Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40The altering of data sO that is not usable unless the changes are undone is compression encryption ergonomics biometrics 2 / 40Thie first compter virus is _____ Sasser Creeper I Love You Blaster 3 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Ethics Standard None of the options Protocol 4 / 40A web address is also known as LUR URL ULR LRU 5 / 40Which of the following is known as Malicious software? maliciousware malware badware illegalware 6 / 40Key logger is All of the above Firmware Spyware Antivirus 7 / 40To protect yourself from computer hacker, you should turn on a Antivirus VLC Firewall Script 8 / 40To protect yourself from computer hacker, you should turn on a VLC Script Firewall Antivirus 9 / 40To protect a computer from virus, you should install _______ in your computer. disk defragmenter disk cleanup backup wizard antivirus 10 / 40Which Of the Following Malicious Program Do Not replicate automatically? Virus Trojan Horse Zombie Worm 11 / 40Junk E-mail is also known as Copple crumbs Spoof Spam sniffer 12 / 40Which of the following is known as malicious software? badware maliciousware illegalware malware 13 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Malware Spyware Adware Zombie 14 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VSPN VNP VPN VSN 15 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Security Longevity Reliability Performance 16 / 40Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Create A Stronger Connection With The Target. To Hide Malicious Activity on The Network To Create A Ghost Server On The Network. 17 / 40___is the illegal access to the network or computer system. Security Virus Piracy Cracking 18 / 40Unwanted email is known as _________ Virus Malware Spam Spyware 19 / 40MCAfee is an example of Photo Editing Software Virus Antivirus Quick Heal 20 / 40IPv6 address length is 64 bits 128 bits 256 bits 32 bits 21 / 40General guidelines of computer ethics are needed for ________ Computer crime Protection of personal data All the option are correct Cracking 22 / 40MCAfee is an example of Virus Quick Heal Photo Editing Software Antivirus 23 / 40Firewalls are used to protect against data driven attacks virus attacks unauthorized access fire attacks 24 / 40Computer virus are ___________ man made Naturally Occur All of the above machine Made 25 / 40Which of the following is not a type of cybercrime? Damage to data and systems Forgery Data theft Installing antivirus for protection 26 / 40Authentication is ___ Integration Insertion Modification identity of user on a remote system 27 / 40The objectives of Information technology is To make IT accessible to general public and increase employment All of the options To build knowledge based society To establish knowledge based industries 28 / 40What is a “vlog”? Video blog None Log of blog activity Video Log 29 / 40It is stealing ideas or creation of others. Intellectual property rights Plagiarism Piracy All of the above 30 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Trafficking Tunneling Switching 31 / 40When was cyber law established in Nepal? 2007 2005 2009 2011 32 / 40Which of the following does not fall under area of cyber law? Data Protection Data Management Digital Signature Telecommunication Law 33 / 40The first computer virus is _____________ I Love You Creeper Boot sector Polymorphic 34 / 40Which of the following is not a way of protection? Personnel security Physical Security Piracy Personal Security 35 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Phishing None of these Spamming Spoofing 36 / 40what is telnet? Browser Search engine Protocol Gateway 37 / 40Which one of the following systems cannot be considered as an example of the operating systems? Red Hat Linux Windows Microsoft Office BSD Linux 38 / 40Firewall is a type of _________ Virus None of the option Worm Security Threat 39 / 40Which of the following is/are threats for electronic payment systems? Trojan horse Computer worms All of the above Computer virus 40 / 40Authentication is None of the option Hard to assure identify of user on a remote system Insertion Modification Your score isThe average score is 0% 0% Restart quiz Post Views: 2,236