Q1] Multiple Choice Questions (MCQ): 40 Marks
1) Which of the following are wireless attacks?
-
a) MAC Spoofing, Phising
-
b) Eavesdropping, MAC Spoofing
-
c) Phishing, Repudiation
-
d) Eavesdropping, Non-Repudiation
2) This attack can be deployed by infusing a malicious code in a website's comment section.
-
a) Cross Site Request Forgery (XSRF)
-
b) SQL injection
-
c) HTML Scripting
-
d) Cross Site Scripting (XSS)
3) The Objectiive of Firewalls is to protect _______
-
a) Data driven Attacks
-
b) Unauthorized Access
-
c) Confidentiality
-
d) Integrity
4) The user activities are sniff and forward this information as a background process to attackers.
-
a) Adware
-
b) Malware
-
c) Spyware
-
d) Warms
5) It is a class of computer threat?
-
a) Stalking
-
b) Phishing
-
c) DOS attacks
-
d) Soliciting
6) Someone posing as IT tech requests information about your computer configuration. What kind of attack is this?
-
a) Whaling
-
b) Social Engineering
-
c) Insider Threat
-
d) Phishing
7) The primary objective of worm is to Spread the infection from ______
-
a) Computer to computer
-
b) File to file on a computer
-
c) Website to website
-
d) Router to router
8) It is usually targeted by nature where the emails are exclusively designed to target any exact user.
-
a) Algo-based phishing
-
b) Vishing
-
c) Domain Phishing
-
d) Spear phishing
9) In this attack, someone is repeatedly harassed to individuals or organizations using any electronics means.
-
a) Identity theft
-
b) Phishing
-
c) Cyber stalking
-
d) Bullying
10) It is kind of attempts by individuals to get confidential or sensitive information from a individuals to falsifying their identity?
-
a) Identity theft scam
-
b) Phishing scams
-
c) Spyware scams
-
d) Trojan horse Scame
11) It can not be exploited by assigning or by licensing the rights to others.
-
a) Designs
-
b) Patents
-
c) Copyrights
-
d) Trademark
12) Which of the following would not gain copyright protection?
-
a) A DVD
-
b) An unrecorded speech
-
c) Written lyrics of a song
-
d) A hand knitted jumper
13) Which one of the following statements is true?
-
a) The defination of an invention is set out in the Patents Act 1977
-
b) Copyright must be registered in order to gain protection.
-
c) A patent must be registered in order to gain protection.
-
d) The owner of a patent con not sellit but can prevent others using his
invention.
14) Which one of the following is outside the scope of IT Act 2000.
-
a) Electronic Message
-
b) Electronics Evidence
-
c) Power of Attorney with digital signature
-
d) Electronic Gift
15) Which Act casts responsiblity on body corporate to protect sensitive personal information and provide punishment for offences by companies.
-
a) IT Act 2000
-
b) Indian Evidence Act 1872
-
c) Indian penel code
-
d) IT (Amendment) Act 2008
16) What is the proposed punishment for Cyber Terrorism in IT Act?
-
a) 10 year imprisonment
-
b) Life imprisonment
-
c) 5 year imprisonment
-
d) 1 Lac rupees penalty
17) Which of the following NERC Standard provide cyber-security framework for identification and protection of critical cyber assets to support the reliable operation of BES?
-
a) CIP-001
-
b) CIP-002
-
c) CIP-009
-
d) CIP-003
18) Standard CIP-002 is used for _________
-
a) Critical cyber asset identification
-
b) Electronic Security Perimeter
-
c) Physical Security of Critical cyber assets
-
d) Sabotage reporting
19) Which of the following are part of key provisions of Sarbanes-Oxley Act ?
-
a) Physical Security of Critical cyber assets
-
b) Bulk Electric System (BES)
-
c) Critical assets
-
d) Corporate Responsibility for financial reports
20) ISO 27000 was originally published in ______ as the BS 7799 by the British Standards Institute (BSI).
-
a) 1995
-
b) 1998
-
c) 2000
-
d) 2012
Next - Cyber Security & Laws Subjective Question Paper – Sem 7 – Jan 2021
↑ ↑ Click on above link for Q2 and Q3 ↑ ↑
0 Comments