Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40Which one of the following systems cannot be considered as an example of the operating systems? Windows BSD Linux Red Hat Linux Microsoft Office 2 / 40Which of the following is known as Malicious software? badware malware illegalware maliciousware 3 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Switching Trafficking Tunneling Transferring 4 / 40IPv6 address length is 128 bits 256 bits 32 bits 64 bits 5 / 40Which Of the Following Malicious Program Do Not replicate automatically? Zombie Worm Virus Trojan Horse 6 / 40A web address is also known as ULR URL LUR LRU 7 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Spyware Zombie Malware Adware 8 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Longevity Security Performance Reliability 9 / 40The altering of data sO that is not usable unless the changes are undone is compression ergonomics encryption biometrics 10 / 40To protect yourself from computer hacker, you should turn on a VLC Script Firewall Antivirus 11 / 40Why Would A Hacker Use A Proxy Server? To Hide Malicious Activity on The Network To Create A Stronger Connection With The Target. To Obtain A Remote Access Connection. To Create A Ghost Server On The Network. 12 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VNP VSPN VSN VPN 13 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Protocol None of the options Standard Ethics 14 / 40MCAfee is an example of Quick Heal Photo Editing Software Virus Antivirus 15 / 40When was cyber law established in Nepal? 2007 2011 2005 2009 16 / 40To protect yourself from computer hacker, you should turn on a VLC Antivirus Firewall Script 17 / 40Key logger is Firmware Antivirus Spyware All of the above 18 / 40The first computer virus is _____________ Boot sector Creeper I Love You Polymorphic 19 / 40Authentication is Insertion Modification None of the option Hard to assure identify of user on a remote system 20 / 40It is stealing ideas or creation of others. Piracy Plagiarism Intellectual property rights All of the above 21 / 40Computer virus are ___________ man made machine Made Naturally Occur All of the above 22 / 40Thie first compter virus is _____ I Love You Blaster Sasser Creeper 23 / 40Authentication is ___ Insertion identity of user on a remote system Modification Integration 24 / 40Which of the following is not a type of cybercrime? Damage to data and systems Installing antivirus for protection Forgery Data theft 25 / 40To protect a computer from virus, you should install _______ in your computer. backup wizard disk cleanup disk defragmenter antivirus 26 / 40Which of the following is not a way of protection? Personnel security Physical Security Piracy Personal Security 27 / 40what is telnet? Search engine Browser Protocol Gateway 28 / 40Which of the following does not fall under area of cyber law? Telecommunication Law Data Management Digital Signature Data Protection 29 / 40Firewall is a type of _________ Worm None of the option Virus Security Threat 30 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Phishing None of these Spamming Spoofing 31 / 40Junk E-mail is also known as Copple crumbs sniffer Spam Spoof 32 / 40___is the illegal access to the network or computer system. Virus Piracy Cracking Security 33 / 40Firewalls are used to protect against data driven attacks fire attacks unauthorized access virus attacks 34 / 40The objectives of Information technology is To make IT accessible to general public and increase employment To build knowledge based society To establish knowledge based industries All of the options 35 / 40What is a “vlog”? Video blog None Video Log Log of blog activity 36 / 40Which of the following is known as malicious software? badware illegalware maliciousware malware 37 / 40General guidelines of computer ethics are needed for ________ All the option are correct Computer crime Protection of personal data Cracking 38 / 40Which of the following is/are threats for electronic payment systems? Trojan horse Computer virus All of the above Computer worms 39 / 40Unwanted email is known as _________ Virus Malware Spam Spyware 40 / 40MCAfee is an example of Virus Antivirus Photo Editing Software Quick Heal Your score isThe average score is 0% 0% Restart quiz Post Views: 1,920