Cyber Law and Ethics MCQ with Answers

Cyber Law and Ethics MCQ with Answers are specially prepared by our LiveMCQs Team. This MCQ on Cyber Law is very helpful to your upcoming exams. Cyber Law MCQ Questions give you a basic idea about Cyber Law and Ethics. These Cyber Law MCQ with Answers are absolutely free for you. You can download these questions by clicking Cyber Law MCQ with Answers PDF provides below. We also have the list of Best Selling Books on Cyber Law and Ethics. You can check and Buy these in very Cheap Prices NOW!

Cyber Law and Ethics MCQ with Answers PDF Check Below

1. Ping sweep is also known as ________________

(A) ICMP Sweep

(B) ICMP Call

(C) IGMP Sweep

(D) ICMP pinging

Answer: ICMP Sweep

2. If any given address is running live, it will return an ICMP ECHO reply.

(A) True

(B) False

Answer: True

3. __________ scanning is done when a series of messages are sent by someone keeping in mind to break into a computer.

(A) Network

(B) Port

(C) Vulnerability

(D) System

Answer: Port

4. ____________ scanning is a procedure to identify active hosts on your network.

(A) Network

(B) Port

(C) Vulnerability

(D) System

Answer: Network

5. _____________ scanning is an automatic process for identifying vulnerabilities of the system within a network.

(A) Network

(B) Port

(C) Vulnerability

(D) System

Answer: Vulnerability

6. Which of them is not a standard scanning type or terminology?

(A) Network

(B) Port

(C) Vulnerability

(D) System

Answer: System

7. In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication.

(A) IP address, protocol

(B) MAC address, protocol

(C) IP address, IMEI number

(D) MAC address, network model

Answer: IP address, protocol

8. ________________ is a tool which uses traceroute-like techniques for analyzing IP packet responses.

(A) Firewalk

(B) Firesweep

(C) PingSweeper

(D) ICMPwalker

Answer: Firewalk

9. _____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants.

(A) Click-hacking

(B) Click-fraud

(C) Clickjacking

(D) Using torrent links

Answer: Clickjacking

10. Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.

(A) information

(B) papers

(C) hardcopy files

(D) media files

Answer: information

11. Which of the following is not a proper aspect of user integration?

(A) Employee’s authentication

(B) Physical authorization

(C) Access control

(D) Representing users in the database

Answer: Physical authorization

12. It is important to limit ____________ to all data and information as well as limit the authority for installing software.

(A) work-load

(B) employee access

(C) admin permission

(D) installing unwanted apps

Answer: employee access

13. One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________

(A) strangers, keyloggers

(B) strangers, antivirus

(C) unknown, firewalls

(D) unknown, antivirus

Answer: strangers, keyloggers

14. If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.

(A) True

(B) False

Answer: False

15. The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.

(A) TCP/IP

(B) Cloud

(C) OSI

(D) OIS

Answer: OSI

16. The full form of OSI is OSI model is ______________

(A) Open Systems Interconnection

(B) Open Software Interconnection

(D) Open Systems Internet

E Open Software Internet

Answer: Open Systems Interconnection

17. Which of the following is not physical layer vulnerability?

(A) Physical theft of data & hardware

(B) Physical damage or destruction of data & hardware

(C) Unauthorized network access

(D) Keystroke & Other Input Logging

Answer: Unauthorized network access

18. It is very important to block unknown, strange and ______________ within the corporate network.

(A) infected sites

(B) programs

(C) unwanted files

(D) important folders

Answer: infected sites

19. Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done.

(A) True

(B) False

Answer: True

20. Use of _______________ can bring external files and worms and virus along with it to the internal systems.

(A) smart-watch

(B) pen drive

(C) laptop

(D) iPod

Answer: pen drive

21. A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.

(A) MiTM

(B) Browser hacking

(C) Browser Hijacker

(D) Cookie-stealing

Answer: Browser Hijacker

22. ________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.

(A) Spyware

(B) Ransomware

(C) Adware

(D) Shareware

Answer: Ransomware

23. ________________ important and precious file is a solution to prevent your files from ransomware.

(A) Deleting all

(B) Keeping backup of

(C) Not saving

(D) Keeping in pen

Answer: Keeping backup of

24. ___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.

