Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge

Information Security and Cyber Law

1 / 40

Junk E-mail is also known as

2 / 40

Which Of the Following Malicious Program Do Not replicate automatically?

3 / 40

It is stealing ideas or creation of others.

4 / 40

MCAfee is an example of

5 / 40

Key logger is

6 / 40

Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection...

7 / 40

To protect yourself from computer hacker, you should turn on a

8 / 40

________ is a set of rules for determining moral standards or socially acceptable behavior.

9 / 40

Firewalls are used to protect against

10 / 40

Authentication is ___

11 / 40

Why Would A Hacker Use A Proxy Server?

12 / 40

What is used to carry traffic of one protocol over the network that does not support that protocol directly ______

13 / 40

what is telnet?

14 / 40

Unwanted email is known as _________

15 / 40

Which one of the following systems cannot be considered as an example of the operating systems?

16 / 40

In the computer networks, the encryption techniques are primarily used for improving the ______

17 / 40

Authentication is

18 / 40

What is a “vlog”?

19 / 40

A web address is also known as

20 / 40

Which of the following is not a way of protection?

21 / 40

Thie first compter virus is _____

22 / 40

IPv6 address length is

23 / 40

General guidelines of computer ethics are needed for ________

24 / 40

The first computer virus is _____________

25 / 40

___is the illegal access to the network or computer system.

26 / 40

Which of the following is known as Malicious software?

27 / 40

To protect a computer from virus, you should install _______ in your computer.

28 / 40

MCAfee is an example of

29 / 40

Firewall is a type of _________

30 / 40

When was cyber law established in Nepal?

31 / 40

A hacker contacts your phone or E-mail and attempts to acquire your password is called

32 / 40

______________ monitors the user activities on internet and transmit that information in the background someone else.

33 / 40

To protect yourself from computer hacker, you should turn on a

34 / 40

The objectives of Information technology is

35 / 40

Which of the following is known as malicious software?

36 / 40

Which of the following is not a type of cybercrime?

37 / 40

Which of the following does not fall under area of cyber law?

38 / 40

Computer virus are ___________

39 / 40

The altering of data sO that is not usable unless the changes are undone is

40 / 40

Which of the following is/are threats for electronic payment systems?

Your score is

The average score is 55%

0%