(Multiple Choice Type Questions) Cyber law and Security Policy 1) The standard network utility to send ICMP packet to a target host a) Dsniff

b) Hmap

c) Ping

d) All of these

2) The TCP/IP packet assembler and analyzer and also perform firewall rule set testing a) Hackbot

b) Hping

c) Fping

d) Arping

3) The tools act like an offline browser a) HTTrack

b) eMail Tracker Pro

b) Traceroute

d) None of these

4) MOSES stands for a) Mobile System Processing Sensor b) Mobile Security Processing System c) Mobility of Security Processing System d) Modern System Processing Sensor

5) It affects the windows CE OS by creating a svchost.exe file in the window start up folder which allow full control of the device. a) Skull Trojan

b) Mosquito Trojan

c) Brador Trojan

d) Cabir Worm

6) The GUI based utility for finding discoverable and hidden Bluetooth enable device is a) BlueScanner

b) BlueSniff

c) BlueSniffer

d) BlueDiving

7) Access to a computer program that bypasses security mechanism is called a) Backdoor

b) Trojan house

c) Strom Worm

d) None of these

8) The program generates random packets of spoofed source IP to enable the attacker to launch Dos attack a) Jotl2

b) Targa

c) Nemesy

d) All of these

9) The method in which the phishers identify specific prospective victims in advance, and convey false information to them to prompt their disclosure of personal and financial data. a) Dragnet

b) Rod and reel

c) Gillnet

d) Lobsterpot

10) The attacker setup typo and matching domain names of the target and install websites for similar look and feel is a) Phishing

b) Pharming

c) Backup theft

d) None

11) When a person attempts to access a computer, computer system and computer software and the crime result in damage or loss of less than the value that is consider “high” by the prevailing law in the country is a) Class A misdemeanor

b) Class B misdemeanor

c) Class A felony

d) Class B felony

12) A hacker who releases information about any exploits or security holes he/she finds openly to the public without the concern for the information is used in the end is a) A black hat

b) A grey hat

c) A black hat

d) A brown hat

13) Sniffing is a technique used for a) Attacks on computer hardware

b) Attacks on computer software

c) Attacks on operating system

d) Attacks on wireless network

14) Which of the following is India‟s first cyber law? a) ITA 1998

b) ITA 1999

c) ITA 2000

d) ITA 2001

15) Which of the following is a social engineering site? a) eBay

b) Facebook

c) Amazon

d) CWB

16) Section 67 in ITA 2000 is associated with which of the following cyber crime? a) Tempering of computer source document b) Misrepresentation c) Publishing digital signature in false d) Transmitting obscene material in false

17) Skimming means a) Stealing ATM pin information b) Stealing telephone information c) Stealing identity d) None of these

18) What is the full form of CERT/CC? a) Computer Engineering Response Team Coordination Center b) Computer Emergency Record Team Coordination center c) Computer Emergency Response Team Coordination center d) Computer Engineering Record Team Coordination Center

19) Steganography is used for a) Digital imaging c) Digital signal processing

b) Digital watermarking

d) Photoshop

20) DLL stands for a) Dynamic Link Library

b) Digital Link Library

c) Distributed Link Library

d) Domain Link Library

21) Changing of raw data is known as a) Salami attack

b) Data diddling

c) Forgery

d) Web jacking

22) Pharming is used for a) Data hiding c) Host file poisoning

b) Data alteration d) File overriding

23) LDAP stands for a) Light weight directory access protocol b) Light weight data access protocol c) Light weight domain access protocol d) Light weight DNS access protocol …………………………………………………………………………………………………………… 1) The use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization is termed: (a)Cyberspace (b)Cyber stalking (c)Pornography (d)None of these 2) Which of the following is a cybercrime? (a)Hacking (b)Worm attack (c)Virus attack (d)All of these 3).......... Refers to email that appears to have been originated from one source when it was actually sent from another source. (a)Email bombing (b)Email spoofing (c)Email spamming (d) None of these

