Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40MCAfee is an example of Photo Editing Software Antivirus Virus Quick Heal 2 / 40To protect yourself from computer hacker, you should turn on a Antivirus VLC Script Firewall 3 / 40MCAfee is an example of Quick Heal Photo Editing Software Virus Antivirus 4 / 40Which of the following is not a way of protection? Personnel security Piracy Physical Security Personal Security 5 / 40Authentication is ___ Insertion Integration identity of user on a remote system Modification 6 / 40Which of the following does not fall under area of cyber law? Digital Signature Data Management Telecommunication Law Data Protection 7 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Malware Spyware Zombie Adware 8 / 40IPv6 address length is 32 bits 128 bits 64 bits 256 bits 9 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Security Longevity Performance Reliability 10 / 40Thie first compter virus is _____ I Love You Blaster Creeper Sasser 11 / 40Key logger is Spyware Firmware All of the above Antivirus 12 / 40Which one of the following systems cannot be considered as an example of the operating systems? Red Hat Linux BSD Linux Windows Microsoft Office 13 / 40Junk E-mail is also known as Spoof sniffer Copple crumbs Spam 14 / 40It is stealing ideas or creation of others. All of the above Plagiarism Piracy Intellectual property rights 15 / 40Firewall is a type of _________ Worm None of the option Virus Security Threat 16 / 40To protect yourself from computer hacker, you should turn on a VLC Script Firewall Antivirus 17 / 40What is a “vlog”? Video blog Video Log None Log of blog activity 18 / 40Computer virus are ___________ All of the above man made machine Made Naturally Occur 19 / 40Authentication is Hard to assure identify of user on a remote system None of the option Modification Insertion 20 / 40what is telnet? Protocol Browser Search engine Gateway 21 / 40Which of the following is known as Malicious software? malware maliciousware badware illegalware 22 / 40Which Of the Following Malicious Program Do Not replicate automatically? Worm Trojan Horse Zombie Virus 23 / 40General guidelines of computer ethics are needed for ________ Cracking Computer crime Protection of personal data All the option are correct 24 / 40The first computer virus is _____________ Boot sector Polymorphic Creeper I Love You 25 / 40___is the illegal access to the network or computer system. Cracking Security Virus Piracy 26 / 40Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Hide Malicious Activity on The Network To Create A Stronger Connection With The Target. To Create A Ghost Server On The Network. 27 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Trafficking Switching Tunneling 28 / 40Unwanted email is known as _________ Virus Malware Spyware Spam 29 / 40Which of the following is known as malicious software? maliciousware badware malware illegalware 30 / 40When was cyber law established in Nepal? 2005 2007 2009 2011 31 / 40Which of the following is not a type of cybercrime? Data theft Damage to data and systems Forgery Installing antivirus for protection 32 / 40The objectives of Information technology is To establish knowledge based industries To build knowledge based society To make IT accessible to general public and increase employment All of the options 33 / 40The altering of data sO that is not usable unless the changes are undone is ergonomics compression encryption biometrics 34 / 40Which of the following is/are threats for electronic payment systems? Trojan horse All of the above Computer worms Computer virus 35 / 40To protect a computer from virus, you should install _______ in your computer. disk cleanup backup wizard disk defragmenter antivirus 36 / 40A web address is also known as URL LUR ULR LRU 37 / 40Firewalls are used to protect against virus attacks fire attacks unauthorized access data driven attacks 38 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Protocol None of the options Standard Ethics 39 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Spamming None of these Phishing Spoofing 40 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VNP VSPN VPN VSN Your score isThe average score is 0% 0% Restart quiz Post Views: 2,289