Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40Junk E-mail is also known as Spoof Spam sniffer Copple crumbs 2 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Standard Ethics Protocol None of the options 3 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Adware Zombie Spyware Malware 4 / 40The altering of data sO that is not usable unless the changes are undone is ergonomics biometrics compression encryption 5 / 40A web address is also known as ULR LUR LRU URL 6 / 40General guidelines of computer ethics are needed for ________ All the option are correct Cracking Protection of personal data Computer crime 7 / 40Firewalls are used to protect against data driven attacks unauthorized access virus attacks fire attacks 8 / 40To protect yourself from computer hacker, you should turn on a VLC Firewall Script Antivirus 9 / 40What is a “vlog”? Log of blog activity Video blog None Video Log 10 / 40Key logger is All of the above Spyware Firmware Antivirus 11 / 40Firewall is a type of _________ None of the option Virus Worm Security Threat 12 / 40what is telnet? Protocol Gateway Search engine Browser 13 / 40Which of the following is known as malicious software? maliciousware badware illegalware malware 14 / 40The objectives of Information technology is All of the options To build knowledge based society To establish knowledge based industries To make IT accessible to general public and increase employment 15 / 40Which one of the following systems cannot be considered as an example of the operating systems? Microsoft Office Windows Red Hat Linux BSD Linux 16 / 40MCAfee is an example of Quick Heal Photo Editing Software Antivirus Virus 17 / 40Authentication is ___ Insertion identity of user on a remote system Integration Modification 18 / 40Which of the following does not fall under area of cyber law? Digital Signature Data Management Telecommunication Law Data Protection 19 / 40Authentication is Hard to assure identify of user on a remote system Insertion None of the option Modification 20 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VSPN VSN VNP VPN 21 / 40Unwanted email is known as _________ Spyware Virus Malware Spam 22 / 40MCAfee is an example of Virus Quick Heal Photo Editing Software Antivirus 23 / 40___is the illegal access to the network or computer system. Virus Security Piracy Cracking 24 / 40Why Would A Hacker Use A Proxy Server? To Create A Stronger Connection With The Target. To Obtain A Remote Access Connection. To Create A Ghost Server On The Network. To Hide Malicious Activity on The Network 25 / 40Thie first compter virus is _____ Sasser Blaster I Love You Creeper 26 / 40Computer virus are ___________ man made All of the above machine Made Naturally Occur 27 / 40Which of the following is/are threats for electronic payment systems? Trojan horse Computer virus Computer worms All of the above 28 / 40IPv6 address length is 64 bits 256 bits 32 bits 128 bits 29 / 40To protect yourself from computer hacker, you should turn on a VLC Firewall Script Antivirus 30 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Tunneling Trafficking Switching Transferring 31 / 40It is stealing ideas or creation of others. Plagiarism All of the above Intellectual property rights Piracy 32 / 40The first computer virus is _____________ Creeper Boot sector Polymorphic I Love You 33 / 40Which of the following is known as Malicious software? badware malware illegalware maliciousware 34 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Spamming None of these Phishing Spoofing 35 / 40Which Of the Following Malicious Program Do Not replicate automatically? Worm Trojan Horse Virus Zombie 36 / 40To protect a computer from virus, you should install _______ in your computer. backup wizard disk cleanup antivirus disk defragmenter 37 / 40Which of the following is not a type of cybercrime? Installing antivirus for protection Data theft Damage to data and systems Forgery 38 / 40Which of the following is not a way of protection? Personnel security Personal Security Physical Security Piracy 39 / 40When was cyber law established in Nepal? 2009 2007 2005 2011 40 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Security Longevity Performance Reliability Your score isThe average score is 0% 0% Restart quiz Post Views: 2,214