Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40Authentication is Hard to assure identify of user on a remote system Insertion None of the option Modification 2 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Spyware Zombie Malware Adware 3 / 40Which of the following is not a way of protection? Personal Security Physical Security Personnel security Piracy 4 / 40Which of the following is known as Malicious software? illegalware malware maliciousware badware 5 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Switching Trafficking Tunneling Transferring 6 / 40MCAfee is an example of Virus Photo Editing Software Quick Heal Antivirus 7 / 40Thie first compter virus is _____ Sasser Blaster I Love You Creeper 8 / 40When was cyber law established in Nepal? 2009 2011 2007 2005 9 / 40Firewall is a type of _________ Worm Security Threat None of the option Virus 10 / 40Which one of the following systems cannot be considered as an example of the operating systems? BSD Linux Red Hat Linux Windows Microsoft Office 11 / 40The objectives of Information technology is To build knowledge based society To make IT accessible to general public and increase employment To establish knowledge based industries All of the options 12 / 40Which of the following does not fall under area of cyber law? Digital Signature Data Protection Telecommunication Law Data Management 13 / 40Which of the following is/are threats for electronic payment systems? All of the above Trojan horse Computer virus Computer worms 14 / 40To protect yourself from computer hacker, you should turn on a Script Firewall VLC Antivirus 15 / 40The first computer virus is _____________ Polymorphic Boot sector I Love You Creeper 16 / 40Which of the following is known as malicious software? malware maliciousware illegalware badware 17 / 40The altering of data sO that is not usable unless the changes are undone is compression encryption biometrics ergonomics 18 / 40Firewalls are used to protect against virus attacks fire attacks unauthorized access data driven attacks 19 / 40what is telnet? Search engine Protocol Browser Gateway 20 / 40MCAfee is an example of Photo Editing Software Antivirus Quick Heal Virus 21 / 40General guidelines of computer ethics are needed for ________ Computer crime Protection of personal data All the option are correct Cracking 22 / 40To protect a computer from virus, you should install _______ in your computer. disk cleanup backup wizard antivirus disk defragmenter 23 / 40A web address is also known as LUR URL ULR LRU 24 / 40It is stealing ideas or creation of others. Piracy All of the above Intellectual property rights Plagiarism 25 / 40Key logger is All of the above Spyware Antivirus Firmware 26 / 40Which Of the Following Malicious Program Do Not replicate automatically? Worm Trojan Horse Zombie Virus 27 / 40Which of the following is not a type of cybercrime? Forgery Damage to data and systems Installing antivirus for protection Data theft 28 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VNP VSN VSPN VPN 29 / 40To protect yourself from computer hacker, you should turn on a VLC Firewall Script Antivirus 30 / 40IPv6 address length is 64 bits 32 bits 128 bits 256 bits 31 / 40What is a “vlog”? None Log of blog activity Video Log Video blog 32 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Phishing Spamming None of these Spoofing 33 / 40Authentication is ___ Integration Insertion identity of user on a remote system Modification 34 / 40___is the illegal access to the network or computer system. Virus Security Cracking Piracy 35 / 40Computer virus are ___________ All of the above Naturally Occur man made machine Made 36 / 40Junk E-mail is also known as Copple crumbs Spam Spoof sniffer 37 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Ethics Protocol None of the options Standard 38 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Reliability Security Performance Longevity 39 / 40Unwanted email is known as _________ Virus Spam Spyware Malware 40 / 40Why Would A Hacker Use A Proxy Server? To Create A Ghost Server On The Network. To Obtain A Remote Access Connection. To Create A Stronger Connection With The Target. To Hide Malicious Activity on The Network Your score isThe average score is 55% 0% Restart quiz Post Views: 980