100% found this document useful (1 vote)
976 views16 pages

Cyber Security Objective Q

Objective Type Question of Cyber Security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
976 views16 pages

Cyber Security Objective Q

Objective Type Question of Cyber Security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

SAGAR INSTITUTE OF SCIENCE TECHNOLOGY & RESEARCH

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


OBJECTIVE TYPE QUESTIONS
CS-8004 CYBER LAW & ETHICS

Reference: https://www.sanfoundry.com/cyber-security-questions-answers-types-cyber-attacks/

Q1. Which of the following is not a type of cyber crime?


a) Data theft
b) Forgery
c) Damage to data and systems
d) Installing antivirus for protection
Answer: d
Explanation: A Cyber crime is one of the most threatening terms that is an evolving phase. It is
said that major percentage of the World War III will be based on cyber-attacks by cyber armies of
different countries.

Q2. Cyber-laws are incorporated for punishing all criminals only.


a) True
b) False
Answer: b
Explanation: Cyber-laws were incorporated in our law book not only to punish cyber criminals but
to reduce cyber crimes and tie the hands of citizens from doing illicit digital acts that harm or
damage other’s digital property or identity.

Q3. Cyber-crime can be categorized into ________ types.


a) 4
b) 3
c) 2
d) 6
Answer: c
Explanation: Cyber crime can be categorized into 2 types. These are peer-to-peer attack and
computer as weapon. In peer-to-peer attack, attackers target the victim users; and in computer as
weapon attack technique, computers are used by attackers for a mass attack such as illegal and
banned photo leak, IPR violation, pornography, cyber terrorism etc.

Q4. Which of the following is not a type of peer-to-peer cyber-crime?


a) Phishing
b) Injecting Trojans to a target victim
c) MiTM
d) Credit card details leak in deep web
Answer: d
Explanation: Phishing, injecting Trojans and worms to individuals comes under peer-to-peer cyber
crime. Whereas, leakage of credit card data of a large number of people in deep web comes under
computer as weapon cyber-crime.

Q5. Which of the following is not an example of a computer as weapon cyber-crime?


a) Credit card fraudulent
b) Spying someone using keylogger
c) IPR Violation
d) Pornography
Answer: b
Explanation: DDoS (Distributed Denial of Service), IPR violation, pornography are mass attacks
done using a computer. Spying someone using keylogger is an example of peer-to-peer attack.

Q6. Which of the following is not done by cyber criminals?


a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system
Answer: d
Explanation: Cyber-criminals are involved in activities like accessing online accounts in
unauthorized manner; use Trojans to attack large systems, sending spoofed emails. But cyber-
criminals do not report any bug is found in a system, rather they exploit the bug for their profit.

Q7. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Answer: c
Explanation: The Indian legislature thought of adding a chapter that is dedicated to cyber law. This
finally brought India’s Information Technology (IT) Act, 2000 which deals with the different
cyber-crimes and their associated laws.

Q8. In which year India’s IT Act came into existence?


a) 2000
b) 2001
c) 2002
d) 2003
Answer: a
Explanation: On 17th Oct 2000, the Indian legislature thought of adding a chapter that is dedicated
to cyber law, for which India’s Information Technology (IT) Act, 2000 came into existence.
Q9. What is the full form of ITA-2000?
a) Information Tech Act -2000
b) Indian Technology Act -2000
c) International Technology Act -2000
d) Information Technology Act -2000
Answer: d
Explanation: Information Technology Act -2000 (ITA-2000), came into existence on 17th Oct
2000, that is dedicated to cyber-crime and e-commerce law in India.

Q10. The Information Technology Act -2000 bill was passed by K. R. Narayanan.
a) True
b) False
Answer: b
Explanation: The bill was passed & signed by Dr. K. R. Narayanan on 9th May, in the year 2000.
The bill got finalized by head officials along with the Minister of Information Technology, Dr.
Pramod Mahajan.

Q11. Under which section of IT Act, stealing any digital asset or information is written a
cyber-crime.
a) 65
b) 65-D
c) 67
d) 70
Answer: a
Explanation: When a cyber-criminal steals any computer documents, assets or any software’s
source code from any organization, individual, or from any other means then the cyber crime falls
under section 65 of IT Act, 2000.

Q12. What is the punishment in India for stealing computer documents, assets or any
software’s source code from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000
Answer: d
Explanation: The punishment in India for stealing computer documents, assets or any software’s
source code from any organization, individual, or from any other means is 3 years of imprisonment
and a fine of Rs. 500,000.advertisement

Q13. What is the updated version of the IT Act, 2000?


a) IT Act, 2007
b) Advanced IT Act, 2007
c) IT Act, 2008
d) Advanced IT Act, 2008
Answer: c
Explanation: In the year 2008, the IT Act, 2000 was updated and came up with a much broader and
precise law on different computer-related crimes and cyber offenses.

Q14. In which year the Indian IT Act, 2000 got updated?


a) 2006
b) 2008
c) 2010
d) 2012
Answer: b
Explanation: In the year 2008, the IT Act, 2000 was updated and came up with a much broader and
precise law on different computer-related crimes and cyber offenses.

