1.
_______________ are the forms of code or malware programs that can copy themselves and damage or destroy data and systems
Correct Answer
A. Virus
Explanation
Viruses are forms of code or malware programs that can replicate themselves and cause harm or destruction to data and computer systems. They can spread from one computer to another, usually through infected files or attachments, and can cause a range of issues such as corrupting files, slowing down computer performance, or even completely disabling a system. Viruses are a common type of cyber threat and can be designed to perform various malicious activities, such as stealing personal information or damaging critical infrastructure.
2.
______________________ is a type of social engineering attack often used to steal user data including login credentials,username,password etc…
Correct Answer
B. pHishing
Explanation
Phishing is a type of social engineering attack where the attacker disguises themselves as a trustworthy entity in order to trick individuals into revealing sensitive information such as login credentials, usernames, passwords, and other personal data. This is typically done through deceptive emails, messages, or websites that appear legitimate, but are actually designed to steal the user's information. Phishing attacks are a common and effective method used by hackers to gain unauthorized access to personal accounts and sensitive data.
3.
_____________________ is obtaining files that you do not have the right to use from the internet.
Correct Answer
C. Illegal downloading
Explanation
Illegal downloading refers to the act of obtaining files from the internet without proper authorization or the right to use them. This can include downloading copyrighted material, such as movies, music, or software, without permission from the copyright holder. It is considered illegal because it infringes upon the rights of the content creators and violates copyright laws.
4.
A fradulant scheme performed by a dishonest individual,group or company in an attempt to obtain money or something else of value.
Correct Answer
A. Scams
Explanation
The correct answer is scams. A scam refers to a fraudulent scheme carried out by dishonest individuals, groups, or companies with the intention of deceiving others and obtaining money or valuable assets. Scammers often use various tactics and manipulations to trick their victims into providing personal information, making financial transactions, or engaging in other activities that benefit the scammer. It is important to be aware of scams and to exercise caution when dealing with unfamiliar individuals or organizations to protect oneself from becoming a victim.
5.
__________________________ is the scientific processes of identification, acquisition, authentication, analysis, documentation and preservation of digital evidence.
Correct Answer
C. Cyber Forensics
Explanation
Cyber forensics is the scientific process that involves identifying, acquiring, authenticating, analyzing, documenting, and preserving digital evidence. This field focuses on investigating cybercrimes and gathering digital evidence to be used in legal proceedings. It involves techniques and methodologies to extract and analyze data from various digital devices and networks. Through cyber forensics, investigators can uncover valuable information, such as emails, documents, images, and other digital artifacts, that can be crucial in solving cybercrimes and prosecuting offenders.
6.
____________________ are legal rights governing the use of creations of human mind
Correct Answer
A. IPR
Explanation
IPR stands for Intellectual Property Rights, which are legal rights governing the use of creations of the human mind. These rights include copyrights, trademarks, patents, and trade secrets, and they protect the rights of creators and inventors by granting them exclusive rights to their creations or inventions. IPR ensures that individuals or organizations have control over the use, distribution, and reproduction of their intellectual property, promoting innovation and creativity while also providing legal protection against infringement or unauthorized use.
7.
______________________ data can be freely used,re-used and distributed by anyone.
Correct Answer
B. Open Data
Explanation
Open data refers to data that is freely available and can be used, reused, and distributed by anyone. This means that there are no restrictions or limitations on accessing or utilizing the data. Open data promotes transparency, collaboration, and innovation by allowing individuals, organizations, and governments to analyze and utilize the information for various purposes. It enables the development of new applications, research, and insights that can benefit society as a whole.
8.
________________________ is a document that provides legally binding guidelines for the use and distribution of software
Correct Answer
A. Software licence
Explanation
A software license is a document that provides legally binding guidelines for the use and distribution of software. It outlines the terms and conditions under which the software can be used, including any restrictions or limitations. By obtaining a software license, users are granted permission to use the software in accordance with the specified guidelines, while also ensuring that they are not infringing on any copyright or intellectual property rights.
9.
______________________ indicates the terms under which end user may use the software
Correct Answer
A. EULA
Explanation
EULA stands for End User License Agreement and it is a legal contract between the software developer and the end user that outlines the terms and conditions under which the end user can use the software. The EULA typically specifies the rights and restrictions of the end user, such as the number of installations allowed, any limitations on copying or distributing the software, and any disclaimers or limitations of liability. It is important for users to read and understand the EULA before using the software to ensure compliance with the terms.
10.
Which one of the following is not an objective of IPR
Correct Answer
A. Privatisation
Explanation
Privatisation is not an objective of Intellectual Property Rights (IPR). IPR aims to protect and promote the rights of creators and innovators by granting them exclusive rights over their creations or inventions. Privatisation, on the other hand, refers to the transfer of ownership or control of a public sector entity to the private sector. While privatisation may have its own benefits, it is not directly related to the objectives of IPR, which primarily focus on the protection and promotion of intellectual property.