Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Spyware Zombie Malware Adware 2 / 40Computer virus are ___________ Naturally Occur machine Made man made All of the above 3 / 40To protect yourself from computer hacker, you should turn on a VLC Script Firewall Antivirus 4 / 40___is the illegal access to the network or computer system. Virus Cracking Security Piracy 5 / 40Which of the following is known as malicious software? badware illegalware maliciousware malware 6 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VSPN VNP VSN VPN 7 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Trafficking Tunneling Switching 8 / 40The objectives of Information technology is To establish knowledge based industries All of the options To make IT accessible to general public and increase employment To build knowledge based society 9 / 40To protect a computer from virus, you should install _______ in your computer. disk defragmenter disk cleanup antivirus backup wizard 10 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Security Performance Longevity Reliability 11 / 40Firewalls are used to protect against unauthorized access data driven attacks fire attacks virus attacks 12 / 40A web address is also known as LUR ULR URL LRU 13 / 40Unwanted email is known as _________ Malware Spyware Virus Spam 14 / 40The first computer virus is _____________ Creeper Boot sector Polymorphic I Love You 15 / 40Firewall is a type of _________ Security Threat Virus Worm None of the option 16 / 40MCAfee is an example of Photo Editing Software Virus Quick Heal Antivirus 17 / 40Which of the following is not a type of cybercrime? Forgery Installing antivirus for protection Damage to data and systems Data theft 18 / 40Which of the following is known as Malicious software? malware maliciousware illegalware badware 19 / 40Authentication is None of the option Hard to assure identify of user on a remote system Insertion Modification 20 / 40Which one of the following systems cannot be considered as an example of the operating systems? BSD Linux Windows Microsoft Office Red Hat Linux 21 / 40what is telnet? Gateway Protocol Browser Search engine 22 / 40MCAfee is an example of Quick Heal Virus Photo Editing Software Antivirus 23 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called None of these Phishing Spamming Spoofing 24 / 40General guidelines of computer ethics are needed for ________ Protection of personal data Cracking All the option are correct Computer crime 25 / 40It is stealing ideas or creation of others. Piracy Plagiarism Intellectual property rights All of the above 26 / 40Key logger is Spyware Firmware Antivirus All of the above 27 / 40Which of the following is/are threats for electronic payment systems? Computer worms All of the above Trojan horse Computer virus 28 / 40Which of the following does not fall under area of cyber law? Data Protection Data Management Telecommunication Law Digital Signature 29 / 40Which Of the Following Malicious Program Do Not replicate automatically? Zombie Worm Trojan Horse Virus 30 / 40To protect yourself from computer hacker, you should turn on a Script Firewall Antivirus VLC 31 / 40Junk E-mail is also known as Copple crumbs Spoof Spam sniffer 32 / 40What is a “vlog”? Log of blog activity Video Log Video blog None 33 / 40IPv6 address length is 32 bits 256 bits 128 bits 64 bits 34 / 40Which of the following is not a way of protection? Piracy Physical Security Personnel security Personal Security 35 / 40When was cyber law established in Nepal? 2005 2007 2011 2009 36 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. None of the options Standard Ethics Protocol 37 / 40Thie first compter virus is _____ I Love You Blaster Sasser Creeper 38 / 40Authentication is ___ Integration Insertion identity of user on a remote system Modification 39 / 40Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Hide Malicious Activity on The Network To Create A Stronger Connection With The Target. To Create A Ghost Server On The Network. 40 / 40The altering of data sO that is not usable unless the changes are undone is compression encryption ergonomics biometrics Your score isThe average score is 55% 0% Restart quiz Post Views: 1,539