(A) algorithm-licensing

(B) code-licensing

(C) item licensing

(D) product licensing

Answer: product licensing

25. Which of the following do not comes under security measures for cloud in firms?

(A) Firewall

(B) Antivirus

(C) Load Balancer

(D) Encryption

Answer: Antivirus

26. In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.

(A) physical

(B) data-link

(C) network

(D) application

Answer: physical

27. Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

(A) 2 years

(B) 3 years

(C) 4 years

(D) 5 years

Answer: 3 years

28. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

(A) section 65

(B) section 66

(C) section 71

(D) section 72

Answer: section 72

29. Sending offensive message to someone comes under _____________ of the Indian IT Act ______

(A) section 66-A, 2000

(B) section 66-B, 2008

(C) section 67, 2000

(D) section 66-A, 2008

Answer: section 66-A, 2008

30. Stealing of digital files comes under __________ of the Indian IT Act.

(A) section 66-A

(B) section 66-B

(C) section 66-C

(D) section 66-D

Answer: section 66-C

31. Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.

(A) True

(B) False

Answer: True

32. Which of the following attach is not used by LC4 to recover Windows password?

(A) Brute-force attack

(B) Dictionary attack

(C) MiTM attack

(D) Hybrid attacks

Answer: MiTM attack

33. ____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.

(A) Wireshark

(B) Nessus

(C) Snort

(D) WebInspect

Answer: Nessus

34. Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

(A) True

(B) False

Answer: True

35. Which of the following is not a vulnerability of the data-link layer?

(A) MAC Address Spoofing

(B) VLAN circumvention

(C) Switches may be forced for flooding traffic to all VLAN ports

(D) Overloading of transport-layer mechanisms

Answer: Overloading of transport-layer mechanisms

36. Competitive Intelligence gathering is both a ___________ and a ____________

(A) process, product

(B) process, item

(C) product & data to sell to 3rd party

(D) data to sell to a 3rd party and a product

Answer: process, product

37. There are _______ types of scanning.

(A) 1

(B) 2

(C) 3

(D) 4

Answer: 3

38. Which of the following is not an objective of scanning?

(A) Detection of the live system running on network

(B) Discovering the IP address of the target system

(C) Discovering the services running on target system

(D) Detection of spyware in a system

Answer: Detection of spyware in a system

39. For discovering the OS running on the target system, the scanning has a specific term. What is it?

(A) Footprinting

(B) 3D Printing

(C) Fingerprinting

(D) screen-printing

Answer: Fingerprinting

40. Which of them is not a scanning methodology?

(A) Check for live systems

(B) Check for open ports

(C) Identifying the malware in the system

(D) Identifying of services

Answer: Identifying the malware in the system

41. ICMP scanning is used to scan _______________

(A) open systems

(B) live systems

(C) malfunctioned systems

(D) broken systems

Answer: live systems

42. In live system scanning, it is checked which hosts are up in the network by pinging the systems in the network.

(A) True

(B) False

Answer: True

43. ________ attribute is used to tweak the ping timeout value.

(A) -time

(B) -t

(C) -p

(D) -tout

Answer:-t

44. Which of them do not comes under NETBIOS information?

(A) Name of the system / PC

(B) Workgroup name

(C) MAC address

(D) RAM space

Answer: t.tests ()

45. A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.

(A) scan sweep

(B) ping sweep

(C) scan ping

(D) host ping

Answer: ping sweep

46. In port scanning, a _________ is always associated with an IP address (usually of the host system) & the type of protocol (UDP or TCP) employed for communication.

(A) address

(B) port

(C) system

(D) network

Answer: port

47. Firewalk tool employs a technique to determine the ___________ rules in place on the ___________ forwarding device.

(A) filter, packet

(B) filter, port

(C) routing, packet

(D) routing, port

Answer: filter, packet

48. Firewalk works by sending ________ & ________ packets.

(A) UDP, HTTP

(B) TCP, HTTP

(C) ICMP, TCP

(D) UDP, TCP

Answer: UDP, TCP

49. Using 3-way handshake, it is possible to check for open ports.

(A) True

(B) False

Answer: True

50. Which of them is not a standard flag used in TCP communication between client and server?

(A) Synchronize

(B) Acknowledgment

(C) Finish

(D) Start

Answer: Start

51. How many standard flags are used in TCP communication?

(A) 4

(B) 5

(C) 6

(D) 7

Answer: 7

52. Which of the following is not a valid scanning method?

(A) Xmas Tree scan

(B) SYN Stealth scan

(C) Null Scan

(D) Cloud scan

Answer: Cloud scan

53. ___________ is a command-line TCP/IP packet assembler and analyzer tool.

