Question - 1
Which of the following is not a type of cyber crime?
- Data theft
- Forgery
- Damage to data and systems
- Installing antivirus for protection
Solutions
Answer- D
Question - 2
Many Cyber Crimes comes under Indian Penal Code Which one of the following is an example?
- Sending Threatening message by Email
- Forgery of Electronic Record
- Bogus Website
- All the above
Solutions
Answer- D
Question - 3
The Information Technology Act 2000 is an Act of Indian Parliament notified on
- 27th April 2000
- 25th December 2000
- 17th October 2000
- None of the above
Solutions
Answer- C
Question - 4
Cyber-crime can be categorized into ________ types.
Answer- A
Question - 5
Which of the following is not a type of peer-to-peer cyber-crime?
- Phishing
- Injecting Trojans to a target victim
- Credit card details leak in deep web
- MiTM
Solutions
Answer- C
Question - 6
Digital Signature Certificate is ____________ requirement under various applications
- Statutory
- Legislative
- Governmental
- Voluntary
Solutions
Answer- A
Question - 7
Which of the following is not an example of a computer as weapon cyber-crime?
- Credit card fraudulent
- Spying someone using keylogger
- IPR Violation
- Pornography
Solutions
Answer- B
Question - 8
Assessing Computer without prior authorization is a cyber crime that comes under____
- Section 65
- Section 66
- Section 68
- Section 70
Solutions
Answer- B
Question - 9
Which of the following is not done by cyber criminals?
- Report vulnerability in any system
- Email spoofing and spamming
- Mass attack using Trojans as botnets
- Unauthorized account access
Solutions
Answer- A
Question - 10
____________ means a person who has been granted a licence to issue a electronic signature certificate
- Certifying Authority
- Certifying Private Key Authority
- Certifying system controller
- Appropriate Authority
Solutions
Answer- A
Question - 11
In which year India’s IT Act came into existence?
Answer- B
Question - 12
_______ is an application of information and communication technology (ICT) for delivering Government Service.
- Governance
- Electronic Governance
- Governance and Ethics
- Risk and Governance.
Solutions
Answer- B
Question - 13
What is the full form of ITA-2000?
- Information Technology Act -2000
- International Technology Act -2000
- Indian Technology Act -2000
- Information Tech Act -2000
Solutions
Answer- A
Question - 14
The Altering of data so that it is not usable unless the changes are undone is
- Biometrics
- Encryption
- Ergonomics
- Compression
Solutions
Answer- B
Question - 15
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
Answer- A
Question - 16
- To assure identity of user on a remote system
- Insertion
- Modification
- None of these
Solutions
Answer- A
Question - 17
What is the updated version of the IT Act, 2000?
- IT Act, 2007
- Advanced IT Act, 2007
- IT Act, 2008
- Advanced IT Act, 2008
Solutions
Answer- C
Question - 18
The following laws / sections were amended / passed to combat pornography of an aggravated form
- Section 134 of the Indian Evidence Act, 1872
- Sections 66 A and 66 B of the I.T. (Amendment) Act, 2008
- Section 13 of the POCSO Act, 2012 was passed to deal with such offences
- . Section 376 of the Indian Penal Code
Solutions
Answer- B
Question - 19
In which year the Indian IT Act, 2000 got updated?
Answer- B
Question - 20
- An attempt to crack passwords using words that can be found in dictionary
- An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
- An attempt to crack passwords using a combination of characters, numbers, and symbols
- An attempt to crack passwords by replacing characters with numbers and symbols
Solutions
Answer- B
Practice more set questions