Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Spoofing None of these Phishing Spamming 2 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VSPN VSN VNP VPN 3 / 40Which of the following is known as malicious software? maliciousware malware illegalware badware 4 / 40It is stealing ideas or creation of others. Intellectual property rights All of the above Plagiarism Piracy 5 / 40A web address is also known as LUR ULR URL LRU 6 / 40Which of the following does not fall under area of cyber law? Digital Signature Data Management Data Protection Telecommunication Law 7 / 40Which of the following is not a type of cybercrime? Forgery Damage to data and systems Data theft Installing antivirus for protection 8 / 40Junk E-mail is also known as Copple crumbs Spoof Spam sniffer 9 / 40What is a “vlog”? Video blog Video Log None Log of blog activity 10 / 40Computer virus are ___________ man made Naturally Occur machine Made All of the above 11 / 40To protect yourself from computer hacker, you should turn on a VLC Script Firewall Antivirus 12 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Reliability Longevity Performance Security 13 / 40To protect yourself from computer hacker, you should turn on a Script Antivirus VLC Firewall 14 / 40MCAfee is an example of Virus Photo Editing Software Quick Heal Antivirus 15 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Zombie Malware Adware Spyware 16 / 40Which of the following is known as Malicious software? maliciousware malware badware illegalware 17 / 40___is the illegal access to the network or computer system. Piracy Virus Security Cracking 18 / 40Firewall is a type of _________ None of the option Worm Virus Security Threat 19 / 40The objectives of Information technology is To build knowledge based society To make IT accessible to general public and increase employment All of the options To establish knowledge based industries 20 / 40To protect a computer from virus, you should install _______ in your computer. backup wizard disk cleanup antivirus disk defragmenter 21 / 40Which Of the Following Malicious Program Do Not replicate automatically? Virus Worm Trojan Horse Zombie 22 / 40Authentication is ___ Insertion identity of user on a remote system Modification Integration 23 / 40The altering of data sO that is not usable unless the changes are undone is encryption ergonomics compression biometrics 24 / 40Firewalls are used to protect against unauthorized access data driven attacks fire attacks virus attacks 25 / 40Which one of the following systems cannot be considered as an example of the operating systems? Windows Microsoft Office BSD Linux Red Hat Linux 26 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Trafficking Tunneling Switching 27 / 40When was cyber law established in Nepal? 2011 2005 2007 2009 28 / 40Unwanted email is known as _________ Malware Virus Spyware Spam 29 / 40Which of the following is/are threats for electronic payment systems? Computer worms Trojan horse Computer virus All of the above 30 / 40Which of the following is not a way of protection? Personal Security Personnel security Piracy Physical Security 31 / 40MCAfee is an example of Photo Editing Software Quick Heal Antivirus Virus 32 / 40General guidelines of computer ethics are needed for ________ Cracking Computer crime Protection of personal data All the option are correct 33 / 40IPv6 address length is 32 bits 256 bits 128 bits 64 bits 34 / 40Thie first compter virus is _____ I Love You Blaster Sasser Creeper 35 / 40Key logger is All of the above Antivirus Firmware Spyware 36 / 40The first computer virus is _____________ I Love You Creeper Polymorphic Boot sector 37 / 40what is telnet? Search engine Browser Gateway Protocol 38 / 40Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Create A Stronger Connection With The Target. To Hide Malicious Activity on The Network To Create A Ghost Server On The Network. 39 / 40Authentication is Insertion Hard to assure identify of user on a remote system Modification None of the option 40 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Standard None of the options Ethics Protocol Your score isThe average score is 0% 0% Restart quiz Post Views: 2,292