Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40 Computer virus are ___________ machine Made All of the above man made Naturally Occur 2 / 40 The altering of data sO that is not usable unless the changes are undone is biometrics ergonomics compression encryption 3 / 40 Firewall is a type of _________ Worm Security Threat Virus None of the option 4 / 40 A hacker contacts your phone or E-mail and attempts to acquire your password is called Phishing None of these Spoofing Spamming 5 / 40 MCAfee is an example of Antivirus Quick Heal Photo Editing Software Virus 6 / 40 A web address is also known as LUR LRU URL ULR 7 / 40 Which of the following does not fall under area of cyber law? Data Management Telecommunication Law Digital Signature Data Protection 8 / 40 Key logger is All of the above Firmware Antivirus Spyware 9 / 40 The objectives of Information technology is To build knowledge based society To establish knowledge based industries To make IT accessible to general public and increase employment All of the options 10 / 40 Which of the following is known as malicious software? illegalware badware maliciousware malware 11 / 40 Authentication is ___ Insertion identity of user on a remote system Modification Integration 12 / 40 Why Would A Hacker Use A Proxy Server? To Create A Stronger Connection With The Target. To Hide Malicious Activity on The Network To Create A Ghost Server On The Network. To Obtain A Remote Access Connection. 13 / 40 Which one of the following systems cannot be considered as an example of the operating systems? Windows BSD Linux Red Hat Linux Microsoft Office 14 / 40 MCAfee is an example of Virus Photo Editing Software Antivirus Quick Heal 15 / 40 When was cyber law established in Nepal? 2007 2011 2005 2009 16 / 40 What is a “vlog”? Video Log None Log of blog activity Video blog 17 / 40 ______________ monitors the user activities on internet and transmit that information in the background someone else. Adware Malware Zombie Spyware 18 / 40 It is stealing ideas or creation of others. All of the above Piracy Intellectual property rights Plagiarism 19 / 40 Thie first compter virus is _____ Blaster Sasser Creeper I Love You 20 / 40 Which Of the Following Malicious Program Do Not replicate automatically? Worm Zombie Trojan Horse Virus 21 / 40 what is telnet? Browser Search engine Gateway Protocol 22 / 40 To protect yourself from computer hacker, you should turn on a Firewall Script Antivirus VLC 23 / 40 Authentication is Hard to assure identify of user on a remote system Insertion None of the option Modification 24 / 40 What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Switching Transferring Tunneling Trafficking 25 / 40 IPv6 address length is 64 bits 32 bits 128 bits 256 bits 26 / 40 Firewalls are used to protect against fire attacks virus attacks data driven attacks unauthorized access 27 / 40 Which of the following is known as Malicious software? malware maliciousware badware illegalware 28 / 40 Junk E-mail is also known as sniffer Spoof Spam Copple crumbs 29 / 40 ________ is a set of rules for determining moral standards or socially acceptable behavior. Protocol Ethics Standard None of the options 30 / 40 The first computer virus is _____________ Creeper Boot sector Polymorphic I Love You 31 / 40 In the computer networks, the encryption techniques are primarily used for improving the ______ Security Reliability Performance Longevity 32 / 40 To protect yourself from computer hacker, you should turn on a Script VLC Antivirus Firewall 33 / 40 ___is the illegal access to the network or computer system. Cracking Security Virus Piracy 34 / 40 Which of the following is not a type of cybercrime? Installing antivirus for protection Damage to data and systems Data theft Forgery 35 / 40 Unwanted email is known as _________ Virus Malware Spam Spyware 36 / 40 To protect a computer from virus, you should install _______ in your computer. backup wizard disk cleanup disk defragmenter antivirus 37 / 40 Which of the following is not a way of protection? Personnel security Personal Security Piracy Physical Security 38 / 40 Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VNP VSN VPN VSPN 39 / 40 Which of the following is/are threats for electronic payment systems? Computer worms All of the above Computer virus Trojan horse 40 / 40 General guidelines of computer ethics are needed for ________ Protection of personal data All the option are correct Computer crime Cracking Your score isThe average score is 71% 0% Restart quiz Post Views: 2,556