Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40Which one of the following systems cannot be considered as an example of the operating systems? Microsoft Office Red Hat Linux Windows BSD Linux 2 / 40Which of the following is not a type of cybercrime? Forgery Data theft Damage to data and systems Installing antivirus for protection 3 / 40Thie first compter virus is _____ Creeper I Love You Sasser Blaster 4 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Performance Longevity Security Reliability 5 / 40MCAfee is an example of Virus Photo Editing Software Antivirus Quick Heal 6 / 40Key logger is All of the above Firmware Antivirus Spyware 7 / 40To protect yourself from computer hacker, you should turn on a Firewall Antivirus Script VLC 8 / 40Why Would A Hacker Use A Proxy Server? To Hide Malicious Activity on The Network To Obtain A Remote Access Connection. To Create A Stronger Connection With The Target. To Create A Ghost Server On The Network. 9 / 40Firewalls are used to protect against fire attacks virus attacks data driven attacks unauthorized access 10 / 40General guidelines of computer ethics are needed for ________ Computer crime Protection of personal data Cracking All the option are correct 11 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Switching Tunneling Trafficking 12 / 40Which of the following is/are threats for electronic payment systems? All of the above Computer worms Computer virus Trojan horse 13 / 40The objectives of Information technology is All of the options To build knowledge based society To establish knowledge based industries To make IT accessible to general public and increase employment 14 / 40When was cyber law established in Nepal? 2011 2009 2007 2005 15 / 40Junk E-mail is also known as Spoof Copple crumbs sniffer Spam 16 / 40___is the illegal access to the network or computer system. Virus Piracy Cracking Security 17 / 40Authentication is ___ Insertion Modification Integration identity of user on a remote system 18 / 40Which of the following is known as Malicious software? malware maliciousware badware illegalware 19 / 40MCAfee is an example of Antivirus Virus Quick Heal Photo Editing Software 20 / 40Which Of the Following Malicious Program Do Not replicate automatically? Trojan Horse Zombie Worm Virus 21 / 40To protect a computer from virus, you should install _______ in your computer. disk defragmenter disk cleanup antivirus backup wizard 22 / 40Which of the following is known as malicious software? maliciousware malware badware illegalware 23 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Protocol Standard None of the options Ethics 24 / 40A web address is also known as LRU LUR ULR URL 25 / 40To protect yourself from computer hacker, you should turn on a Antivirus VLC Firewall Script 26 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VPN VSN VSPN VNP 27 / 40Which of the following is not a way of protection? Personal Security Piracy Personnel security Physical Security 28 / 40Computer virus are ___________ machine Made Naturally Occur All of the above man made 29 / 40IPv6 address length is 64 bits 256 bits 32 bits 128 bits 30 / 40Which of the following does not fall under area of cyber law? Digital Signature Telecommunication Law Data Management Data Protection 31 / 40The altering of data sO that is not usable unless the changes are undone is encryption compression ergonomics biometrics 32 / 40The first computer virus is _____________ Creeper I Love You Boot sector Polymorphic 33 / 40what is telnet? Gateway Protocol Search engine Browser 34 / 40Firewall is a type of _________ None of the option Security Threat Virus Worm 35 / 40Authentication is Modification None of the option Hard to assure identify of user on a remote system Insertion 36 / 40Unwanted email is known as _________ Virus Spyware Malware Spam 37 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Zombie Spyware Malware Adware 38 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Spamming Phishing None of these Spoofing 39 / 40What is a “vlog”? Video Log Log of blog activity Video blog None 40 / 40It is stealing ideas or creation of others. Plagiarism All of the above Intellectual property rights Piracy Your score isThe average score is 55% 0% Restart quiz Post Views: 1,711