Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40 To protect yourself from computer hacker, you should turn on a Firewall Script VLC Antivirus 2 / 40 Authentication is Insertion Modification Hard to assure identify of user on a remote system None of the option 3 / 40 Firewall is a type of _________ Virus Worm Security Threat None of the option 4 / 40 Which of the following is not a type of cybercrime? Data theft Forgery Installing antivirus for protection Damage to data and systems 5 / 40 To protect a computer from virus, you should install _______ in your computer. disk defragmenter disk cleanup backup wizard antivirus 6 / 40 Firewalls are used to protect against virus attacks fire attacks data driven attacks unauthorized access 7 / 40 ________ is a set of rules for determining moral standards or socially acceptable behavior. Ethics Protocol Standard None of the options 8 / 40 The first computer virus is _____________ Polymorphic Creeper Boot sector I Love You 9 / 40 In the computer networks, the encryption techniques are primarily used for improving the ______ Performance Security Reliability Longevity 10 / 40 General guidelines of computer ethics are needed for ________ Protection of personal data Computer crime Cracking All the option are correct 11 / 40 Which of the following is known as Malicious software? illegalware badware maliciousware malware 12 / 40 The altering of data sO that is not usable unless the changes are undone is ergonomics compression biometrics encryption 13 / 40 Which of the following is not a way of protection? Personnel security Piracy Physical Security Personal Security 14 / 40 ______________ monitors the user activities on internet and transmit that information in the background someone else. Spyware Adware Zombie Malware 15 / 40 Which one of the following systems cannot be considered as an example of the operating systems? Windows Microsoft Office Red Hat Linux BSD Linux 16 / 40 Which of the following does not fall under area of cyber law? Data Protection Data Management Telecommunication Law Digital Signature 17 / 40 To protect yourself from computer hacker, you should turn on a VLC Firewall Antivirus Script 18 / 40 The objectives of Information technology is To build knowledge based society To establish knowledge based industries All of the options To make IT accessible to general public and increase employment 19 / 40 Unwanted email is known as _________ Malware Virus Spyware Spam 20 / 40 Junk E-mail is also known as Spoof Spam sniffer Copple crumbs 21 / 40 A web address is also known as URL LUR ULR LRU 22 / 40 Which of the following is known as malicious software? malware badware maliciousware illegalware 23 / 40 It is stealing ideas or creation of others. Plagiarism All of the above Piracy Intellectual property rights 24 / 40 A hacker contacts your phone or E-mail and attempts to acquire your password is called Spamming Spoofing None of these Phishing 25 / 40 Which of the following is/are threats for electronic payment systems? Computer virus Computer worms Trojan horse All of the above 26 / 40 Which Of the Following Malicious Program Do Not replicate automatically? Virus Trojan Horse Zombie Worm 27 / 40 IPv6 address length is 128 bits 64 bits 32 bits 256 bits 28 / 40 What is a “vlog”? Video Log Log of blog activity Video blog None 29 / 40 Thie first compter virus is _____ Blaster Creeper Sasser I Love You 30 / 40 Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VPN VSPN VNP VSN 31 / 40 When was cyber law established in Nepal? 2011 2009 2005 2007 32 / 40 MCAfee is an example of Photo Editing Software Quick Heal Virus Antivirus 33 / 40 MCAfee is an example of Antivirus Quick Heal Virus Photo Editing Software 34 / 40 Computer virus are ___________ All of the above machine Made man made Naturally Occur 35 / 40 Authentication is ___ Integration Insertion identity of user on a remote system Modification 36 / 40 ___is the illegal access to the network or computer system. Virus Cracking Piracy Security 37 / 40 What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Trafficking Switching Tunneling Transferring 38 / 40 Key logger is All of the above Antivirus Firmware Spyware 39 / 40 Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Create A Ghost Server On The Network. To Hide Malicious Activity on The Network To Create A Stronger Connection With The Target. 40 / 40 what is telnet? Gateway Protocol Search engine Browser Your score isThe average score is 37% 0% Restart quiz Post Views: 2,433