Browser Gateway Protocol 25 / 40Thie first compter virus is _____ Creeper I Love You Blaster Sasser 26 / 40Which of the following is known as malicious software? badware maliciousware illegalware malware 27 / 40Why Would A Hacker Use A Proxy Server? To Create A Stronger Connection With The Target. To Create A Ghost Server On The Network. To Obtain A Remote Access Connection. To Hide Malicious Activity on The Network 28 / 40IPv6 address length is 128 bits 32 bits 64 bits 256 bits 29 / 40The altering of data sO that is not usable unless the changes are undone is biometrics ergonomics encryption compression 30 / 40Which of the following is not a way of protection? Physical Security Personal Security Personnel security Piracy 31 / 40The first computer virus is _____________ Creeper I Love You Polymorphic Boot sector 32 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Trafficking Switching Tunneling 33 / 40Firewall is a type of _________ Virus Worm None of the option Security Threat 34 / 40Unwanted email is known as _________ Spyware Spam Malware Virus 35 / 40Key logger is Antivirus Spyware All of the above Firmware 36 / 40General guidelines of computer ethics are needed for ________ Protection of personal data Cracking Computer crime All the option are correct 37 / 40Which Of the Following Malicious Program Do Not replicate automatically? Trojan Horse Virus Zombie Worm 38 / 40Which of the following is known as Malicious software? badware illegalware maliciousware malware 39 / 40Which of the following does not fall under area of cyber law? Digital Signature Telecommunication Law Data Protection Data Management 40 / 40Firewalls are used to protect against virus attacks data driven attacks fire attacks unauthorized access Your score isThe average score is 0% 0% Restart quiz Post Views: 2,175