Professional Documents
Culture Documents
Minor Subject Cyber Law MCQ Part 2
Minor Subject Cyber Law MCQ Part 2
Cyber Law MCQ LAW203 for DDU Gorakhpur University 3rd &
In this post, you will get to see the multiple choice questions and answers of Question
2023-24 based on "CYBER LAW" in the examinations to be held under 3rd and
4th semester of Gorakhpur University and its affiliated colleges. By preparing all these
questions you will be able to perform better in the exam!!
This question answer is for all Under Graduate courses like BA, B.Com, B.Sc,BBA &
B.C.A.
1. In which of the following, a person continuously interacts with another person or a group of different people?
Is followed by?
B. Follow
C. bullying
D. Qimargan
One. Kaspersky
C. McAfee
3. ____ May be a hardware device or a software program that provides networking, Internet
Filters all packets of data coming through etc.
One. gyriole
B. antivirus
C. mellier
D. cookies
Machine Translated by Google
4. Which of the following would refer to the pursuit of appropriate, ethical behaviors related to
digital media platforms and online environments?
B. Cyber security
C. cyber crimes
D. cyber cum
5. Which of the following is a technique that is used to verify the integrity of a message?
B. advice
C. DDCIPRN Algorithm
Machine Translated by Google
D. digital signature
one Etterkai p
B. Snort
C. angry ip scanner
C. SYN Stealth
D. tallow scan
B. computer virus
D. antivirus program
C. mellier
D. fire bowl
10. We do networking.
___ Use of transit time and response time to measure
an. Reliability
B. discharge
C. live long
D. Security
One. molested
B. creeper
C. Ray Tommelson
D. to cut
12. The hacker who broke into the SIPRNET system ___ Is.
C. ÿÿÿÿÿ ÿÿÿÿÿÿÿ
D. john draper
13. Which of the following types of text is transformed using only algorithms?
will go?
B. bad lesson
C. Jadtal text
D. Converting text
Machine Translated by Google
14. Which of the following does not clone or replicate itself through malaria type
infection?
One. virus
B. insects
C. Trojan
D. root cut
One. i p
B. url
C. binary
Machine Translated by Google
D. hiatus
16. Which of the following is commonly known as the port number (default) of many web
servers like Apache?
One. 40
B. 20
C. 87
D. 80
Machine Translated by Google
Answer: (D) 80
17. Which of the following is a type of independent binary program that does not
require any host program?
One. virus
B. trap door
Machine Translated by Google
C. worm
D. Trojan Hosg
One. confidentiality
nut. Availability
C. integrity
D. veracity
19. Which of the following is the oldest technique used by hackers to make free calls by hacking phones?
One. Qimargan
Machine Translated by Google
B. horrifying
C. Spraining
D. hoof
One. defcon
B. oscon
C. section
D. Dain