(A) IGMP Ping

(B) Hping2

(C) Nmap

(D) Maltego

Answer: Hping2

54. Which of the following is not a feature of Hping2 tool?

(A) Firewall testing

(B) Port scanning

(C) Network testing

(D) Server malware scanning

Answer: Server malware scanning

55. _________________ is quite an esoteric process for preventing session creation through a particular port.

(A) Port knocking

(B) Port cracking

(C) Port hacking

(D) Port-jacking

Answer: Port knocking

56. Which one of them is not a network scanner?

(A) NMAP

(B) Qualys

(C) SoftPerfect

(D) Netcat

Answer: Netcat

57. Which of them is not a port scanning tool?

(A) Netcat

(B) Unicornscan

(C) Maltego

(D) Angry IP Scanner

Answer: Maltego

58. Which of them is not a vulnerability scanning tool?

(A) Nexpose

(B) Nessus Professional

(C) Snort

(D) Nikto Web scanner

Answer: Snort

59. There are _______ major ways of stealing email information.

(A) 2

(B) 3

(C) 4

(D) 5

Answer: 3

60. Which of them is not a major way of stealing email information?

(A) Stealing cookies

(B) Reverse Engineering

(C) Password Phishing

(D) Social Engineering

Answer: Reverse Engineering

61. ____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.

(A) Email security

(B) Email hacking

(C) Email protection

(D) Email safeguarding

Answer: Email security

62. _____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.

(A) Cloud

(B) Pen drive

(C) Website

(D) Email

Answer: Email

63. Which of them is not a proper method for email security?

(A) Use Strong password

(B) Use email Encryption

(C) Spam filters and malware scanners

(D) Click on unknown links to explore

Answer: Click on unknown links to explore

64. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.

(A) True

(B) False

Answer: True

65. The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.

(A) attackers, malware

(B) hackers, antivirus

(C) penetration testers, malware

(D) penetration testers, virus

Answer: attackers, malware

66. If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

(A) memory

(B) quarantine

(C) cookies

(D) hard drive

Answer: cookies

67. Which of the following is a non-technical type of intrusion or attack technique?

(A) Reverse Engineering

(B) Malware Analysis

(C) Social Engineering

(D) Malware Writing

Answer: Social Engineering

68. How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

(A) 1 year

(B) 2 years

(C) 3 years

(D) 4 years

Answer: 3 years

69. Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

(A) Section 66

(B) Section 67

(C) Section 68

(D) Section 69

Answer: Section 67

70. IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

(A) section 67-A

(B) section 67-B

(C) section 67-C

(D) section 67-D

Answer: section 67-A

71. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

(A) 2

(B) 3

(C) 4

(D) 5

Answer: 5

72. Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

(A) Section 66

(B) Section 67

(C) Section 68

(D) Section 69

Answer: Section 67

73. Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.

(A) True

(B) False

Answer: True

74. _____________ is a tool which can detect registry issues in an operating system.

(A) Network Stumbler

(B) Ettercap

(C) Maltego

(D) LANguard Network Security Scanner

Answer: LANguard Network Security Scanner

75. Network Stumbler is a Windows Wi-Fi monitoring tool.

(A) True

(B) False

Answer: True

76. ToneLoc is abbreviated as __________

(A) Tone Locking

(B) Tone Locator

(C) Tone Locker

(D) Tune Locator

Answer: Tone Locker

77. __________ is a debugger and exploration tool.

(A) Netdog

(B) Netcat

(C) Tcpdump

(D) BackTrack

Answer: Netcat

78. __________ is a popular command-line packet analyser.

(A) Wireshark

(B) Snort

(C) Metasploit

(D) Tcpdump

Answer: Tcpdump

79. ________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.

(A) EventLog Analyser

(B) NordVPN

(C) Wireshark

(D) PacketFilter Analyzer

Answer: EventLog Analyser

80. ____________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes.

