Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge

Information Security and Cyber Law

1 / 40

What is a “vlog”?

2 / 40

Firewalls are used to protect against

3 / 40

IPv6 address length is

4 / 40

Junk E-mail is also known as

5 / 40

Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection...

6 / 40

When was cyber law established in Nepal?

7 / 40

General guidelines of computer ethics are needed for ________

8 / 40

Which of the following is known as Malicious software?

9 / 40

Why Would A Hacker Use A Proxy Server?

10 / 40

________ is a set of rules for determining moral standards or socially acceptable behavior.

11 / 40

A hacker contacts your phone or E-mail and attempts to acquire your password is called

12 / 40

The objectives of Information technology is

13 / 40

To protect yourself from computer hacker, you should turn on a

14 / 40

The first computer virus is _____________

15 / 40

In the computer networks, the encryption techniques are primarily used for improving the ______

16 / 40

Which of the following is/are threats for electronic payment systems?

17 / 40

Firewall is a type of _________

18 / 40

___is the illegal access to the network or computer system.

19 / 40

It is stealing ideas or creation of others.

20 / 40

Key logger is

21 / 40

Thie first compter virus is _____

22 / 40

______________ monitors the user activities on internet and transmit that information in the background someone else.

23 / 40

The altering of data sO that is not usable unless the changes are undone is

24 / 40

Which one of the following systems cannot be considered as an example of the operating systems?

25 / 40

MCAfee is an example of

26 / 40

What is used to carry traffic of one protocol over the network that does not support that protocol directly ______

27 / 40

Authentication is

28 / 40

To protect a computer from virus, you should install _______ in your computer.

29 / 40

To protect yourself from computer hacker, you should turn on a

30 / 40

Which Of the Following Malicious Program Do Not replicate automatically?

31 / 40

Which of the following is not a way of protection?

32 / 40

MCAfee is an example of

33 / 40

Authentication is ___

34 / 40

Which of the following is known as malicious software?

35 / 40

Unwanted email is known as _________

36 / 40

Which of the following does not fall under area of cyber law?

37 / 40

A web address is also known as

38 / 40

Which of the following is not a type of cybercrime?

39 / 40

what is telnet?

40 / 40

Computer virus are ___________

Your score is

The average score is 55%

0%