Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge

Information Security and Cyber Law

1 / 40

______________ monitors the user activities on internet and transmit that information in the background someone else.

2 / 40

Computer virus are ___________

3 / 40

To protect yourself from computer hacker, you should turn on a

4 / 40

___is the illegal access to the network or computer system.

5 / 40

Which of the following is known as malicious software?

6 / 40

Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection...

7 / 40

What is used to carry traffic of one protocol over the network that does not support that protocol directly ______

8 / 40

The objectives of Information technology is

9 / 40

To protect a computer from virus, you should install _______ in your computer.

10 / 40

In the computer networks, the encryption techniques are primarily used for improving the ______

11 / 40

Firewalls are used to protect against

12 / 40

A web address is also known as

13 / 40

Unwanted email is known as _________

14 / 40

The first computer virus is _____________

15 / 40

Firewall is a type of _________

16 / 40

MCAfee is an example of

17 / 40

Which of the following is not a type of cybercrime?

18 / 40

Which of the following is known as Malicious software?

19 / 40

Authentication is

20 / 40

Which one of the following systems cannot be considered as an example of the operating systems?

21 / 40

what is telnet?

22 / 40

MCAfee is an example of

23 / 40

A hacker contacts your phone or E-mail and attempts to acquire your password is called

24 / 40

General guidelines of computer ethics are needed for ________

25 / 40

It is stealing ideas or creation of others.

26 / 40

Key logger is

27 / 40

Which of the following is/are threats for electronic payment systems?

28 / 40

Which of the following does not fall under area of cyber law?

29 / 40

Which Of the Following Malicious Program Do Not replicate automatically?

30 / 40

To protect yourself from computer hacker, you should turn on a

31 / 40

Junk E-mail is also known as

32 / 40

What is a “vlog”?

33 / 40

IPv6 address length is

34 / 40

Which of the following is not a way of protection?

35 / 40

When was cyber law established in Nepal?

36 / 40

________ is a set of rules for determining moral standards or socially acceptable behavior.

37 / 40

Thie first compter virus is _____

38 / 40

Authentication is ___

39 / 40

Why Would A Hacker Use A Proxy Server?

40 / 40

The altering of data sO that is not usable unless the changes are undone is

Your score is

The average score is 55%

0%