(A) Outlook

(B) Nessus

(C) Mailbox Exchange Recovery

(D) Mail Exchange Recovery toolkit

Answer: Mailbox Exchange Recovery

81. ____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

(A) VLAN attack

(B) VLAN Circumvention

(C) VLAN compromisation method

(D) Data-link evading

Answer: VLAN Circumvention

82. ________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

(A) Switches

(B) Routers

(C) Hubs

(D) Repeaters

Answer: Switches

83. Which of the following is not a vulnerability of the network layer?

(A) Route spoofing

(B) Identity & Resource ID Vulnerability

(C) IP Address Spoofing

(D) Weak or non-existent authentication

Answer: Weak or non-existent authentication

84. Which of the following is an example of physical layer vulnerability?

(A) MAC Address Spoofing

(B) Physical Theft of Data

(C) Route spoofing

(D) Weak or non-existent authentication

Answer: Physical Theft of Data

85. Which of the following is an example of data-link layer vulnerability?

(A) MAC Address Spoofing

(B) Physical Theft of Data

(C) Route spoofing

(D) Weak or non-existent authentication

Answer: MAC Address Spoofing

86. Which of the following is an example of network layer vulnerability?

(A) MAC Address Spoofing

(B) Physical Theft of Data

(C) Route spoofing

(D) Weak or non-existent authentication

Answer: Route spoofing

87. Which of the following is an example of physical layer vulnerability?

(A) MAC Address Spoofing

(B) Route spoofing

(C) Weak or non-existent authentication

(D) Keystroke & Other Input Logging

Answer: Keystroke & Other Input Logging

88. Which of the following is an example of data-link layer vulnerability?

(A) Physical Theft of Data

(B) VLAN circumvention

(C) Route spoofing

(D) Weak or non-existent authentication

Answer: VLAN circumvention

89. Which of the following is not a transport layer vulnerability?

(A) Mishandling of undefined, poorly defined

(B) The Vulnerability that allows “fingerprinting” & other enumeration of host information

(C) Overloading of transport-layer mechanisms

(D) Unauthorized network access

Answer: Unauthorized network access

90. Which of the following is not session layer vulnerability?

(A) Mishandling of undefined, poorly defined

(B) Spoofing and hijacking of data based on failed authentication attempts

(C) Passing of session-credentials allowing intercept and unauthorized use

(D) Weak or non-existent authentication mechanisms

Answer: Mishandling of undefined, poorly defined

91. Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?

(A) Physical layer

(B) Data-link Layer

(C) Session layer

(D) Presentation layer

Answer: Session layer

92. Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.

(A) True

(B) False

Answer: True

93. Which of the following is not an example of presentation layer issues?

(A) Poor handling of unexpected input can lead to the execution of arbitrary instructions

(B) Unintentional or ill-directed use of superficially supplied input

(C) Cryptographic flaws in the system may get exploited to evade privacy

(D) Weak or non-existent authentication mechanisms

Answer: Weak or non-existent authentication mechanisms

94. Which of the following is not a vulnerability of the application layer?

(A) Application design bugs may bypass security controls

(B) Inadequate security controls force “all-or-nothing” approach

(C) Logical bugs in programs may be by chance or on purpose be used for crashing programs

(D) Overloading of transport-layer mechanisms

Answer: Overloading of transport-layer mechanisms

95. Which of the following is an example of Transport layer vulnerability?

(A) weak or non-existent mechanisms for authentication

(B) overloading of transport-layer mechanisms

(C) poor handling of unexpected input

(D) highly complex application security controls

Answer: overloading of transport-layer mechanisms

96. Which of the following is an example of session layer vulnerability?

(A) weak or non-existent mechanisms for authentication

(B) overloading of transport-layer mechanisms

(C) poor handling of unexpected input

(D) highly complex application security controls

Answer: weak or non-existent mechanisms for authentication

97. Which of the following is an example of presentation layer vulnerability?

(A) weak or non-existent mechanisms for authentication

(B) overloading of transport-layer mechanisms

(C) highly complex application security controls

(D) poor handling of unexpected input

Answer: poor handling of unexpected input

98. Which of the following is an example of application layer vulnerability?

(A) Cryptographic flaws lead to the privacy issue

(B) Very complex application security controls

(C) MAC Address Spoofing

(D) Weak or non-existent authentication

Answer: Very complex application security controls

Computer Science Multiple Choice Questions(MCQs)& Answers

99. TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.

(A) True

(B) False

Answer: True

100. Which of them is an example of physical data leakage?

(A) Dumpster diving

(B) MiTM

(C) DDoS

(D) Phishing

Answer: Dumpster diving

Download the PDF (Cyber Law and Ethics MCQ)

Comments