Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40The objectives of Information technology is To make IT accessible to general public and increase employment To establish knowledge based industries To build knowledge based society All of the options 2 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called None of these Phishing Spamming Spoofing 3 / 40Which of the following is not a type of cybercrime? Data theft Damage to data and systems Forgery Installing antivirus for protection 4 / 40General guidelines of computer ethics are needed for ________ Protection of personal data All the option are correct Computer crime Cracking 5 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Ethics Protocol None of the options Standard 6 / 40Junk E-mail is also known as Spoof Copple crumbs sniffer Spam 7 / 40Which Of the Following Malicious Program Do Not replicate automatically? Worm Virus Trojan Horse Zombie 8 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VSN VSPN VPN VNP 9 / 40Which of the following is not a way of protection? Physical Security Personnel security Piracy Personal Security 10 / 40Why Would A Hacker Use A Proxy Server? To Create A Ghost Server On The Network. To Create A Stronger Connection With The Target. To Hide Malicious Activity on The Network To Obtain A Remote Access Connection. 11 / 40Which of the following is/are threats for electronic payment systems? Computer worms Trojan horse Computer virus All of the above 12 / 40Thie first compter virus is _____ Blaster Sasser I Love You Creeper 13 / 40Which of the following does not fall under area of cyber law? Data Management Digital Signature Data Protection Telecommunication Law 14 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Adware Spyware Zombie Malware 15 / 40Computer virus are ___________ All of the above man made Naturally Occur machine Made 16 / 40When was cyber law established in Nepal? 2011 2009 2005 2007 17 / 40What is a “vlog”? Video blog None Log of blog activity Video Log 18 / 40Authentication is None of the option Hard to assure identify of user on a remote system Modification Insertion 19 / 40Key logger is Spyware Antivirus Firmware All of the above 20 / 40A web address is also known as URL ULR LRU LUR 21 / 40To protect a computer from virus, you should install _______ in your computer. disk cleanup backup wizard disk defragmenter antivirus 22 / 40It is stealing ideas or creation of others. All of the above Piracy Intellectual property rights Plagiarism 23 / 40Unwanted email is known as _________ Virus Spyware Malware Spam 24 / 40Firewall is a type of _________ Worm Virus Security Threat None of the option 25 / 40To protect yourself from computer hacker, you should turn on a Script VLC Antivirus Firewall 26 / 40Which one of the following systems cannot be considered as an example of the operating systems? Red Hat Linux Microsoft Office Windows BSD Linux 27 / 40Firewalls are used to protect against virus attacks fire attacks data driven attacks unauthorized access 28 / 40The first computer virus is _____________ Boot sector Creeper I Love You Polymorphic 29 / 40___is the illegal access to the network or computer system. Virus Cracking Security Piracy 30 / 40The altering of data sO that is not usable unless the changes are undone is compression encryption biometrics ergonomics 31 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Tunneling Trafficking Switching 32 / 40what is telnet? Search engine Protocol Browser Gateway 33 / 40MCAfee is an example of Quick Heal Virus Antivirus Photo Editing Software 34 / 40Which of the following is known as malicious software? malware badware maliciousware illegalware 35 / 40IPv6 address length is 256 bits 32 bits 64 bits 128 bits 36 / 40Authentication is ___ Integration Modification identity of user on a remote system Insertion 37 / 40Which of the following is known as Malicious software? illegalware malware badware maliciousware 38 / 40MCAfee is an example of Antivirus Quick Heal Photo Editing Software Virus 39 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Security Reliability Performance Longevity 40 / 40To protect yourself from computer hacker, you should turn on a Firewall Antivirus Script VLC Your score isThe average score is 0% 0% Restart quiz Post Views: 2,126