Practice Test | Kullabs.com
0%
  • Virtual space created by computers networks , internet and telecommunication is called________.

    digital Signature
    cyber Crime
    cyber law
    cyber Space
  • When was cyber law established in Nepal?

    30th Chaitra, 2060 B.S
    30th Bhadra, 2060 B.S
    30th Bhadra , 2061 B.S
    30th Chaitra, 2061 B.S
  • Which of the following does not fall under areas of cyber law?

    Telecommunication Law
    Data Protection
    Data Management
    Digital Signature
  • A __________ is the digital identity of the sender that uniquely identifies the particular sender electronically.

    computer crime
    digital signature
    hacking
    cyber space
  • Which of the following statement is correct for cracker?

    A cracker is a computer user who attempts a break into copyright software or an information system .
    A cracker is internationally gaining unauthorized access to an important system.
    A cracker is virtual space created by computers networks , internet and telecommunication
    A cracker is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc .
  • A generic term that is concern with the legal and regulatory aspect of internet and computer technology is called ______.

    Computer crime
    Cyber crime
    Copyright law
    Cyber law
  • Cyber law encompasses laws relating to _______.

    Telecommunication law
    All of them
    Cyber crime law
    Digital signature law
  • A criminal activity within the information technology infrastructure is ______.

    cyber crime
    digital crime
    cyber law
    intellectual infrastructure
  • The term computer crime refers to _______.

    plagiarism
    hacking
    information theft
    all of them
  • Cyber law of Nepal was enacted in Nepal in _____.

    2061
    2064
    2062
    2063
  • The common name for the crime of stealing password is:

    identity theft
    spoofing
    spooling
    hacking
  • Collecting personal information and effectively posing as another individual is known:

    identity theft
    spoofing
    spooling
    hacking
  • The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium is:

    None of them
    Telecommunication law
    Digital signature law
    Intellectual property law
  • Creating strong computer security to prevent computer crime is :

    privacy rights
    personal ethics
    firewall policy
    antivirus policy
  • Most common tool used to prevent access to a computer system is :

    access control software
    user login
    password
    computer keys
  • Hardware /software designed to guard against unauthorized access to a computer network is known as:

    anti hacker server
    hacker wall
    hacker programs
    firewall
  • Monitoring and implementation of cyber act in Nepal is done by:

    HLCIT
    Ministry of technology
    NITC
    OCCA
  • __________is the moral principal that regulates the use of computers.

    Cyber act
    Cyber crime
    Cyber crime law
    Cyber ethics
  • Property right given for computer software sources code is known as:

    intellectual property act
    cyber act
    digital signature act
    copyright act
  • Fraud that involves copying another persons intellectual property and presenting it as if it is your own ___________.

    all of them
    hacking
    information theft
    plagiarism
  • You scored /20


    Take test again