Question 1 :
Property Rights (IPR) protect the use of information and ideas that are of ____
- Ethical value
- Moral value
- Social value
- Commercial value
Question 2 :
National Institute of Standards and Technology (NIST) is responsible for
- Maintaining and updating the compliance documents as directed by GLBA
- Maintaining and updating the compliance documents as directed by HIPPA
- Maintaining and updating the compliance documents as directed by ISO
- Maintaining and updating the compliance documents as directed by FISMA
Question 3 :
_______________is type of Buffer Overflow?
- Heap Buffer Overflow
- HIT Overflow
- Hope Overflow
- Hide Overflow
Question 4 :
When a software is pirated, it harmes...........
- Software Developers
- Management
- Operator
- People
Question 5 :
The ____ section deals with power to issue directions for blocking for public access of any information through any computer resource
- 68
- 69A
- 69B
- 72
Question 6 :
Following is not a DoS attack:
- Volume Based Attacks
- Ping of Death,
- Hacking
- Smurf DDoS
Question 7 :
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
- Security
- Risk management
- Risk assessment
- Firewall
Question 8 :
____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.
- Worms
- Antivirus
- Malware
- Adware
Question 9 :
Which one of the following responses is not a recommended way to avoid being victimized by malicious Trojans targeting Symbian-based devices?
- Ensure users upgrade their devices every 12 months.
- Keep firmware and OS versions up to date.
- Use mobile antispyware and antivirus software.
- Install only Symbian-signed programs or programs from a trusted source.
Question 10 :
A ___________ is a small malicious program that runs hidden on infected system.
- Virus
- Trojan
- Shareware
- Adware
Question 11 :
Jason receives notices that he has unauthorized charges on his credit card account. What type of attack is Jason a victim of?
- Social engineering
- Phishing
- Identity theft
- Bad luck
Question 12 :
The section __ defines punishment for dishonestly receiving stolen computer resource or communication device.
- 66A
- 66B
- 66D
- 66E
Question 13 :
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
- Data-hack
- Data-stealing
- Database altering
- Data breach
Question 14 :
What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
- Worm
- Cracker
- Keylogger
- Trojan horses
Question 15 :
Following is not a integrity realted cyber crime:
- Phreaking/Chipping
- Cracking/Hacking
- Onlinne grooming
- Deniel of service
Question 16 :
A group of computers that is networked together and used by hackers to steal information is called a …
- Internet
- Intranet
- Botnet
- Rootkit
Question 17 :
From mobile shopping to online payment encryption and beyond, ecommerce encompasses a wide variety of __-, __-, and __- for both online buyers and sellers.
- data, sales, and tools
- data, systems, and tools
- data, systems, and sales
- data, sales, and tools
Question 18 :
______ is a potential carrier for worms and other malware
- General applications
- Internet-based application
- Operating system
- Messages
Question 19 :
Application layer DoS attack is also known as _______________
- Layer4 DoS attack
- Layer5 DoS attack
- Layer6 DoS attack
- Layer7 DoS attack
Question 20 :
Under the GLBA, each manager or service-person is only allowed to___
- Manage one type of financial product/instrument
- Manage two type of financial product/instrument
- Manage three type of financial product/instrument
- Manage four type of financial product/instrument
Question 21 :
______ is a conceptual electronic space unbounded by distance or other physical limitations
- E-commerce
- Cyberspace
- Information technology
- internet
Question 22 :
Which section of IT Act 2000 deals with the punishment for cheating by impersonation by using computer resources?
- Section 66D
- Section 66C
- Section 67F
- Section 67D
Question 23 :
The ____ is a set of security standards formed in 2004 by Visa, MasterCard, Discover Financial Services, JCB International and American Express.
- Payment Card Industry Data Security Standard (PCI DSS)
- Payment Card Institute Data Security Standard (PCI DSS)
- Payment Card Information - Data Security Standard (PCI DSS)
- Payment Card Industry Double Security Standard (PCI DSS)
Question 24 :
The crossing of cyber boundaries into other people’s computer systems into spaces where rights of ownership or title have already been established and causing damage is called ______
- Cyber violence
- Cyber deceptions
- Cyber tresspass
- Cyber threat
Question 25 :
What is the punishment for identity theft in IT Act?
- Two year imprisonment or 1 lakh rupees penalty or both
- Three year imprisonment or 1 lakh rupees penalty or both
- Three year imprisonment or 2 lakh rupees penalty or both
- One year imprisonment