CSL-Computers and Programming MCQ's




Question 1 :
Property Rights (IPR) protect the use of information and ideas that are of ____


  1. Ethical value
  2. Moral value
  3. Social value
  4. Commercial value
  

Question 2 :
National Institute of Standards and Technology (NIST) is responsible for


  1. Maintaining and updating the compliance documents as directed by GLBA
  2. Maintaining and updating the compliance documents as directed by HIPPA
  3. Maintaining and updating the compliance documents as directed by ISO
  4. Maintaining and updating the compliance documents as directed by FISMA
  

Question 3 :
_______________is type of Buffer Overflow?


  1. Heap Buffer Overflow
  2. HIT Overflow
  3. Hope Overflow
  4. Hide Overflow
  

Question 4 :
When a software is pirated, it harmes...........


  1. Software Developers
  2. Management
  3. Operator
  4. People
  

Question 5 :
The ____ section deals with power to issue directions for blocking for public access of any information through any computer resource


  1. 68
  2. 69A
  3. 69B
  4. 72
  

Question 6 :
Following is not a DoS attack:


  1. Volume Based Attacks
  2. Ping of Death,
  3. Hacking
  4. Smurf DDoS
  

Question 7 :
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?


  1. Security
  2. Risk management
  3. Risk assessment
  4. Firewall
  

Question 8 :
____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.


  1. Worms
  2. Antivirus
  3. Malware
  4. Adware
  

Question 9 :
Which one of the following responses is not a recommended way to avoid being victimized by malicious Trojans targeting Symbian-based devices?


  1. Ensure users upgrade their devices every 12 months.
  2. Keep firmware and OS versions up to date.
  3. Use mobile antispyware and antivirus software.
  4. Install only Symbian-signed programs or programs from a trusted source.
  

Question 10 :
A ___________ is a small malicious program that runs hidden on infected system.


  1. Virus
  2. Trojan
  3. Shareware
  4. Adware
  

Question 11 :
Jason receives notices that he has unauthorized charges on his credit card account. What type of attack is Jason a victim of?


  1. Social engineering
  2. Phishing
  3. Identity theft
  4. Bad luck
  

Question 12 :
The section __ defines punishment for dishonestly receiving stolen computer resource or communication device.


  1. 66A
  2. 66B
  3. 66D
  4. 66E
  

Question 13 :
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.


  1. Data-hack
  2. Data-stealing
  3. Database altering
  4. Data breach
  

Question 14 :
What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?


  1. Worm
  2. Cracker
  3. Keylogger
  4. Trojan horses
  

Question 15 :
Following is not a integrity realted cyber crime:


  1. Phreaking/Chipping
  2. Cracking/Hacking
  3. Onlinne grooming
  4. Deniel of service
  

Question 16 :
A group of computers that is networked together and used by hackers to steal information is called a …


  1. Internet
  2. Intranet
  3. Botnet
  4. Rootkit
  

Question 17 :
From mobile shopping to online payment encryption and beyond, ecommerce encompasses a wide variety of __-, __-, and __- for both online buyers and sellers.


  1. data, sales, and tools
  2. data, systems, and tools
  3. data, systems, and sales
  4. data, sales, and tools
  

Question 18 :
______ is a potential carrier for worms and other malware


  1. General applications
  2. Internet-based application
  3. Operating system
  4. Messages
  

Question 19 :
Application layer DoS attack is also known as _______________


  1. Layer4 DoS attack
  2. Layer5 DoS attack
  3. Layer6 DoS attack
  4. Layer7 DoS attack
  

Question 20 :
Under the GLBA, each manager or service-person is only allowed to___


  1. Manage one type of financial product/instrument
  2. Manage two type of financial product/instrument
  3. Manage three type of financial product/instrument
  4. Manage four type of financial product/instrument
  

Question 21 :
______ is a conceptual electronic space unbounded by distance or other physical limitations


  1. E-commerce
  2. Cyberspace
  3. Information technology
  4. internet
  

Question 22 :
Which section of IT Act 2000 deals with the punishment for cheating by impersonation by using computer resources?


  1. Section 66D
  2. Section 66C
  3. Section 67F
  4. Section 67D
  

Question 23 :
The ____ is a set of security standards formed in 2004 by Visa, MasterCard, Discover Financial Services, JCB International and American Express.


  1. Payment Card Industry Data Security Standard (PCI DSS)
  2. Payment Card Institute Data Security Standard (PCI DSS)
  3. Payment Card Information - Data Security Standard (PCI DSS)
  4. Payment Card Industry Double Security Standard (PCI DSS)
  

Question 24 :
The crossing of cyber boundaries into other people’s computer systems into spaces where rights of ownership or title have already been established and causing damage is called ______


  1. Cyber violence
  2. Cyber deceptions
  3. Cyber tresspass
  4. Cyber threat
  

Question 25 :
What is the punishment for identity theft in IT Act?


  1. Two year imprisonment or 1 lakh rupees penalty or both
  2. Three year imprisonment or 1 lakh rupees penalty or both
  3. Three year imprisonment or 2 lakh rupees penalty or both
  4. One year imprisonment
  
Pages