You are on page 1of 14

Machine Translated by Google

Cyber Law MCQ LAW203 for DDU Gorakhpur University 3rd &

In this post, you will get to see the multiple choice questions and answers of Question
2023-24 based on "CYBER LAW" in the examinations to be held under 3rd and

4th semester of Gorakhpur University and its affiliated colleges. By preparing all these
questions you will be able to perform better in the exam!!
This question answer is for all Under Graduate courses like BA, B.Com, B.Sc,BBA &
B.C.A.

Post By :- Ajay Yadav, Abhay Yadav & Sachin Kumar Yadav


(SKY)
Code:- LAW203

1. In which of the following, a person continuously interacts with another person or a group of different people?

Is followed by?

One. identity theft

B. Follow

C. bullying

D. Qimargan

Answer: (B) Pursuing


Machine Translated by Google

2. Which of the following is an antivirus program type?

One. Kaspersky

B. Get well soon

C. McAfee

D. all of the above

Answer: (d) All of the above

3. ____ May be a hardware device or a software program that provides networking, Internet
Filters all packets of data coming through etc.

One. gyriole

B. antivirus

C. mellier

D. cookies
Machine Translated by Google

Answer: (A) thiourea

4. Which of the following would refer to the pursuit of appropriate, ethical behaviors related to
digital media platforms and online environments?

One. Cyber security

B. Cyber security

C. cyber crimes

D. cyber cum

Answer: (c) Cyberattacks

5. Which of the following is a technique that is used to verify the integrity of a message?

One. message collection

B. advice

C. DDCIPRN Algorithm
Machine Translated by Google

D. digital signature

Answer: (a) Message Digest

6. Which of these port and IP address scanners is popular among users?

one Etterkai p

B. Snort

C. angry ip scanner

D. Cain and Abel

Answer: (c) Angry IP Scanner

7. Which of the following is not a scanning type?

One. i.e. scan

B. xmas tree scan


Machine Translated by Google

C. SYN Stealth

D. tallow scan

Answer: (d) Talladega scan

8. Code Red Kind of ___ Is.

One. video editing software

B. computer virus

C. photo editing software

D. antivirus program

Answer: (B) Computer virus

9. Which of the following is also binary arithmetic software?

One. davit software


Machine Translated by Google

B. double digit share

C. mellier

D. fire bowl

Answer: (c) Melliere

10. We do networking.
___ Use of transit time and response time to measure

an. Reliability

B. discharge

C. live long

D. Security

Answer: (B) Pradargan

Follow on Instagram Click Here


Machine Translated by Google

Follow on Whatsapp Click Here


Join Telegram Click Here
Youtube Subscribe Click Here

Pyq Question Answer Click Here

Join Our Team Click Here

Help Us Server 1 / Server 2

11. Which of these is the world's first antivirus program?

One. molested

B. creeper

C. Ray Tommelson

D. to cut

Answer: (D) Reaper


Machine Translated by Google

12. The hacker who broke into the SIPRNET system ___ Is.

One. K Vin Paulsen

B. john john newman

C. ÿÿÿÿÿ ÿÿÿÿÿÿÿ

D. john draper

Answer: (A) K Vin Poulsen

13. Which of the following types of text is transformed using only algorithms?
will go?

One. plain text

B. bad lesson

C. Jadtal text

D. Converting text
Machine Translated by Google

Answer: (a) Plain text

14. Which of the following does not clone or replicate itself through malaria type
infection?

One. virus

B. insects

C. Trojan

D. root cut

Answer: (c) Trojan

15. DNS any domain name ___


Will translate into.

One. i p

B. url

C. binary
Machine Translated by Google

D. hiatus

Answer: (B) URL

16. Which of the following is commonly known as the port number (default) of many web
servers like Apache?

One. 40

B. 20

C. 87

D. 80
Machine Translated by Google

Answer: (D) 80

17. Which of the following is a type of independent binary program that does not
require any host program?

One. virus

B. trap door
Machine Translated by Google

C. worm

D. Trojan Hosg

Answer: (c) Krimmam

18. Which of the following is not included in the CIA Triad?

One. confidentiality

nut. Availability

C. integrity

D. veracity

Answer: (d) authenticity

19. Which of the following is the oldest technique used by hackers to make free calls by hacking phones?

One. Qimargan
Machine Translated by Google

B. horrifying

C. Spraining

D. hoof

Answer: (b) to panic

20. Which of these is the first hacker conference?

One. defcon

B. oscon

C. section

D. Dain

Answer: (A) Defcon

Follow on Instagram Click Here

Follow on Whatsapp Click Here


Machine Translated by Google

Join Telegram Click Here


Youtube Subscribe Click Here

Pyq Question Answer Click Here

Join Our Team Click Here

Help Us Server 1 / Server 2

You might also like