CS204 SOLVED GRAND QUIZ
Cyber Law MCQs and Quizzes Answers
1) What scrambles the contents of a file so you can’t read it without having the right decryption key?
Encryption
2) Collecting personal information and effectively posing as another individual is known as
Identity Theft
3) The right, power, or authority to administer justice by hearing and determining controversies is referred to as?
Jurisdiction
4) The method of hiding ___ in such a way as to hide its substance is called encryption
Palin-text
5) The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation that consisted of sections.
43
6) The 1st Law related to cyber issues 1st introduced in
2002
7) When Plain text is converted to unreadable format, it is termed as
Cipher Text
8) Which of the following is an example of a cybercrime?
Spam Emails
9) What Floods a website with so many request for service that it slows down or crashes?
Denial-of Service attack
10) Malicious software is known as
Malware
11) A cyber attach in which a minor fraction of priced is added and taken to some other account is called
Forgery
12) The First Cyber regulation was evolved in the year
1966
13) Jurisdiction over cases arising in or involving persons residing within a defined territory refers to
Territorial Jurisdiction
14) All of these are suggestion for safe computing EXCEPT
Open all e-mail messages but open slowly
15) What is the fine of the “Cyber Spamming” Offense according to Electronic Crime Bill 2007?
50,000
16) Which of the following is a goal that courts try to achieve?
All of the Given Options
17) ___ is defined as any crime completed through the use of computer technology
Computer Crime
18) Cyber Culture Language is
No specific Language
19) According to Electronic Crime Bill 2007 what is the imprisonment of “Unauthorized access to code” Offense ?
3 Years
20) ___ are the building blocks of the website.
Web pages
21) In the dimensions are physical in nature and all transactions are Performed off-line?
Traditional Commerce
22) According to Electronic Crime Bill 2007 what is the imprisonment of “Criminal Access” Offense?
3 Years
23) How many sections are included in Electronic Transactions Ordinance 2002?
43
24) What is the most common tool used to restrict access to a computer system?
Passwords
25) Virus can reach to your computer in which way?
All of the above
26) What is the fine of “Defamation” Offence According to Electronic Crime Bill 2007?
5 Lac
27) ___ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice versa.
Cryptography
28) Members of Majlis-e-Shura in Shariah Appellate bench of supreme court of Pakistan works under?
Supreme Court
29) In ___ the dimensions are digital in nature and all transactions are performed on-line
Pure E-commerce
30) Internet is Owned by
No Body owns internet
31) The term “Cyber Law” Refers to all the legal and regulatory aspects of ___ the and its ___
Internet, users
32) Who breaks into other people’s computer systems and steals and destroy information?
Hackers
33) Public key cryptography is also known as Cryptography?
Asymmetric
34) What is “I” stands in CIA triad?
Integrity
35) What is short for malicious software (is a software designed to disrupt computer operations, gather sensitive information, or gain unauthorized access to computer systems)?
Malware
36) The 1st l law related to digital transaction in Pakistan was introduced in ___
2002
37) Firewalls are used to protect against ___
Unauthorized Access
38) Model Law on E-Commerce and E-Signatures were evolved in ___.
1996
39) The network formed by the co-operative interconnection of a large number of computers networks is called ___
Internet
40) Amazon.com comes under the following model?
B2C
41) The imprisonment under section for violation of privacy information is ___ with fine of ___.
7 years. 1 million
42) Each electronic document on the web is called a ___
Web Page
43) What is hardware and/or software that protects computers from intruders?
Firewall
44) ___ is a discussion or informational site published on the World Wide Web consisting of discrete entries typically, runs by an individual or a small group
Blog
45) What is the process of making a copy of the information stored on a computer?
Backup
46) In a hybrid approach ___ key is used to decrypt session key and ___ key to decrypt ciphertext
Private, Session
47) There are _ types of Jurisdictions
3
48) Gains or attempts to gain access to any information system with or without any purpose comes under ____.
Violation of Privacy information
49) Which type of e-commerce focusses on consumers dealing with each other?
C2C
50) What is the fine of “Cyber Terrorism” Offense According to Electronic Crime Bill 2007?
10 million
51) Process of buying, selling or exchanging products, services and information through computer networks is called
E-commerce
52) E-commerce is not suitable for
Online Job Searching
53) An e-business that allows consumers to name their own price for product and service is following which e-commerce model
C2B
54) Most individuals are familiar with which form of e‐commerce ?
B2C
55) Which Process can Prevent data from lose due to computer problems or human errors?
Backup
56) The ability of a court to exercise power beyond its territorial limits refers to ___ Jurisdiction.
Extra Territorial Jurisdiction
57) The practice of forging a return address on an e-mail, so that the recipient is fooled into revealing private information is termed as?
Spoofing
58) What software detects and removes computer viruses
Antivirus
59) In internet terminology IP means
Internet Protocol
60) When a customer of a website are unable to access it due to bombardment of fake traffic, it is known as
Denial of Service Attack
61) Security Procedure can
Reduce but not eliminate risks
62) How Many Issues are covered In Electronic Crime Bill 2007?
21
63) A tense situation between and/or among nation-states and/or organized groups where unwelcome cyber-attacks may result in retaliation termed as
Cyber Dispute
64) Territorial Jurisdiction Refers to Jurisdiction over cases arising in or involving persons residing within a ___.
defined territory
65) In ___ both ends must agree upon a single shared key for encryption and decryption of messages and keep the key secret between them
Symmetric Encryption
66) The first Cyber regulation in Pakistan was ___.
Electronic Transaction Ordinance
67) What is “A” Stands for in CIA triad?
Availability
68) What is “C” Stands for in CIA triad?
Confidentiality
69) Who Protects system from external threats?
Firewall
70) All the legal and regulatory aspects of the Internet and its user are defined in the term
Cyber Law
71) A website is being accessed by referencing a that identifies the site
Uniform resource locator (URL)
72) Cipher technique uses “shift by 3 “rule in encrypting the plain text.
Caesar Cipher
For More Help suggestion or orrection comment below
We Most Welcome your Suggestion
1 Comments
excilent
ReplyDelete