Information Security and Cyber Law | MCQ | Quiz | Test Your Knowledge

Information Security and Cyber Law

1 / 40

Authentication is

2 / 40

______________ monitors the user activities on internet and transmit that information in the background someone else.

3 / 40

Which of the following is not a way of protection?

4 / 40

Which of the following is known as Malicious software?

5 / 40

What is used to carry traffic of one protocol over the network that does not support that protocol directly ______

6 / 40

MCAfee is an example of

7 / 40

Thie first compter virus is _____

8 / 40

When was cyber law established in Nepal?

9 / 40

Firewall is a type of _________

10 / 40

Which one of the following systems cannot be considered as an example of the operating systems?

11 / 40

The objectives of Information technology is

12 / 40

Which of the following does not fall under area of cyber law?

13 / 40

Which of the following is/are threats for electronic payment systems?

14 / 40

To protect yourself from computer hacker, you should turn on a

15 / 40

The first computer virus is _____________

16 / 40

Which of the following is known as malicious software?

17 / 40

The altering of data sO that is not usable unless the changes are undone is

18 / 40

Firewalls are used to protect against

19 / 40

what is telnet?

20 / 40

MCAfee is an example of

21 / 40

General guidelines of computer ethics are needed for ________

22 / 40

To protect a computer from virus, you should install _______ in your computer.

23 / 40

A web address is also known as

24 / 40

It is stealing ideas or creation of others.

25 / 40

Key logger is

26 / 40

Which Of the Following Malicious Program Do Not replicate automatically?

27 / 40

Which of the following is not a type of cybercrime?

28 / 40

Which of the following is an extension of an enterprise private intranet across a public Network that creates a secure private connection...

29 / 40

To protect yourself from computer hacker, you should turn on a

30 / 40

IPv6 address length is

31 / 40

What is a “vlog”?

32 / 40

A hacker contacts your phone or E-mail and attempts to acquire your password is called

33 / 40

Authentication is ___

34 / 40

___is the illegal access to the network or computer system.

35 / 40

Computer virus are ___________

36 / 40

Junk E-mail is also known as

37 / 40

________ is a set of rules for determining moral standards or socially acceptable behavior.

38 / 40

In the computer networks, the encryption techniques are primarily used for improving the ______

39 / 40

Unwanted email is known as _________

40 / 40

Why Would A Hacker Use A Proxy Server?

Your score is

The average score is 55%

0%