CS204 Grand Quiz Solved - Cyber Law Quiz & MCQs With Answer

 

CS204 Midterm Grand Quiz, Cyber Law MCQs and Quiz

A Solution of CS204 Grand Quiz Solved. Cyber Law Online Test and Exams MCQs and Quizzes with Answers. Prepare your CS204 Grand Quiz Midterm Exams.


CS204 SOLVED GRAND QUIZ 

Cyber Law MCQs and Quizzes Answers



1) What scrambles the contents of a file so you can’t read it without having the right decryption key?

Encryption


2) Collecting personal information and effectively posing as another individual is known as

Identity Theft


3) The right, power, or authority to administer justice by hearing and determining controversies is referred to as?

Jurisdiction



4) The method of hiding ___ in such a way as to hide its substance is called encryption

Palin-text


5) The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation that consisted of sections.

43

6) The 1st Law related to cyber issues 1st introduced in 

2002


7) When Plain text is converted to unreadable format, it is termed as

Cipher Text


8) Which of the following is an example of a cybercrime?

Spam Emails


9) What Floods a website with so many request for service that it slows down or crashes?

Denial-of Service attack


10) Malicious software is known as

Malware


11) A cyber attach in which a minor fraction of priced is added and taken to some other account is called

Forgery


12) The First Cyber regulation was evolved in the year 

1966


13) Jurisdiction over cases arising in or involving persons residing within a defined territory refers to 

Territorial Jurisdiction


14) All of these are suggestion for safe computing EXCEPT

Open all e-mail messages but open slowly


15) What is the fine of the “Cyber Spamming” Offense according to Electronic Crime Bill 2007?

50,000


16) Which of the following is a goal that courts try to achieve?

All of the Given Options


17) ___ is defined as any crime completed through the use of computer technology

Computer Crime


18) Cyber Culture Language is 

No specific Language


19) According to Electronic Crime Bill 2007 what is the imprisonment of “Unauthorized access to code” Offense ?

3 Years


20) ___ are the building blocks of the website.

Web pages


21) In the dimensions are physical in nature and all transactions are Performed off-line?

Traditional Commerce


22) According to Electronic Crime Bill 2007 what is the imprisonment of “Criminal Access” Offense?

3 Years


23) How many sections are included in Electronic Transactions Ordinance 2002?

43

24) What is the most common tool used to restrict access to a computer system?

Passwords


25) Virus can reach to your computer in which way?

All of the above


26) What is the fine of “Defamation” Offence According to Electronic Crime Bill 2007?

5 Lac


27) ___ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice versa.

Cryptography


28) Members of Majlis-e-Shura in Shariah Appellate bench of supreme court of Pakistan works under?

Supreme Court


29) In ___ the dimensions are digital in nature and all transactions are performed on-line

Pure E-commerce


30) Internet is Owned by

No Body owns internet


31) The term “Cyber Law” Refers to all the legal and regulatory aspects of ___ the and its ___

Internet, users


32) Who breaks into other people’s computer systems and steals and destroy information?

Hackers


33) Public key cryptography is also known as Cryptography?

Asymmetric


34) What is “I” stands in CIA triad?

Integrity


35) What is short for malicious software (is a software designed to disrupt computer operations, gather sensitive information, or gain unauthorized access to computer systems)?

Malware


36) The 1st l law related to digital transaction in Pakistan was introduced in ___

2002


37) Firewalls are used to protect against ___

Unauthorized Access


38) Model Law on E-Commerce and E-Signatures were evolved in ___.

1996


39) The network formed by the co-operative interconnection of a large number of computers networks is called ___

Internet


40) Amazon.com comes under the following model?

B2C


41) The imprisonment under section for violation of privacy information is ___ with fine of ___.

7 years. 1 million


42) Each electronic document on the web is called a ___

Web Page


43) What is hardware and/or software that protects computers from intruders?

Firewall


44) ___ is a discussion or informational site published on the World Wide Web consisting of discrete entries typically, runs by an individual or a small group

Blog


45) What is the process of making a copy of the information stored on a computer?

Backup


46) In a hybrid approach ___ key is used to decrypt session key and ___ key to decrypt ciphertext

Private, Session


47) There are _ types of Jurisdictions

3


48) Gains or attempts to gain access to any information system with or without any purpose comes under ____.

Violation of Privacy information


49) Which type of e-commerce focusses on consumers dealing with each other?

C2C

50) What is the fine of “Cyber Terrorism” Offense According to Electronic Crime Bill 2007?

10 million


51) Process of buying, selling or exchanging products, services and information through computer networks is called

E-commerce


52) E-commerce is not suitable for

Online Job Searching


53) An e-business that allows consumers to name their own price for product and service is following which e-commerce model

C2B


54) Most individuals are familiar with which form of ecommerce ?

B2C


55) Which Process can Prevent data from lose due to computer problems or human errors?

Backup


56) The ability of a court to exercise power beyond its territorial limits refers to ___ Jurisdiction.

Extra Territorial Jurisdiction


57) The practice of forging a return address on an e-mail, so that the recipient is fooled into revealing private information is termed as?

Spoofing


58) What software detects and removes computer viruses

Antivirus


59) In internet terminology IP means

Internet Protocol


60) When a customer of a website are unable to access it due to bombardment of fake traffic, it is known as

Denial of Service Attack


61) Security Procedure can

Reduce but not eliminate risks


62) How Many Issues are covered In Electronic Crime Bill 2007?

21


63) A tense situation between and/or among nation-states and/or organized groups where unwelcome cyber-attacks may result in retaliation termed as

Cyber Dispute


64) Territorial Jurisdiction Refers to Jurisdiction over cases arising in or involving persons residing within a ___.

defined territory


65) In ___ both ends must agree upon a single shared key for encryption and decryption of messages and keep the key secret between them

Symmetric Encryption


66) The first Cyber regulation in Pakistan was ___.

Electronic Transaction Ordinance


67) What is “A” Stands for in CIA triad?

Availability


68) What is “C” Stands for in CIA triad?

Confidentiality


69) Who Protects system from external threats?

Firewall


70) All the legal and regulatory aspects of the Internet and its user are defined in the term

Cyber Law


71) A website is being accessed by referencing a that identifies the site

Uniform resource locator (URL)


72) Cipher technique uses “shift by 3 “rule in encrypting the plain text.

Caesar Cipher



For More Help suggestion or orrection comment below

We Most Welcome your Suggestion 

Post a Comment

1 Comments