Cyber Law and Ethics MCQ with Answers are specially prepared by our LiveMCQs Team. This MCQ on Cyber Law is very helpful to your upcoming exams. Cyber Law MCQ Questions give you a basic idea about Cyber Law and Ethics. These Cyber Law MCQ with Answers are absolutely free for you. You can download these questions by clicking Cyber Law MCQ with Answers PDF provides below. We also have the list of Best Selling Books on Cyber Law and Ethics. You can check and Buy these in very Cheap Prices NOW!
Cyber Law and Ethics MCQ with Answers PDF Check Below
1. Ping sweep is also known as ________________
(A) ICMP Sweep
(B) ICMP Call
(C) IGMP Sweep
(D) ICMP pinging
Answer: ICMP Sweep
2. If any given address is running live, it will return an ICMP ECHO reply.
(A) True
(B) False
Answer: True
3. __________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.
(A) Network
(B) Port
(C) Vulnerability
(D) System
Answer: Port
4. ____________ scanning is a procedure to identify active hosts on your network.
(A) Network
(B) Port
(C) Vulnerability
(D) System
Answer: Network
5. _____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.
(A) Network
(B) Port
(C) Vulnerability
(D) System
Answer: Vulnerability
6. Which of them is not a standard scanning type or terminology?
(A) Network
(B) Port
(C) Vulnerability
(D) System
Answer: System
7. In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication.
(A) IP address, protocol
(B) MAC address, protocol
(C) IP address, IMEI number
(D) MAC address, network model
Answer: IP address, protocol
8. ________________ is a tool which uses traceroute-like techniques for analyzing IP packet responses.
(A) Firewalk
(B) Firesweep
(C) PingSweeper
(D) ICMPwalker
Answer: Firewalk
9. _____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants.
(A) Click-hacking
(B) Click-fraud
(C) Clickjacking
(D) Using torrent links
Answer: Clickjacking
10. Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.
(A) information
(B) papers
(C) hardcopy files
(D) media files
Answer: information
11. Which of the following is not a proper aspect of user integration?
(A) Employee’s authentication
(B) Physical authorization
(C) Access control
(D) Representing users in the database
Answer: Physical authorization
12. It is important to limit ____________ to all data and information as well as limit the authority for installing software.
(A) work-load
(B) employee access
(C) admin permission
(D) installing unwanted apps
Answer: employee access
13. One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________
(A) strangers, keyloggers
(B) strangers, antivirus
(C) unknown, firewalls
(D) unknown, antivirus
Answer: strangers, keyloggers
14. If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.
(A) True
(B) False
Answer: False
15. The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.
(A) TCP/IP
(B) Cloud
(C) OSI
(D) OIS
Answer: OSI
16. The full form of OSI is OSI model is ______________
(A) Open Systems Interconnection
(B) Open Software Interconnection
(D) Open Systems Internet
E Open Software Internet
Answer: Open Systems Interconnection
17. Which of the following is not physical layer vulnerability?
(A) Physical theft of data & hardware
(B) Physical damage or destruction of data & hardware
(C) Unauthorized network access
(D) Keystroke & Other Input Logging
Answer: Unauthorized network access
18. It is very important to block unknown, strange and ______________ within the corporate network.
(A) infected sites
(B) programs
(C) unwanted files
(D) important folders
Answer: infected sites
19. Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done.
(A) True
(B) False
Answer: True
20. Use of _______________ can bring external files and worms and virus along with it to the internal systems.
(A) smart-watch
(B) pen drive
(C) laptop
(D) iPod
Answer: pen drive
21. A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.
(A) MiTM
(B) Browser hacking
(C) Browser Hijacker
(D) Cookie-stealing
Answer: Browser Hijacker
22. ________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.
(A) Spyware
(B) Ransomware
(C) Adware
(D) Shareware
Answer: Ransomware
23. ________________ important and precious file is a solution to prevent your files from ransomware.
(A) Deleting all
(B) Keeping backup of
(C) Not saving
(D) Keeping in pen
Answer: Keeping backup of
24. ___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.
