Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40Junk E-mail is also known as Copple crumbs sniffer Spoof Spam 2 / 40Which Of the Following Malicious Program Do Not replicate automatically? Trojan Horse Zombie Worm Virus 3 / 40It is stealing ideas or creation of others. Piracy Intellectual property rights All of the above Plagiarism 4 / 40MCAfee is an example of Quick Heal Virus Antivirus Photo Editing Software 5 / 40Key logger is Spyware All of the above Firmware Antivirus 6 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VPN VNP VSN VSPN 7 / 40To protect yourself from computer hacker, you should turn on a VLC Antivirus Script Firewall 8 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. None of the options Ethics Protocol Standard 9 / 40Firewalls are used to protect against virus attacks data driven attacks fire attacks unauthorized access 10 / 40Authentication is ___ identity of user on a remote system Insertion Integration Modification 11 / 40Why Would A Hacker Use A Proxy Server? To Create A Ghost Server On The Network. To Hide Malicious Activity on The Network To Create A Stronger Connection With The Target. To Obtain A Remote Access Connection. 12 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Trafficking Switching Transferring Tunneling 13 / 40what is telnet? Protocol Browser Search engine Gateway 14 / 40Unwanted email is known as _________ Malware Virus Spyware Spam 15 / 40Which one of the following systems cannot be considered as an example of the operating systems? Red Hat Linux BSD Linux Windows Microsoft Office 16 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Security Performance Reliability Longevity 17 / 40Authentication is Insertion Hard to assure identify of user on a remote system Modification None of the option 18 / 40What is a “vlog”? Video blog None Video Log Log of blog activity 19 / 40A web address is also known as LRU URL LUR ULR 20 / 40Which of the following is not a way of protection? Personnel security Piracy Personal Security Physical Security 21 / 40Thie first compter virus is _____ Creeper I Love You Blaster Sasser 22 / 40IPv6 address length is 256 bits 32 bits 64 bits 128 bits 23 / 40General guidelines of computer ethics are needed for ________ Computer crime Protection of personal data Cracking All the option are correct 24 / 40The first computer virus is _____________ Boot sector I Love You Creeper Polymorphic 25 / 40___is the illegal access to the network or computer system. Virus Security Piracy Cracking 26 / 40Which of the following is known as Malicious software? maliciousware illegalware badware malware 27 / 40To protect a computer from virus, you should install _______ in your computer. antivirus disk defragmenter backup wizard disk cleanup 28 / 40MCAfee is an example of Antivirus Quick Heal Virus Photo Editing Software 29 / 40Firewall is a type of _________ Security Threat None of the option Virus Worm 30 / 40When was cyber law established in Nepal? 2005 2009 2011 2007 31 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Spamming Phishing None of these Spoofing 32 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Spyware Malware Zombie Adware 33 / 40To protect yourself from computer hacker, you should turn on a Firewall VLC Script Antivirus 34 / 40The objectives of Information technology is To build knowledge based society To make IT accessible to general public and increase employment All of the options To establish knowledge based industries 35 / 40Which of the following is known as malicious software? malware badware illegalware maliciousware 36 / 40Which of the following is not a type of cybercrime? Data theft Forgery Damage to data and systems Installing antivirus for protection 37 / 40Which of the following does not fall under area of cyber law? Data Protection Digital Signature Telecommunication Law Data Management 38 / 40Computer virus are ___________ man made Naturally Occur machine Made All of the above 39 / 40The altering of data sO that is not usable unless the changes are undone is encryption compression biometrics ergonomics 40 / 40Which of the following is/are threats for electronic payment systems? Trojan horse Computer worms All of the above Computer virus Your score isThe average score is 55% 0% Restart quiz Post Views: 1,258