Introduction To Cyber Security :Security Laws and Standards - Intellectual Property Rights, Type of IPR

Security Laws and Standards MCQ- Intellectual Property Rights, Type of IPR: Link1

Introduction To Cyber Security-Cryptography MCQ & Answers

       Are you worried about the answers to Introduction To Cyber Security-Security Laws and Standards MCQ- Intellectual Property Rights, Type of IPR questions? We have arranged the Show Answer button under the each question. Candidates can click on it to know the right option among the given alternatives. Furthermore, the applicants can check our web portal @ www.totalmcq.com to take part in more MCQ on various subject. Wish, the given information about the Introduction To Cyber Security MCQ will helpful to the advance and can learn the various types of questions and answers.


Q.1. The collection, storage, and dissemination of information about individuals is included in the ethical category of ----------

A. accuracy                                                    B. privacy
C. accessibility                              D. property

Q.2. A piece of information that allows a Web site to record one’s comings and goings is called---------

A. a browser                                                                B. a cookie
C. a worm                                                          D. a macro virus

Q.3. All of the following are examples of intellectual property protections EXCEPT --------

A. copyrights
B. patents
C. contracts
D. trademarks

Q.4. A copyright gives the owner all of the following rights EXCEPT:--------

A. the right to copy the work.                                                                    B. the right to print the work as a book.
C. the right to publish the work on the Internet.                                                                 D. the right to privacy.

Q.5. A document that grants the holder exclusive rights on an invention for a fixed number of years is------.

A. a trademark                                                      B. a patent
C. a brandmark                                                       D. a copyright

Q.6. A government’s attempt to control the material broadcasted on the Internet is called--------.

A. censorship                                                                  B. privacy infringement
C. free speech                                                                  D. spamming

Q.7. E-commerce is the commercial transaction of services in a/an ----------.

A. mechanical format                                                           B. electronic format
C. paper                                                            D. none of the above

Q.8. ----------- is a generic term which refers to all the legal and regulator aspects of Internet and the World Wide Web

A. Cyber law                                                                      B. Cyber cafe
C. electronic law                                                                 D. Cyber dyne

Q.9.------------is a process of authentication of an electronic record.

A. Digital key                                                                         B. Digital Signature Certificate
C. Analog signature                                                                          D. key certificate

Q.10. In computer security, ----------- means that computer system assets can be modified only by authorized parities.

A. Confidentiality                                                   B. Availability
C. Integrity                                                    D. Authenticity

Q.11. In computer security, ------------- means that the information in a computer system only be accessible for reading by authorized parities.

A. Confidentiality                                                                                     B. Integrity
C. Availability                                                                                     D. Authenticity

Q.12. Which of the following is independent malicious program that need not any host program?

A. Trap doors                                                                           B. Trojan horse
C. Virus                                                      D. Worm

Q.13. Personal computers use number of chips mounted on a main circuit board. What is the common name for such boards?

A. Daughter board                                                                           B. Mother board
C. Father board                                                        D. Father board

Q.14. Which of the following is not component of information assurance system?

A. Confidentiality
B. IPR
C. Intigrity
D. Intigrity

Q.15. What is the difference between Data Integrity and Data Security?

A. Limiting physical access to computer systems; assigning passwords to users.
B. Consistent, accurate and reliable data; protection of data from unauthorized access.
C. Encryption; Audit trails
D. Distributing work to preserve integrity; installing system passwords