Question 1 : A group of computers that is networked together and used by hackers to steal information is called a …

  1. Internet
  2. Intranet
  3. Botnet
  4. Rootkit
    

Question 2 : The ------ is a set of security standards formed in 2004 by Visa, MasterCard, Discover Financial Services, JCB International and American Express.

  1. Payment Card Industry Data Security Standard (PCI DSS)
  2. Payment Card Institute Data Security Standard (PCI DSS)
  3. Payment Card Information & Data Security Standard (PCI DSS)
  4. Payment Card Industry Double Security Standard (PCI DSS)
    

Question 3 : ______ is a potential carrier for worms and other malware

  1. General applications
  2. Internet-based application
  3. Operating system
  4. Messages
    

Question 4 : National Institute of Standards and Technology (NIST) is responsible for

  1. Maintaining and updating the compliance documents as directed by GLBA
  2. Maintaining and updating the compliance documents as directed by HIPPA
  3. Maintaining and updating the compliance documents as directed by ISO
  4. Maintaining and updating the compliance documents as directed by FISMA
    

Question 5 : The crossing of cyber boundaries into other people’s computer systems into spaces where rights of ownership or title have already been established and causing damage is called ______

  1. Cyber violence
  2. Cyber deceptions
  3. Cyber tresspass
  4. Cyber threat
    

Question 6 : ___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.

  1. Data-hack
  2. Data-stealing
  3. Database altering
  4. Data breach
    

Question 7 : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

  1. Security
  2. Risk management
  3. Risk assessment
  4. Firewall
    

Question 8 : Jason receives notices that he has unauthorized charges on his credit card account. What type of attack is Jason a victim of?

  1. Social engineering
  2. Phishing
  3. Identity theft
  4. Bad luck
    

Question 9 : _______________is type of Buffer Overflow?

  1. Heap Buffer Overflow
  2. HIT Overflow
  3. Hope Overflow
  4. Hide Overflow
    

Question 10 : The section --- defines punishment for dishonestly receiving stolen computer resource or communication device.

  1. 66A
  2. 66B
  3. 66D
  4. 66E
    

Question 11 : What is the punishment for identity theft in IT Act?

  1. Two year imprisonment or 1 lakh rupees penalty or both
  2. Three year imprisonment or 1 lakh rupees penalty or both
  3. Three year imprisonment or 2 lakh rupees penalty or both
  4. One year imprisonment
    

Question 12 : Which section of IT Act 2000 deals with the punishment for cheating by impersonation by using computer resources?

  1. Section 66D
  2. Section 66C
  3. Section 67F
  4. Section 67D
    

Question 13 : ____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.

  1. Worms
  2. Antivirus
  3. Malware
  4. Adware
    

Question 14 : From mobile shopping to online payment encryption and beyond, ecommerce encompasses a wide variety of ----, ----, and ---- for both online buyers and sellers.

  1. data, sales, and tools
  2. data, systems, and tools
  3. data, systems, and sales
  4. data, sales, and tools
    

Question 15 : ______ is a conceptual electronic space unbounded by distance or other physical limitations

  1. E-commerce
  2. Cyberspace
  3. Information technology
  4. internet
    

Question 16 : Which one of the following responses is not a recommended way to avoid being victimized by malicious Trojans targeting Symbian-based devices?

  1. Ensure users upgrade their devices every 12 months.
  2. Keep firmware and OS versions up to date.
  3. Use mobile antispyware and antivirus software.
  4. Install only Symbian-signed programs or programs from a trusted source.
    

Question 17 : Under the GLBA, each manager or service-person is only allowed to___

  1. Manage one type of financial product/instrument
  2. Manage two type of financial product/instrument
  3. Manage three type of financial product/instrument
  4. Manage four type of financial product/instrument
    

Question 18 : Following is not a integrity realted cyber crime:

  1. Phreaking/Chipping
  2. Cracking/Hacking
  3. Onlinne grooming
  4. Deniel of service
    

Question 19 : When a software is pirated, it harmes...........

  1. Software Developers
  2. Management
  3. Operator
  4. People
    

Question 20 : Following is not a DoS attack:

  1. Volume Based Attacks
  2. Ping of Death,
  3. Hacking
  4. Smurf DDoS
    

Question 21 : What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?

  1. Worm
  2. Cracker
  3. Keylogger
  4. Trojan horses
    

Question 22 : A ___________ is a small malicious program that runs hidden on infected system.

  1. Virus
  2. Trojan
  3. Shareware
  4. Adware
    

Question 23 : Property Rights (IPR) protect the use of information and ideas that are of ------

  1. Ethical value
  2. Moral value
  3. Social value
  4. Commercial value
    

Question 24 : Application layer DoS attack is also known as _______________

  1. Layer4 DoS attack
  2. Layer5 DoS attack
  3. Layer6 DoS attack
  4. Layer7 DoS attack
    

Question 25 : The ----- section deals with power to issue directions for blocking for public access of any information through any computer resource

  1. 68
  2. 69A
  3. 69B
  4. 72
    
  • chevron_left
  • 1
  • chevron_right