(A) algorithm-licensing
(B) code-licensing
(C) item licensing
(D) product licensing
Answer: product licensing
25. Which of the following do not comes under security measures for cloud in firms?
(A) Firewall
(B) Antivirus
(C) Load Balancer
(D) Encryption
Answer: Antivirus
26. In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.
(A) physical
(B) data-link
(C) network
(D) application
Answer: physical
27. Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
(A) 2 years
(B) 3 years
(C) 4 years
(D) 5 years
Answer: 3 years
28. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
(A) section 65
(B) section 66
(C) section 71
(D) section 72
Answer: section 72
29. Sending offensive message to someone comes under _____________ of the Indian IT Act ______
(A) section 66-A, 2000
(B) section 66-B, 2008
(C) section 67, 2000
(D) section 66-A, 2008
Answer: section 66-A, 2008
30. Stealing of digital files comes under __________ of the Indian IT Act.
(A) section 66-A
(B) section 66-B
(C) section 66-C
(D) section 66-D
Answer: section 66-C
31. Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.
(A) True
(B) False
Answer: True
32. Which of the following attach is not used by LC4 to recover Windows password?
(A) Brute-force attack
(B) Dictionary attack
(C) MiTM attack
(D) Hybrid attacks
Answer: MiTM attack
33. ____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.
(A) Wireshark
(B) Nessus
(C) Snort
(D) WebInspect
Answer: Nessus
34. Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
(A) True
(B) False
Answer: True
35. Which of the following is not a vulnerability of the data-link layer?
(A) MAC Address Spoofing
(B) VLAN circumvention
(C) Switches may be forced for flooding traffic to all VLAN ports
(D) Overloading of transport-layer mechanisms
Answer: Overloading of transport-layer mechanisms
36. Competitive Intelligence gathering is both a ___________ and a ____________
(A) process, product
(B) process, item
(C) product & data to sell to 3rd party
(D) data to sell to a 3rd party and a product
Answer: process, product
37. There are _______ types of scanning.
(A) 1
(B) 2
(C) 3
(D) 4
Answer: 3
38. Which of the following is not an objective of scanning?
(A) Detection of the live system running on network
(B) Discovering the IP address of the target system
(C) Discovering the services running on target system
(D) Detection of spyware in a system
Answer: Detection of spyware in a system
39. For discovering the OS running on the target system, the scanning has a specific term. What is it?
(A) Footprinting
(B) 3D Printing
(C) Fingerprinting
(D) screen-printing
Answer: Fingerprinting
40. Which of them is not a scanning methodology?
(A) Check for live systems
(B) Check for open ports
(C) Identifying the malware in the system
(D) Identifying of services
Answer: Identifying the malware in the system
41. ICMP scanning is used to scan _______________
(A) open systems
(B) live systems
(C) malfunctioned systems
(D) broken systems
Answer: live systems
42. In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.
(A) True
(B) False
Answer: True
43. ________ attribute is used to tweak the ping timeout value.
(A) -time
(B) -t
(C) -p
(D) -tout
Answer:-t
44. Which of them do not comes under NETBIOS information?
(A) Name of the system / PC
(B) Workgroup name
(C) MAC address
(D) RAM space
Answer: t.tests ()
45. A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.
(A) scan sweep
(B) ping sweep
(C) scan ping
(D) host ping
Answer: ping sweep
46. In port scanning, a _________ is always associated with an IP address (usually of the host system) & the type of protocol (UDP or TCP) employed for communication.
(A) address
(B) port
(C) system
(D) network
Answer: port
47. Firewalk tool employs a technique to determine the ___________ rules in place on the ___________ forwarding device.
(A) filter, packet
(B) filter, port
(C) routing, packet
(D) routing, port
Answer: filter, packet
48. Firewalk works by sending ________ & ________ packets.
(A) UDP, HTTP
(B) TCP, HTTP
(C) ICMP, TCP
(D) UDP, TCP
Answer: UDP, TCP
49. Using 3-way handshake, it is possible to check for open ports.
(A) True
(B) False
Answer: True
50. Which of them is not a standard flag used in TCP communication between client and server?
(A) Synchronize
(B) Acknowledgment
(C) Finish
(D) Start
Answer: Start
51. How many standard flags are used in TCP communication?
(A) 4
(B) 5
(C) 6
(D) 7
Answer: 7
52. Which of the following is not a valid scanning method?
(A) Xmas Tree scan
(B) SYN Stealth scan
(C) Null Scan
(D) Cloud scan
Answer: Cloud scan
53. ___________ is a command-line TCP/IP packet assembler and analyzer tool.
