Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge April 18, 2024 by jaminrai Information Security and Cyber Law 1 / 40It is stealing ideas or creation of others. All of the above Intellectual property rights Piracy Plagiarism 2 / 40When was cyber law established in Nepal? 2011 2007 2005 2009 3 / 40Which of the following is/are threats for electronic payment systems? Trojan horse All of the above Computer worms Computer virus 4 / 40Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection... VPN VNP VSPN VSN 5 / 40A web address is also known as LRU URL LUR ULR 6 / 40Thie first compter virus is _____ Creeper I Love You Sasser Blaster 7 / 40To protect yourself from computer hacker, you should turn on a VLC Antivirus Firewall Script 8 / 40what is telnet? Search engine Gateway Protocol Browser 9 / 40MCAfee is an example of Photo Editing Software Virus Antivirus Quick Heal 10 / 40___is the illegal access to the network or computer system. Virus Cracking Piracy Security 11 / 40What is used to carry traffic of one protocol over the network that does not support that protocol directly ______ Transferring Trafficking Tunneling Switching 12 / 40A hacker contacts your phone or E-mail and attempts to acquire your password is called Phishing Spamming None of these Spoofing 13 / 40Why Would A Hacker Use A Proxy Server? To Obtain A Remote Access Connection. To Create A Ghost Server On The Network. To Hide Malicious Activity on The Network To Create A Stronger Connection With The Target. 14 / 40What is a “vlog”? Video Log Video blog None Log of blog activity 15 / 40Authentication is ___ identity of user on a remote system Modification Insertion Integration 16 / 40________ is a set of rules for determining moral standards or socially acceptable behavior. Standard None of the options Ethics Protocol 17 / 40General guidelines of computer ethics are needed for ________ All the option are correct Computer crime Protection of personal data Cracking 18 / 40Which of the following does not fall under area of cyber law? Data Protection Telecommunication Law Digital Signature Data Management 19 / 40MCAfee is an example of Antivirus Virus Photo Editing Software Quick Heal 20 / 40Firewalls are used to protect against fire attacks virus attacks unauthorized access data driven attacks 21 / 40Which of the following is not a way of protection? Personal Security Piracy Physical Security Personnel security 22 / 40To protect yourself from computer hacker, you should turn on a Firewall VLC Antivirus Script 23 / 40The objectives of Information technology is All of the options To establish knowledge based industries To build knowledge based society To make IT accessible to general public and increase employment 24 / 40Which of the following is known as Malicious software? malware illegalware maliciousware badware 25 / 40The altering of data sO that is not usable unless the changes are undone is encryption compression biometrics ergonomics 26 / 40Which of the following is known as malicious software? badware malware illegalware maliciousware 27 / 40Computer virus are ___________ man made machine Made All of the above Naturally Occur 28 / 40In the computer networks, the encryption techniques are primarily used for improving the ______ Reliability Security Performance Longevity 29 / 40Which Of the Following Malicious Program Do Not replicate automatically? Virus Zombie Trojan Horse Worm 30 / 40IPv6 address length is 128 bits 32 bits 256 bits 64 bits 31 / 40Which of the following is not a type of cybercrime? Damage to data and systems Installing antivirus for protection Data theft Forgery 32 / 40Which one of the following systems cannot be considered as an example of the operating systems? Microsoft Office BSD Linux Red Hat Linux Windows 33 / 40______________ monitors the user activities on internet and transmit that information in the background someone else. Adware Zombie Malware Spyware 34 / 40To protect a computer from virus, you should install _______ in your computer. disk cleanup backup wizard disk defragmenter antivirus 35 / 40The first computer virus is _____________ Creeper Polymorphic I Love You Boot sector 36 / 40Key logger is All of the above Spyware Antivirus Firmware 37 / 40Firewall is a type of _________ Worm Security Threat Virus None of the option 38 / 40Junk E-mail is also known as sniffer Copple crumbs Spam Spoof 39 / 40Unwanted email is known as _________ Spyware Malware Spam Virus 40 / 40Authentication is None of the option Insertion Hard to assure identify of user on a remote system Modification Your score isThe average score is 0% 0% Restart quiz Post Views: 2,057