Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40What is a “vlog”? None Log of blog activity Video blog Video Log 2 / 40Firewalls are used to protect against data driven attacks unauthorized access fire attacks virus attacks 3 / 40IPv6 address length is 64 bits 256 bits 32 bits 128 bits 4 / 40Junk E-mail is also known as Spoof Spam Copple crumbs sniffer 5 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VNP VPN VSN VSPN 6 / 40When was cyber law established in Nepal? 2005 2007 2009 2011 7 / 40General guidelines of computer ethics are needed for ________ All the option are correct Cracking Protection of personal data Computer crime 8 / 40Which of the following is known as Malicious software? badware malware illegalware maliciousware 9 / 40Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Hide Malicious Activity on The Network To Create A Ghost Server On The Network. To Create A Stronger Connection With The Target. 10 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. None of the options Ethics Standard Protocol 11 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called None of these Phishing Spoofing Spamming 12 / 40The objectives of Information technology is To make IT accessible to general public and increase employment All of the options To build knowledge based society To establish knowledge based industries 13 / 40To protect yourself from computer hacker, you should turn on a Script Antivirus VLC Firewall 14 / 40The first computer virus is _____________ Boot sector I Love You Creeper Polymorphic 15 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Reliability Longevity Security Performance 16 / 40Which of the following is/are threats for electronic payment systems? Computer worms Computer virus All of the above Trojan horse 17 / 40Firewall is a type of _________ Security Threat Virus None of the option Worm 18 / 40___is the illegal access to the network or computer system. Piracy Cracking Security Virus 19 / 40It is stealing ideas or creation of others. Piracy All of the above Intellectual property rights Plagiarism 20 / 40Key logger is Antivirus Spyware Firmware All of the above 21 / 40Thie first compter virus is _____ I Love You Creeper Blaster Sasser 22 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Malware Adware Zombie Spyware 23 / 40The altering of data sO that is not usable unless the changes are undone is biometrics ergonomics encryption compression 24 / 40Which one of the following systems cannot be considered as an example of the operating systems? Red Hat Linux Microsoft Office BSD Linux Windows 25 / 40MCAfee is an example of Photo Editing Software Antivirus Virus Quick Heal 26 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Switching Tunneling Trafficking Transferring 27 / 40Authentication is Hard to assure identify of user on a remote system Modification Insertion None of the option 28 / 40To protect a computer from virus, you should install _______ in your computer. disk cleanup backup wizard disk defragmenter antivirus 29 / 40To protect yourself from computer hacker, you should turn on a VLC Script Firewall Antivirus 30 / 40Which Of the Following Malicious Program Do Not replicate automatically? Worm Zombie Trojan Horse Virus 31 / 40Which of the following is not a way of protection? Personnel security Physical Security Personal Security Piracy 32 / 40MCAfee is an example of Virus Antivirus Quick Heal Photo Editing Software 33 / 40Authentication is ___ Integration Modification identity of user on a remote system Insertion 34 / 40Which of the following is known as malicious software? maliciousware malware badware illegalware 35 / 40Unwanted email is known as _________ Spam Virus Malware Spyware 36 / 40Which of the following does not fall under area of cyber law? Data Protection Digital Signature Telecommunication Law Data Management 37 / 40A web address is also known as URL LUR LRU ULR 38 / 40Which of the following is not a type of cybercrime? Damage to data and systems Data theft Forgery Installing antivirus for protection 39 / 40what is telnet? Browser Gateway Search engine Protocol 40 / 40Computer virus are ___________ machine Made man made All of the above Naturally Occur Your score isThe average score is 55% 0% Restart quiz Post Views: 651