Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40To protect a computer from virus, you should install _______ in your computer. disk defragmenter backup wizard disk cleanup antivirus 2 / 40Key logger is Spyware Firmware All of the above Antivirus 3 / 40When was cyber law established in Nepal? 2007 2011 2005 2009 4 / 40A web address is also known as LUR ULR LRU URL 5 / 40Authentication is Hard to assure identify of user on a remote system Insertion None of the option Modification 6 / 40Firewalls are used to protect against unauthorized access virus attacks fire attacks data driven attacks 7 / 40___is the illegal access to the network or computer system. Cracking Security Piracy Virus 8 / 40Which of the following is not a type of cybercrime? Installing antivirus for protection Forgery Data theft Damage to data and systems 9 / 40Thie first compter virus is _____ Blaster Creeper Sasser I Love You 10 / 40IPv6 address length is 64 bits 128 bits 256 bits 32 bits 11 / 40Which one of the following systems cannot be considered as an example of the operating systems? Windows Microsoft Office Red Hat Linux BSD Linux 12 / 40The first computer virus is _____________ Creeper I Love You Polymorphic Boot sector 13 / 40Which of the following is not a way of protection? Piracy Physical Security Personnel security Personal Security 14 / 40Firewall is a type of _________ Virus Security Threat Worm None of the option 15 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VSN VSPN VPN VNP 16 / 40It is stealing ideas or creation of others. Piracy All of the above Intellectual property rights Plagiarism 17 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Spoofing Spamming Phishing None of these 18 / 40To protect yourself from computer hacker, you should turn on a Script Firewall Antivirus VLC 19 / 40What is a “vlog”? Video blog Log of blog activity None Video Log 20 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Tunneling Trafficking Switching Transferring 21 / 40Authentication is ___ identity of user on a remote system Integration Insertion Modification 22 / 40Computer virus are ___________ Naturally Occur man made All of the above machine Made 23 / 40Which of the following is known as Malicious software? badware illegalware maliciousware malware 24 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Standard Ethics Protocol None of the options 25 / 40Which of the following is known as malicious software? illegalware maliciousware badware malware 26 / 40Why Would A Hacker Use A Proxy Server? To Create A Stronger Connection With The Target. To Hide Malicious Activity on The Network To Obtain A Remote Access Connection. To Create A Ghost Server On The Network. 27 / 40The objectives of Information technology is To build knowledge based society To establish knowledge based industries To make IT accessible to general public and increase employment All of the options 28 / 40Which Of the Following Malicious Program Do Not replicate automatically? Virus Zombie Trojan Horse Worm 29 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Malware Zombie Adware Spyware 30 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Performance Longevity Reliability Security 31 / 40The altering of data sO that is not usable unless the changes are undone is compression ergonomics encryption biometrics 32 / 40Which of the following does not fall under area of cyber law? Digital Signature Telecommunication Law Data Protection Data Management 33 / 40General guidelines of computer ethics are needed for ________ Cracking All the option are correct Protection of personal data Computer crime 34 / 40what is telnet? Gateway Protocol Search engine Browser 35 / 40Which of the following is/are threats for electronic payment systems? Trojan horse Computer worms All of the above Computer virus 36 / 40Junk E-mail is also known as Spoof sniffer Copple crumbs Spam 37 / 40To protect yourself from computer hacker, you should turn on a Script Firewall Antivirus VLC 38 / 40MCAfee is an example of Quick Heal Photo Editing Software Virus Antivirus 39 / 40Unwanted email is known as _________ Malware Virus Spam Spyware 40 / 40MCAfee is an example of Photo Editing Software Antivirus Quick Heal Virus Your score isThe average score is 0% 0% Restart quiz Post Views: 2,342