4) In cyber law terminology „DoS‟ means: (a) Denial of Service (b)Disc operating System (c)Distant operator Service (d)None of these 5) .......... refers to sending email to thousands and thousands of users-similar to a chain letter. (a)Email spamming (b)Email bombing (c) Trojan attack (d) None of these 6) By hacking web server taking control on another person‟s website called as web.......... (a)Spoofing (b)Hijacking (c)Spamming (d) None of these 7) Programs that multiply like viruses but spread from computer to computer are called as: (a)Worms (b) Virus (c)Boot (d) None of these 8) Section 66F of IT Act deals with a) Cyber stalking b) Email bombing c) Child pornography d) Cyber terrorism 9) Act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity is called a) email bombing b) Spamming c) Cyber stalking d) Phishing 10) Use of electronic messaging systems to send unsolicited bulk messages are called a) email bombing b) Spamming c) Cyber stalking d) Phishing 11) The practice of making a transmission appears to come from an authorized user. a) Hacking b) Spoofing c) Spamming d) Spamdexing

12) Which section of IT Act covers most of the common crimes arising out of “Unauthorized Access” a) Section 66 b) Section 67 c) Section 73 d) Section 74 13) In cyber law terminology „DDoS‟ means: (a)Distributed Denial of Service (b)Disc operating System (c) Distant operator Service (d) None of these 14) The use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization is termed: (a)Cyberspace (b)Cyber stalking (c)Pornography (d) None of these 15) Programs that multiply like viruses but spread from computer to computer are called as: (a)Worms (b)Virus (c)Boot (d)None of these 16) Section 66C of IT Act deals with a) Cyber stalking b) Email bombing c) Child pornography d) Punishment for Identity Theft 17) Section-66E of IT Act deals with a) Punishment for violation of Privacy. b) Spamming c) Cyber stalking d) Phishing 18) India's first cyber police station a) Delhi b) Bangalore c) Chennai d) Mumbai 19) Information Technology Amendment Act form in year a) 2000 b) 2001

c) 2008 d) 2009 20) Punishment for sending offensive massages through communication service are belong a) 66A b) 65 c) 66B d) 66F 21) Vishing is mean for a) SMS phishing b) Voice phishing c) Phishing d) All the above. 22) This is a program in which malicious or harmful code is contained inside apparently harmless programming or data. a) War dialer b) Spam trap c) Trojan horse d) Email 23) Which of the following is the most important to install and keep up to date on your personal computer? a) Anti-virus and anti-spyware software b) A Firewall c) Operating system updates d) All of the above must be installed and kept up to date 24) What is "phishing?" a)"Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords b) A type of computer virus c) An example of a strong password d) None of the above 25) What type of attack relies on the trusting nature of employees and the art of deception? a) Social Engineering b) Fraud c) Phishing d) Dumpster Diving 26) This is a document that states in writing how a company plans to protect the company's physical and IT assets. a) Data Encryption Standard b) Security policy c) Public key certificate d) Access control list

27) Which of the following are examples of Mobile virus? a) Skull Trojan b) Cabir Worm c) Mosquito Trojan d) All of the above. 28) Amendments to the Indian IT act which are new offences are added: a) 67A (Sexually explicit content) b) 67B (Child pornography) c) 66F (Cyber terrorism). d) All of the above.

29) Which are the following is not part of cyber space: a) Computer b) Computer network c) Website d) Calculator 30) Tempering of computer source code cover in: a) Section 66A b) Section 66B c) Section 65 d) Section 67

(Multiple Choice Type Questions) Cyber law and ... -

c) Publishing digital signature in false d) Transmitting obscene material in false. 17) Skimming means a) Stealing ATM pin information b) Stealing telephone ...

