Cyber Laws and Security homework Help at TutorEye
Flower

Are you a university or school looking for an online tutoring partnership ? Talk to Us

Cyber Laws and Security: 

 

Cyber Security can be defined as procedures and technologies used for safeguarding the computers, networks, data from unauthorised access and attacks done through the internet by cyber criminals. 

 

Cyber Laws and Security Sample Questions:

 

 

Question 1: How many types of Cyber Crimes are there?

 

A) 2

B) 3

C) 4

D) None of these

 

Answer: 2

Explanation: Peer to peer attack: attacker targets victim
Computer as weapon: computers are used for mass attacks

 

Get the full solution!

 

 

Question 2: Which of the following is not a peer to peer cyber crime type?

 

A) Injecting trojan to a victim

B) Phishing

C) Leaking details of credit card on dark web

D) None of these


Answer: Leaking details of credit card on dark web

Explanation: Injecting trojan to a victim: peer to peer cyber crime
Phishing: peer to peer cyber crime
Leaking details of credit card on dark web: computer as weapon

 

 

Get the full solution!

 

 

Question 3: In order to attack the database of a website which injecting attack can be used?

 

A) SQL Injection

B) HTML Injection 

C) Malicious code Injection

D) All of these


Answer: SQL Injection

Explanation: SQL Injection allows the hacker to access the database of a website by running malicious code.

 

Get the full solution!


 

Question 4: Which of the following attacks can be deployed using the website's comment section by infusing malicious code?

 

A) SQL Injection 

B) Cross Site Scripting

C) Both of these

D) None of these 


Answer: Cross Site Scripting

Explanation: Cross Site Scripting (also known as XSS) can be deployed using the website's comment section by infusing malicious code.

 

 

Get the full solution!


 

Question 5: Stuxnet is?

 

A) Virus

B) Worm

C) Trojan

D) None of these

 

Answer: Worm

Explanation: Stuxnet is a worm. It came into existence in 2010 and caused a huge damage to Iran’s Nuclear Program. Programmable Logic Controllers are its main targets.

 

 

Get the full solution!


 

Question 6: EDR stands for?

 

A) Endpoint Detection and Response

B) Endpoint Detection and Recovery

C) Early Detection and Recovery 

D) None of these


Answer: Endpoint Detection and Response

Explanation: It is a collection tools that are used to monitor network, record the activity on the network. Moreover it reports detection and analysis to a central database. 

 

 

Get the full solution!


 

Question 7: Which of the following is used for data encryption at the network layer?

 

A) SMTP

B) IPSec

C) S/MIME

D) None of these

 

Answer: IPSec

Explanation: Secured Internet Protocol secures data at network layer using the following protocols:
Authentication Header
Internet Key Exchange
Encapsulating Secure Payload

 

Get the full solution!


 

Question 8: PCT stands for?

 

A) Private Communication Technology

B) Private Communication Technique

C) Public Communication Technology

D) Personal Communication Technique

 

Answer: Private Communication Technology

Explanation: Private Communication Technology is very much similar to SSL (Secured Socket Layer) just the difference being it has a smaller message. It supports various encryption algorithms including RSA, DES, etc.

 

 

Get the full solution!

 


Question 9: SSL is used for which purpose?

 

A) Integrity and Privacy

B) Integrity and Authenticity

C) Non Repudiation and Integrity

D) None of these


Answer: Integrity and Authenticity

Explanation: Primary focus of SSL is on Integrity. Moreover it provides authenticity which helps users to have a secure communication over the internet.

 

Get the full solution!


 

Question 10: VPN uses which type of the following protocols?

 

A) Network Level Protocols

B) Application Level Protocols

C) Tunneling Protocols

D) None of these

 

Answer: Application Level Protocols

Explanation: VPN uses encryption techniques in order to maintain privacy and security and tunneling protocols, which works on Application Level.

 

 

Get the full solution!

 

 

Computer Science Question Answers Pages


 

We Are Different from Others!

Help with Cyber Laws And Security