Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40 The objectives of Information technology is To build knowledge based society To make IT accessible to general public and increase employment All of the options To establish knowledge based industries 2 / 40 Authentication is Hard to assure identify of user on a remote system Insertion Modification None of the option 3 / 40 Key logger is Spyware Firmware Antivirus All of the above 4 / 40 It is stealing ideas or creation of others. Piracy Intellectual property rights All of the above Plagiarism 5 / 40 Unwanted email is known as _________ Virus Spam Malware Spyware 6 / 40 Which of the following is not a way of protection? Physical Security Personnel security Piracy Personal Security 7 / 40 ___is the illegal access to the network or computer system. Security Piracy Virus Cracking 8 / 40 The altering of data sO that is not usable unless the changes are undone is encryption ergonomics biometrics compression 9 / 40 MCAfee is an example of Photo Editing Software Virus Antivirus Quick Heal 10 / 40 Junk E-mail is also known as sniffer Spoof Copple crumbs Spam 11 / 40 What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Switching Transferring Trafficking Tunneling 12 / 40 Firewall is a type of _________ Virus None of the option Security Threat Worm 13 / 40 Which of the following is/are threats for electronic payment systems? Computer worms All of the above Computer virus Trojan horse 14 / 40 Which of the following is not a type of cybercrime? Damage to data and systems Installing antivirus for protection Data theft Forgery 15 / 40 Thie first compter virus is _____ I Love You Sasser Creeper Blaster 16 / 40 ______________ monitors the user activities on internet and transmit that information in the background someone else. Spyware Adware Zombie Malware 17 / 40 Which of the following is known as Malicious software? illegalware maliciousware malware badware 18 / 40 what is telnet? Gateway Protocol Browser Search engine 19 / 40 In the computer networks, the encryption techniques are primarily used for improving the ______ Reliability Security Performance Longevity 20 / 40 The first computer virus is _____________ I Love You Boot sector Creeper Polymorphic 21 / 40 A web address is also known as LUR ULR URL LRU 22 / 40 Which one of the following systems cannot be considered as an example of the operating systems? Windows BSD Linux Red Hat Linux Microsoft Office 23 / 40 Authentication is ___ identity of user on a remote system Modification Integration Insertion 24 / 40 Firewalls are used to protect against unauthorized access data driven attacks fire attacks virus attacks 25 / 40 Which of the following does not fall under area of cyber law? Telecommunication Law Data Management Data Protection Digital Signature 26 / 40 To protect a computer from virus, you should install _______ in your computer. disk defragmenter backup wizard disk cleanup antivirus 27 / 40 General guidelines of computer ethics are needed for ________ Computer crime Protection of personal data Cracking All the option are correct 28 / 40 Why Would A Hacker Use A Proxy Server? To Create A Stronger Connection With The Target. To Obtain A Remote Access Connection. To Hide Malicious Activity on The Network To Create A Ghost Server On The Network. 29 / 40 Computer virus are ___________ All of the above machine Made Naturally Occur man made 30 / 40 Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VPN VNP VSPN VSN 31 / 40 MCAfee is an example of Virus Quick Heal Photo Editing Software Antivirus 32 / 40 To protect yourself from computer hacker, you should turn on a Firewall Antivirus Script VLC 33 / 40 To protect yourself from computer hacker, you should turn on a Script VLC Antivirus Firewall 34 / 40 When was cyber law established in Nepal? 2007 2011 2009 2005 35 / 40 Which of the following is known as malicious software? malware maliciousware illegalware badware 36 / 40 IPv6 address length is 64 bits 128 bits 32 bits 256 bits 37 / 40 ________ is a set of rules for determining moral standards or socially acceptable behavior. Ethics None of the options Protocol Standard 38 / 40 Which Of the Following Malicious Program Do Not replicate automatically? Zombie Trojan Horse Virus Worm 39 / 40 A hacker contacts your phone or E-mail and attempts to acquire your password is called Spoofing None of these Phishing Spamming 40 / 40 What is a “vlog”? Video Log Video blog Log of blog activity None Your score isThe average score is 37% 0% Restart quiz Post Views: 2,525