Question 1 : A group of computers that is networked together and used by hackers to steal information is called a …
- Internet
- Intranet
- Botnet
- Rootkit
Question 2 : The ------ is a set of security standards formed in 2004 by Visa, MasterCard, Discover Financial Services, JCB International and American Express.
- Payment Card Industry Data Security Standard (PCI DSS)
- Payment Card Institute Data Security Standard (PCI DSS)
- Payment Card Information & Data Security Standard (PCI DSS)
- Payment Card Industry Double Security Standard (PCI DSS)
Question 3 : ______ is a potential carrier for worms and other malware
- General applications
- Internet-based application
- Operating system
- Messages
Question 4 : National Institute of Standards and Technology (NIST) is responsible for
- Maintaining and updating the compliance documents as directed by GLBA
- Maintaining and updating the compliance documents as directed by HIPPA
- Maintaining and updating the compliance documents as directed by ISO
- Maintaining and updating the compliance documents as directed by FISMA
Question 5 : The crossing of cyber boundaries into other people’s computer systems into spaces where rights of ownership or title have already been established and causing damage is called ______
- Cyber violence
- Cyber deceptions
- Cyber tresspass
- Cyber threat
Question 6 : ___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
- Data-hack
- Data-stealing
- Database altering
- Data breach
Question 7 : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
- Security
- Risk management
- Risk assessment
- Firewall
Question 8 : Jason receives notices that he has unauthorized charges on his credit card account. What type of attack is Jason a victim of?
- Social engineering
- Phishing
- Identity theft
- Bad luck
Question 9 : _______________is type of Buffer Overflow?
- Heap Buffer Overflow
- HIT Overflow
- Hope Overflow
- Hide Overflow
Question 10 : The section --- defines punishment for dishonestly receiving stolen computer resource or communication device.
- 66A
- 66B
- 66D
- 66E
Question 11 : What is the punishment for identity theft in IT Act?
- Two year imprisonment or 1 lakh rupees penalty or both
- Three year imprisonment or 1 lakh rupees penalty or both
- Three year imprisonment or 2 lakh rupees penalty or both
- One year imprisonment
Question 12 : Which section of IT Act 2000 deals with the punishment for cheating by impersonation by using computer resources?
- Section 66D
- Section 66C
- Section 67F
- Section 67D
Question 13 : ____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.
- Worms
- Antivirus
- Malware
- Adware
Question 14 : From mobile shopping to online payment encryption and beyond, ecommerce encompasses a wide variety of ----, ----, and ---- for both online buyers and sellers.
- data, sales, and tools
- data, systems, and tools
- data, systems, and sales
- data, sales, and tools
Question 15 : ______ is a conceptual electronic space unbounded by distance or other physical limitations
- E-commerce
- Cyberspace
- Information technology
- internet
Question 16 : Which one of the following responses is not a recommended way to avoid being victimized by malicious Trojans targeting Symbian-based devices?
- Ensure users upgrade their devices every 12 months.
- Keep firmware and OS versions up to date.
- Use mobile antispyware and antivirus software.
- Install only Symbian-signed programs or programs from a trusted source.
Question 17 : Under the GLBA, each manager or service-person is only allowed to___
- Manage one type of financial product/instrument
- Manage two type of financial product/instrument
- Manage three type of financial product/instrument
- Manage four type of financial product/instrument
Question 18 : Following is not a integrity realted cyber crime:
- Phreaking/Chipping
- Cracking/Hacking
- Onlinne grooming
- Deniel of service
Question 19 : When a software is pirated, it harmes...........
- Software Developers
- Management
- Operator
- People
Question 20 : Following is not a DoS attack:
- Volume Based Attacks
- Ping of Death,
- Hacking
- Smurf DDoS
Question 21 : What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
- Worm
- Cracker
- Keylogger
- Trojan horses
Question 22 : A ___________ is a small malicious program that runs hidden on infected system.
- Virus
- Trojan
- Shareware
- Adware
Question 23 : Property Rights (IPR) protect the use of information and ideas that are of ------
- Ethical value
- Moral value
- Social value
- Commercial value
Question 24 : Application layer DoS attack is also known as _______________
- Layer4 DoS attack
- Layer5 DoS attack
- Layer6 DoS attack
- Layer7 DoS attack
Question 25 : The ----- section deals with power to issue directions for blocking for public access of any information through any computer resource
- 68
- 69A
- 69B
- 72
- chevron_left
- 1
- chevron_right