(A) IGMP Ping
(B) Hping2
(C) Nmap
(D) Maltego
Answer: Hping2
54. Which of the following is not a feature of Hping2 tool?
(A) Firewall testing
(B) Port scanning
(C) Network testing
(D) Server malware scanning
Answer: Server malware scanning
55. _________________ is quite an esoteric process for preventing session creation through a particular port.
(A) Port knocking
(B) Port cracking
(C) Port hacking
(D) Port-jacking
Answer: Port knocking
56. Which one of them is not a network scanner?
(A) NMAP
(B) Qualys
(C) SoftPerfect
(D) Netcat
Answer: Netcat
57. Which of them is not a port scanning tool?
(A) Netcat
(B) Unicornscan
(C) Maltego
(D) Angry IP Scanner
Answer: Maltego
58. Which of them is not a vulnerability scanning tool?
(A) Nexpose
(B) Nessus Professional
(C) Snort
(D) Nikto Web scanner
Answer: Snort
59. There are _______ major ways of stealing email information.
(A) 2
(B) 3
(C) 4
(D) 5
Answer: 3
60. Which of them is not a major way of stealing email information?
(A) Stealing cookies
(B) Reverse Engineering
(C) Password Phishing
(D) Social Engineering
Answer: Reverse Engineering
61. ____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
(A) Email security
(B) Email hacking
(C) Email protection
(D) Email safeguarding
Answer: Email security
62. _____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.
(A) Cloud
(B) Pen drive
(C) Website
(D) Email
Answer: Email
63. Which of them is not a proper method for email security?
(A) Use Strong password
(B) Use email Encryption
(C) Spam filters and malware scanners
(D) Click on unknown links to explore
Answer: Click on unknown links to explore
64. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
(A) True
(B) False
Answer: True
65. The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.
(A) attackers, malware
(B) hackers, antivirus
(C) penetration testers, malware
(D) penetration testers, virus
Answer: attackers, malware
66. If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
(A) memory
(B) quarantine
(C) cookies
(D) hard drive
Answer: cookies
67. Which of the following is a non-technical type of intrusion or attack technique?
(A) Reverse Engineering
(B) Malware Analysis
(C) Social Engineering
(D) Malware Writing
Answer: Social Engineering
68. How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?
(A) 1 year
(B) 2 years
(C) 3 years
(D) 4 years
Answer: 3 years
69. Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.
(A) Section 66
(B) Section 67
(C) Section 68
(D) Section 69
Answer: Section 67
70. IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.
(A) section 67-A
(B) section 67-B
(C) section 67-C
(D) section 67-D
Answer: section 67-A
71. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
(A) 2
(B) 3
(C) 4
(D) 5
Answer: 5
72. Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
(A) Section 66
(B) Section 67
(C) Section 68
(D) Section 69
Answer: Section 67
73. Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
(A) True
(B) False
Answer: True
74. _____________ is a tool which can detect registry issues in an operating system.
(A) Network Stumbler
(B) Ettercap
(C) Maltego
(D) LANguard Network Security Scanner
Answer: LANguard Network Security Scanner
75. Network Stumbler is a Windows Wi-Fi monitoring tool.
(A) True
(B) False
Answer: True
76. ToneLoc is abbreviated as __________
(A) Tone Locking
(B) Tone Locator
(C) Tone Locker
(D) Tune Locator
Answer: Tone Locker
77. __________ is a debugger and exploration tool.
(A) Netdog
(B) Netcat
(C) Tcpdump
(D) BackTrack
Answer: Netcat
78. __________ is a popular command-line packet analyser.
(A) Wireshark
(B) Snort
(C) Metasploit
(D) Tcpdump
Answer: Tcpdump
79. ________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.
(A) EventLog Analyser
(B) NordVPN
(C) Wireshark
(D) PacketFilter Analyzer
Answer: EventLog Analyser
80. ____________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes.
