Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40A web address is also known as URL ULR LRU LUR 2 / 40General guidelines of computer ethics are needed for ________ All the option are correct Computer crime Cracking Protection of personal data 3 / 40Which one of the following systems cannot be considered as an example of the operating systems? Microsoft Office Red Hat Linux BSD Linux Windows 4 / 40Which of the following is/are threats for electronic payment systems? All of the above Computer worms Computer virus Trojan horse 5 / 40Computer virus are ___________ machine Made Naturally Occur man made All of the above 6 / 40Which of the following is not a type of cybercrime? Installing antivirus for protection Damage to data and systems Forgery Data theft 7 / 40Which of the following is not a way of protection? Physical Security Piracy Personal Security Personnel security 8 / 40MCAfee is an example of Virus Quick Heal Photo Editing Software Antivirus 9 / 40To protect yourself from computer hacker, you should turn on a Firewall Script Antivirus VLC 10 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Switching Trafficking Tunneling 11 / 40Firewalls are used to protect against fire attacks virus attacks unauthorized access data driven attacks 12 / 40Authentication is None of the option Insertion Modification Hard to assure identify of user on a remote system 13 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Performance Longevity Reliability Security 14 / 40Which Of the Following Malicious Program Do Not replicate automatically? Zombie Virus Worm Trojan Horse 15 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VNP VSN VPN VSPN 16 / 40Thie first compter virus is _____ Blaster Sasser I Love You Creeper 17 / 40Firewall is a type of _________ Worm None of the option Security Threat Virus 18 / 40Unwanted email is known as _________ Spam Virus Spyware Malware 19 / 40The objectives of Information technology is To build knowledge based society To make IT accessible to general public and increase employment To establish knowledge based industries All of the options 20 / 40Which of the following is known as Malicious software? malware badware maliciousware illegalware 21 / 40what is telnet? Protocol Search engine Gateway Browser 22 / 40What is a “vlog”? Video blog Video Log Log of blog activity None 23 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Spamming None of these Spoofing Phishing 24 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Malware Adware Spyware Zombie 25 / 40The first computer virus is _____________ Creeper Polymorphic Boot sector I Love You 26 / 40To protect yourself from computer hacker, you should turn on a Antivirus VLC Firewall Script 27 / 40When was cyber law established in Nepal? 2009 2011 2005 2007 28 / 40Authentication is ___ Integration Modification Insertion identity of user on a remote system 29 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. None of the options Protocol Ethics Standard 30 / 40Which of the following does not fall under area of cyber law? Telecommunication Law Data Management Digital Signature Data Protection 31 / 40It is stealing ideas or creation of others. All of the above Plagiarism Piracy Intellectual property rights 32 / 40Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Create A Stronger Connection With The Target. To Create A Ghost Server On The Network. To Hide Malicious Activity on The Network 33 / 40Key logger is Antivirus All of the above Firmware Spyware 34 / 40MCAfee is an example of Quick Heal Virus Antivirus Photo Editing Software 35 / 40Junk E-mail is also known as sniffer Copple crumbs Spam Spoof 36 / 40To protect a computer from virus, you should install _______ in your computer. disk defragmenter disk cleanup backup wizard antivirus 37 / 40IPv6 address length is 64 bits 32 bits 256 bits 128 bits 38 / 40Which of the following is known as malicious software? maliciousware malware illegalware badware 39 / 40The altering of data sO that is not usable unless the changes are undone is biometrics ergonomics encryption compression 40 / 40___is the illegal access to the network or computer system. Security Virus Piracy Cracking Your score isThe average score is 0% 0% Restart quiz Post Views: 2,248