225KB Sizes 89 Downloads 651 Views

Recommend Documents

Multiple Choice Questions Correlation - Groups
A research study has reported that there is a correlation of r = −0.59 between the eye color (brown, green, blue) of an experimental animal and the amount of nicotine that is fatal to the animal when consumed. This indicates: (a) nicotine is less h

Multiple Choice Questions in ENGINEERING MATHEMATICS By ...
Page 3 of 145. Multiple Choice Questions in ENGINEERING MATHEMATICS By Diego Inocencio T. Gillesania.pdf. Multiple Choice Questions in ENGINEERING ...

Multiple Choice Questions in ENGINEERING MATHEMATICS By ...
Multiple Choice Questions in ENGINEERING MATHEMATICS By Venancio I. Besavilla, Jr. VOL1.pdf. Multiple Choice Questions in ENGINEERING ...

Multiple Choice Questions in ENGINEERING MATHEMATICS By ...
Multiple Choice Questions in ENGINEERING MATHEMATICS By PERFECTO B. PADILLA JR.pdf. Multiple Choice Questions in ENGINEERING MATHEMATICS ...

6 Least Common Multiple - (40 Multiple Choice Questions) Quiz ...
6 Least Common Multiple - (40 Multiple Choice Questions) Quiz Assignment.pdf. 6 Least Common Multiple - (40 Multiple Choice Questions) Quiz Assignment.

8 Least Common Multiple - (50 Multiple Choice Questions) Quiz ...
50) 32, 38, 30. A) 36480 B) 80. C) 2 D) 9120. -3-. Page 3 of 4. 8 Least Common Multiple - (50 Multiple Choice Questions) Quiz Assignment.pdf. 8 Least Common ...

Factors and Divisibility Rules (30 Multiple-Choice Questions ...
Page 3 of 3. Factors and Divisibility Rules (30 Multiple-Choice Questions) QuizAssignment.pdf. Factors and Divisibility Rules (30 Multiple-Choice Questions) ...

Adding+Subtracting Decimals (20 Multiple-Choice Questions Quiz+ ...
Adding+Subtracting Decimals (20 Multiple-Choice Questions Quiz+Assignment).pdf. Adding+Subtracting Decimals (20 Multiple-Choice Questions ...

Adding+Subtracting Decimals (30 Multiple-Choice Questions Quiz+ ...
Adding+Subtracting Decimals (30 Multiple-Choice Questions Quiz+Assignment).pdf. Adding+Subtracting Decimals (30 Multiple-Choice Questions ...

BALANCE OF PAYMENT Multiple Choice Questions -
necessarily true for an open economy? Multiple Choice Questions a. ... A credit in the current account and a debit in the financial account b. An entry in a ...

PDF Download Multiple Choice Questions in Intensive ...
Intensive Care Medicine Read Full Book ... Critical Care MCQS - A Companion for Intensive Care Exams ... Data Interpretation in Critical Care Medicine, 5e.

Adding+Subtracting Integers (30 Multiple-Choice Questions Quiz+ ...
Page 3 of 3. Adding+Subtracting Integers (30 Multiple-Choice Questions Quiz+Assignment).pdf. Adding+Subtracting Integers (30 Multiple-Choice Questions ...

Evaluating Variable Expressions (20 Multiple-Choice Questions Quiz+ ...
Evaluating Variable Expressions (20 Multiple-Choice Questions Quiz+Assignment).pdf. Evaluating Variable Expressions (20 Multiple-Choice Questions ...

Adding+Subtracting Integers (30 Multiple-Choice Questions Quiz+ ...
Page 3 of 3. Adding+Subtracting Integers (30 Multiple-Choice Questions Quiz+Assignment).pdf. Adding+Subtracting Integers (30 Multiple-Choice Questions ...

5 1. Answer the following multiple choice questions
questions from Section A are compulsory. Attempt any three questions from Section B. SECTION A. 1. Answer the following multiple choice questions : 10x1=10.

5 1. Answer the following multiple choice questions
(Weightage : 75%). Note : There are two sections in this paper. All the questions from Section A are compulsory. Attempt any three questions from Section B. SECTION A. 1. Answer the following multiple choice questions : 10x1=10. (i) The two main part