Computer Ethics MCQ Quiz with Answers - 1

Question: 1

_____ is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.

(A) Spam

(B) Scam

(C) Salami slicing

(D) Spoofing

Ans: D

Spoofing

Question: 2

_____ is a collection of various technologies, processes, and measures that reduces the risk of cyber attacks.

(A) Cyber Security

(B) Cyber Crime

(C) Cyber Gateway

(D) None of these

Ans: A

Cyber Security

Question: 3

A _____ is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file.

(A) Cracking

(B) Piracy

(C) Virus

(D) None of these

Ans: C

Virus

Question: 4

______ is a type of software designed through which the criminals gain illegal access to software and cause damage.

(A) Cracking

(B) Piracy

(C) Malware

(D) None of these

Ans: C

Malware

Question: 5

Data should be _____ when transmitted across networks in order to protect against the network traffic by unauthorized users.

(A) Converted

(B) Translated

(C) Encrypted

(D) None of these

Ans: C

Encrypted

Question: 6

_____ is a encryption scheme.

(A) Public key encryption

(B) Symmetric key encryption

(C) Both A and B

(D) None of these

Ans: C

Both A and B

Question: 7

______ encryption is a technique to use the same key for both encryption and decryption.

(A) Public Key

(B) Symmetric Key

(C) Either A and B

(D) None of these

Ans: B

Symmetric Key

Question: 8

Computer systems in general are

(A) Safe

(B) Vulnerable

(C) Secured

(D) None of these

Ans: B

Vulnerable

Question: 9

_____ means stealing practical or conceptual information developed by another person or company.

(A) Intellectual property theft

(B) Harvesting

(C) Identity theft

(D) Fraud

Ans: A

Intellectual property theft

Question: 10

______ is a crime where the criminals impersonate individuals for financial gain.

(A) Intellectual-property theft

(B) Salami slicing

(C) Spoofing

(D) Identity theft

Ans: D

Identity theft