What is the primary objective of Cyber Law?
a) To regulate traditional business practices
b) To protect individuals and organizations in the digital environment
c) To enhance physical security
d) To govern international trade
Which of the following is considered a cybercrime?
a) Hacking
b) Identity theft
c) Phishing
d) All of the above
What does the term “data breach” refer to?
a) A system upgrade
b) Unauthorized access to confidential data
c) A network outage
d) A software update
What is the main purpose of encryption in cybersecurity?
a) To slow down data transfer
b) To protect data by making it unreadable to unauthorized users
c) To enhance internet speed
d) To create backups
Which law governs electronic contracts in many countries?
a) The Privacy Act
b) The Electronic Communications and Transactions Act (ECTA)
c) The Data Protection Act
d) The Cybersecurity Act
What does the term “phishing” refer to?
a) A form of online shopping
b) Fraudulent attempts to obtain sensitive information via email or websites
c) A cybersecurity software
d) A secure payment method
Which of the following is a key component of Cyber Law?
a) Data privacy
b) Intellectual property rights
c) Cybercrime regulations
d) All of the above
What is the role of the Computer Emergency Response Team (CERT)?
a) To develop software
b) To provide support during cybersecurity incidents
c) To enforce cyber laws
d) To regulate internet service providers
What is the GDPR?
a) A cybersecurity certification
b) The General Data Protection Regulation, a data protection law in the EU
c) A type of malware
d) A form of encryption
What type of cybercrime involves the unauthorized use of someone else’s computer resources?
a) Identity theft
b) Hacking
c) Cyberbullying
d) Phishing
Which of the following is a legal requirement under GDPR?
a) Obtaining consent for data processing
b) Collecting as much data as possible
c) Selling data to third parties
d) Keeping data indefinitely
What does the term “cyberbullying” refer to?
a) Physical bullying
b) Using electronic communication to bully or harass someone
c) Workplace harassment
d) Verbal threats
What is the main purpose of the Digital Millennium Copyright Act (DMCA)?
a) To promote internet access
b) To protect copyright holders in the digital environment
c) To regulate cybercrime
d) To enforce data privacy
Which of the following is a common defense against cybercrime?
a) Ignoring suspicious emails
b) Using firewalls and antivirus software
c) Sharing passwords
d) Disabling security updates
What is a “cookie” in the context of online privacy?
a) A type of malware
b) A small piece of data stored on a user’s computer by a web browser
c) A security breach
d) A method of encryption
Which of the following acts governs the interception of electronic communications in the U.S.?
a) The Freedom of Information Act
b) The Electronic Communications Privacy Act (ECPA)
c) The Digital Millennium Copyright Act
d) The Computer Fraud and Abuse Act
What is the consequence of violating copyright laws in cyberspace?
a) Legal penalties, including fines and imprisonment
b) Increased popularity
c) No consequences
d) Reward points
Which of the following is NOT a principle of data protection under GDPR?
a) Transparency
b) Data minimization
c) Data monopolization
d) Accuracy
What is a denial-of-service (DoS) attack?
a) An attempt to make a service unavailable by overwhelming it with traffic
b) A method of data encryption
c) A software update
d) A type of cyber insurance
What does “identity theft” involve?
a) Using someone else’s name for shopping
b) Stealing someone’s personal information for fraudulent purposes
c) Creating fake identities
d) Hacking social media accounts
What is the primary focus of the Cybersecurity Act?
a) To protect intellectual property
b) To enhance the security of networks and information systems
c) To regulate financial transactions
d) To promote online education
Which of the following is considered an ethical hacking practice?
a) Hacking for personal gain
b) Testing systems for vulnerabilities with permission
c) Phishing for information
d) Spreading malware
What is the purpose of a privacy policy on a website?
a) To collect user data
b) To inform users how their data will be used and protected
c) To sell data to third parties
d) To enhance website design
Which of the following actions is illegal under Cyber Law?
a) Using strong passwords
b) Distributing malware
c) Reporting cybersecurity incidents
d) Educating others about online safety
What does the term “spyware” refer to?
a) A software for tracking fitness
b) Malware designed to gather information about a person or organization without their knowledge
c) A security application
d) A type of encryption
Which of the following is a common method to protect personal data online?
a) Sharing passwords
b) Using two-factor authentication
c) Ignoring software updates
d) Public Wi-Fi networks
What is the role of the Federal Trade Commission (FTC) regarding Cyber Law?
a) To regulate internet service providers
b) To protect consumers from unfair and deceptive practices in cyberspace
c) To enforce copyright laws
d) To promote online education
Which of the following is a requirement for compliance with GDPR?
a) Ignoring user requests for data access
b) Providing users with the right to access their personal data
c) Keeping data indefinitely
d) Sharing data without consent
What is “cyber espionage”?
a) Hacking for personal gain
b) The act of spying on individuals or organizations to obtain confidential information
c) Data encryption
d) Social media marketing
Which of the following actions can lead to criminal charges under Cyber Law?
a) Creating a secure website
b) Unauthorized access to a computer system
c) Reporting a security breach
d) Educating others about cybersecurity