(A) Outlook
(B) Nessus
(C) Mailbox Exchange Recovery
(D) Mail Exchange Recovery toolkit
Answer: Mailbox Exchange Recovery
81. ____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
(A) VLAN attack
(B) VLAN Circumvention
(C) VLAN compromisation method
(D) Data-link evading
Answer: VLAN Circumvention
82. ________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
(A) Switches
(B) Routers
(C) Hubs
(D) Repeaters
Answer: Switches
83. Which of the following is not a vulnerability of the network layer?
(A) Route spoofing
(B) Identity & Resource ID Vulnerability
(C) IP Address Spoofing
(D) Weak or non-existent authentication
Answer: Weak or non-existent authentication
84. Which of the following is an example of physical layer vulnerability?
(A) MAC Address Spoofing
(B) Physical Theft of Data
(C) Route spoofing
(D) Weak or non-existent authentication
Answer: Physical Theft of Data
85. Which of the following is an example of data-link layer vulnerability?
(A) MAC Address Spoofing
(B) Physical Theft of Data
(C) Route spoofing
(D) Weak or non-existent authentication
Answer: MAC Address Spoofing
86. Which of the following is an example of network layer vulnerability?
(A) MAC Address Spoofing
(B) Physical Theft of Data
(C) Route spoofing
(D) Weak or non-existent authentication
Answer: Route spoofing
87. Which of the following is an example of physical layer vulnerability?
(A) MAC Address Spoofing
(B) Route spoofing
(C) Weak or non-existent authentication
(D) Keystroke & Other Input Logging
Answer: Keystroke & Other Input Logging
88. Which of the following is an example of data-link layer vulnerability?
(A) Physical Theft of Data
(B) VLAN circumvention
(C) Route spoofing
(D) Weak or non-existent authentication
Answer: VLAN circumvention
89. Which of the following is not a transport layer vulnerability?
(A) Mishandling of undefined, poorly defined
(B) The Vulnerability that allows “fingerprinting” & other enumeration of host information
(C) Overloading of transport-layer mechanisms
(D) Unauthorized network access
Answer: Unauthorized network access
90. Which of the following is not session layer vulnerability?
(A) Mishandling of undefined, poorly defined
(B) Spoofing and hijacking of data based on failed authentication attempts
(C) Passing of session-credentials allowing intercept and unauthorized use
(D) Weak or non-existent authentication mechanisms
Answer: Mishandling of undefined, poorly defined
91. Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?
(A) Physical layer
(B) Data-link Layer
(C) Session layer
(D) Presentation layer
Answer: Session layer
92. Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
(A) True
(B) False
Answer: True
93. Which of the following is not an example of presentation layer issues?
(A) Poor handling of unexpected input can lead to the execution of arbitrary instructions
(B) Unintentional or ill-directed use of superficially supplied input
(C) Cryptographic flaws in the system may get exploited to evade privacy
(D) Weak or non-existent authentication mechanisms
Answer: Weak or non-existent authentication mechanisms
94. Which of the following is not a vulnerability of the application layer?
(A) Application design bugs may bypass security controls
(B) Inadequate security controls force “all-or-nothing” approach
(C) Logical bugs in programs may be by chance or on purpose be used for crashing programs
(D) Overloading of transport-layer mechanisms
Answer: Overloading of transport-layer mechanisms
95. Which of the following is an example of Transport layer vulnerability?
(A) weak or non-existent mechanisms for authentication
(B) overloading of transport-layer mechanisms
(C) poor handling of unexpected input
(D) highly complex application security controls
Answer: overloading of transport-layer mechanisms
96. Which of the following is an example of session layer vulnerability?
(A) weak or non-existent mechanisms for authentication
(B) overloading of transport-layer mechanisms
(C) poor handling of unexpected input
(D) highly complex application security controls
Answer: weak or non-existent mechanisms for authentication
97. Which of the following is an example of presentation layer vulnerability?
(A) weak or non-existent mechanisms for authentication
(B) overloading of transport-layer mechanisms
(C) highly complex application security controls
(D) poor handling of unexpected input
Answer: poor handling of unexpected input
98. Which of the following is an example of application layer vulnerability?
(A) Cryptographic flaws lead to the privacy issue
(B) Very complex application security controls
(C) MAC Address Spoofing
(D) Weak or non-existent authentication
Answer: Very complex application security controls
Computer Science Multiple Choice Questions(MCQs)& Answers
99. TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.
(A) True
(B) False
Answer: True
100. Which of them is an example of physical data leakage?
(A) Dumpster diving
(B) MiTM
(C) DDoS
(D) Phishing
Answer: Dumpster diving
Download the PDF (Cyber Law and Ethics MCQ)