Cyber Security and Laws MCQ Paper 7th Semester January 2021 Mumbai University

Cyber Security and Laws MCQ paper Mumbai University

Q1] Multiple Choice Questions (MCQ): 40 Marks


1) Which of the following are wireless attacks?

    a) MAC Spoofing, Phising
    b) Eavesdropping, MAC Spoofing
    c) Phishing, Repudiation
    d) Eavesdropping, Non-Repudiation

2) This attack can be deployed by infusing a malicious code in a website's comment section.

    a) Cross Site Request Forgery (XSRF)
    b) SQL injection
    c) HTML Scripting
    d) Cross Site Scripting (XSS)

3) The Objectiive of Firewalls is to protect _______

    a) Data driven Attacks
    b) Unauthorized Access
    c) Confidentiality
    d) Integrity

4) The user activities are sniff and forward this information as a background process to attackers.

    a) Adware
    b) Malware
    c) Spyware
    d) Warms

5) It is a class of computer threat?

    a) Stalking
    b) Phishing
    c) DOS attacks
    d) Soliciting

6) Someone posing as IT tech requests information about your computer configuration. What kind of attack is this?

    a) Whaling
    b) Social Engineering
    c) Insider Threat
    d) Phishing

7) The primary objective of worm is to Spread the infection from ______

    a) Computer to computer
    b) File to file on a computer
    c) Website to website
    d) Router to router

8) It is usually targeted by nature where the emails are exclusively designed to target any exact user.

    a) Algo-based phishing
    b) Vishing
    c) Domain Phishing
    d) Spear phishing

9) In this attack, someone is repeatedly harassed to individuals or organizations using any electronics means.

    a) Identity theft
    b) Phishing
    c) Cyber stalking
    d) Bullying

10) It is kind of attempts by individuals to get confidential or sensitive information from a individuals to falsifying their identity?

    a) Identity theft scam
    b) Phishing scams
    c) Spyware scams
    d) Trojan horse Scame

11) It can not be exploited by assigning or by licensing the rights to others.

    a) Designs
    b) Patents
    c) Copyrights
    d) Trademark

12) Which of the following would not gain copyright protection?

    a) A DVD
    b) An unrecorded speech
    c) Written lyrics of a song
    d) A hand knitted jumper

13) Which one of the following statements is true?

    a) The defination of an invention is set out in the Patents Act 1977
    b) Copyright must be registered in order to gain protection.
    c) A patent must be registered in order to gain protection.
    d) The owner of a patent con not sellit but can prevent others using his invention.

14) Which one of the following is outside the scope of IT Act 2000.

    a) Electronic Message
    b) Electronics Evidence
    c) Power of Attorney with digital signature
    d) Electronic Gift

15) Which Act casts responsiblity on body corporate to protect sensitive personal information and provide punishment for offences by companies.

    a) IT Act 2000
    b) Indian Evidence Act 1872
    c) Indian penel code
    d) IT (Amendment) Act 2008

16) What is the proposed punishment for Cyber Terrorism in IT Act?

    a) 10 year imprisonment
    b) Life imprisonment
    c) 5 year imprisonment
    d) 1 Lac rupees penalty

17) Which of the following NERC Standard provide cyber-security framework for identification and protection of critical cyber assets to support the reliable operation of BES?

    a) CIP-001
    b) CIP-002
    c) CIP-009
    d) CIP-003

18) Standard CIP-002 is used for _________

    a) Critical cyber asset identification
    b) Electronic Security Perimeter
    c) Physical Security of Critical cyber assets
    d) Sabotage reporting

19) Which of the following are part of key provisions of Sarbanes-Oxley Act ?

    a) Physical Security of Critical cyber assets
    b) Bulk Electric System (BES)
    c) Critical assets
    d) Corporate Responsibility for financial reports

20) ISO 27000 was originally published in ______ as the BS 7799 by the British Standards Institute (BSI).

    a) 1995
    b) 1998
    c) 2000
    d) 2012


↑ ↑ Click on above link for Q2 and Q3 ↑ ↑



Post a Comment

0 Comments