You are on page 1of 2

Subject: Cyber Law and Professional Ethics Full Marks: 60

Code No. CACS 401 Pass Marks: 24


Semester: VII Time: 3 Hours

Group A: Multiple Choice Questions (10×1 = 10)


Write the correct answer:
1. Which of the following is a disadvantage of proprietary software?
a. You need to be an expert to edit code
b. It's often free
c. You have to pay for this type of software
d. You can edit the source code to customize it
2. Which of the following is considered unauthorized access?
a. Hacking financial account
b. Stealing organizational information
c. Illegally monitoring of information and illegal user of login and password of the users
d. All of the above
3. The hackers whose main motive is to gain financial profit by doing cybercrimes are called…
a. White hat hackers
b. Black hat hackers
c. Hacktivists
d. Gray hat hackers
4. Which one is NOT an implementation level of CIA triad?
a. Implementing CIA at the organization level
b. Implementing CIA at the network level
c. Implementing CIA at the application level
d. Implementing CIA at the Vendor level
5. Cyber-loafing is defined as
a. Chatting with coworkers
b. Using internet for purposed unrelated to work
c. Destroying IT asset of a company
d. Spreading fake news online
6. Stuxnet is a …………..
a. Worm
b. Virus
c. Trojan
d. Antivirus
7. What is NOT true for Open-source Software?
a. The source code is publicly available
b. It does not have license
c. It can be used by anyone
d. It is freely available
8. Which of the following refers to stealing one's idea or invention of others and use it for their own
benefits?
a. Piracy
b. Plagiarism
c. Intellectual property rights
d. All of the above
9. When we say that the ABC organization is CMMI level 5 company, we describe its stage by…..
a. Defined
b. Optimized
c. Managed
d. Quantitatively managed
10. The Onshore Software Outsourcing and Offshore Software Outsourcing are the ……… for
software outsourcing?
a. Models
b. Systems
c. Schemes
d. None of the above

Group B: Short Answer Questions (6 × 5 = 30)


Attempt any SIX questions.
1. What do you think are the reasons behind increased usage of pirated software in Nepal?
2. What is phishing? Why is it popular among attackers? What are the measures on should take to
prevent this attack? (1+1+3)
3. Write about business application of social media. What are the ethical issues associated with
social media marketing? (2+3)
4. What is reverse engineering? Why it has taken as an issue of intellectual property? (3+2)
5. Differentiate between Offshoring and Outsourcing.
6. Explain the major provisions of Nepal's cyber law.
7. Write short notes on (Any Two): (2 × 2.5 = 5)
a. John Doe Lawsuits
b. Advanced Persistent Threat (APT)
c. Cybersquatting

Group C: Long Answer Questions (2 × 10 = 20)


Attempt only TWO questions.
1. What do you mean by cyberstalking? Explain how you protect yourself from cyber-stalkers.
Differentiate between cyberstalking and cyberbullying. (2+4+4)
2. Define Intellectual Property. Describe any four types of intellectual properties. (2+8)
3. What is software quality? Elaborate any four strategies that a software developer needs to
implement for developing good quality software. (2+8)

You might also like