Q15. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT
Act holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components
Answer: a
Explanation: Under section 66 of IT Act, 2000 which later came up with a much broader and
precise law says that cracking or illegally hacking into any victim’s computer is a crime. It covers
a wide range of cyber-crimes under this section of the IT Act.

Reference:https://www.sanfoundry.com/cyber-security-questions-answers-types-cyber-attacks/

Q16. The full form of Malware is ________


a) Malfunctioned Software
b) Multipurpose Software
c) Malicious Software
d) Malfunctioning of Security
Answer: c
Explanation: Different types of harmful software and programs that can pose threats to a system,
network or anything related to cyberspace are termed as Malware. Examples of some common
malware are Virus, Trojans, Ransom ware, spyware, worms, root kits etc.

Q17. Who deploy Malwares to a system or network?


a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists
b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists
c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists
d) Criminal organizations, gray hat hackers, Malware developers, Penetration testers
Answer: a
Explanation: Criminal-minded organizations, groups and individuals’ cyber-terrorist groups, Black
hat hackers, malware developers etc are those who can deploy malwares to any target system or
network in order to deface that system.

Q18. _____________ is a code injecting method used for attacking the database of a system /
website.
a) HTML injection
b) SQL Injection
c) Malicious code injection
d) XML Injection
Answer: b
Explanation: SQLi (Structured Query Language Injection) is a popular attack where SQL code is
targeted or injected; for breaking the web application having SQL vulnerabilities. This allows the
attacker to run malicious code and take access to the database of that server.

Q19. XSS is abbreviated as _____


a) Extreme Secure Scripting
b) Cross Site Security
c) X Site Scripting
d) Cross Site Scripting
Answer: d
Explanation: Cross Site Scripting is another popular web application attack type that can hamper
the reputation of any site.

Q20. This attack can be deployed by infusing a malicious code in a website’s comment
section. What is “this” attack referred to here?
a) SQL injection
b) HTML Injection
c) Cross Site Scripting (XSS)
d) Cross Site Request Forgery (XSRF)
Answer: c
Explanation: XSS attack can be infused by putting the malicious code (which gets automatically
run) in any comment section or feedback section of any webpage (usually a blogging page). This
can hamper the reputation of a site and the attacker may place any private data or personal
credentials.

Q21. When there is an excessive amount of data flow, which the system cannot handle, _____
attack takes place.
a) Database crash attack
b) DoS (Denial of Service) attack
c) Data overflow Attack
d) Buffer Overflow attack
Answer: d
Explanation: The Buffer overflow attack takes place when an excessive amount of data occurs in
the buffer, which it cannot handle and lead to data being over-flow into its adjoined storage. This
attack can cause a system or application crash and can lead to malicious entry-point.

Q22. Compromising a user’s session for exploiting the user’s data and do malicious activities
or misuse user’s credentials is called ___________.
a) Session Hijacking
b) Session Fixation
c) Cookie stuffing
d) Session Spying
Answer: a
Explanation: Using session hijacking, which is popularly known as cookie hijacking is an
exploitation method for compromising the user’s session for gaining unauthorized access to user’s
information.

Q23. Which of this is an example of physical hacking?


a) Remote Unauthorized access
b) Inserting malware loaded USB to a system
c) SQL Injection on SQL vulnerable site
d) DDoS (Distributed Denial of Service) attack
Answer: b
Explanation: If a suspicious gain access to server room or into any confidential area with a
malicious pen-drive loaded with malware which will get triggered automatically once inserted to
USB port of any employee’s PC; such attacks come under physical hacking, because that person in
gaining unauthorized physical access to any room or organization first, then managed to get an
employee’s PC also, all done physically – hence breaching physical security.

Q24. Which of them is not a wireless attack?


a) Eavesdropping
b) MAC Spoofing
c) Wireless Hijacking
d) Phishing
Answer: d
Explanation: Wireless attacks are malicious attacks done in wireless systems, networks or devices.
Attacks on Wi-Fi network is one common example that general people know. Other such sub-types
of wireless attacks are wireless authentication attack, Encryption cracking etc.

Q25. An attempt to harm, damage or cause threat to a system or network is broadly termed
as ______.
a) Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
Answer: b
Explanation: Cyber attack is an umbrella term used to classify different computer & network
attacks or activities such as extortion, identity theft, email hacking, digital spying, stealing
hardware, mobile hacking and physical security breaching.

Q26. Which method of hacking will record all your keystrokes?


a) Key hijacking
b) Key jacking
c) Key logging
d) Keyboard monitoring
Answer: c
Explanation: Key logging is the method or procedure of recording all the key strokes/keyboard
button pressed by the user of that system.

Q27. _________ are the special type of programs used for recording and tracking user’s
keystroke.
a) Keylogger
b) Trojans
c) Virus
d) Worms
Answer: a
Explanation: Key loggers are surveillance programs developed for both security purpose as well as
done for hacking passwords and other personal credentials and information. This type of programs
actually saves the keystrokes done using a keyboard and then sends the recorded keystroke file to
the creator of such programs.

Q28.Which of the following describes e‐commerce?


a.Doing business electronically
b.Doing business
c.Sale of goods
d.All of the above
Answer: A

Q29.Which of the following is part of the four main types for e‐commerce?
a.B2B
b.B2C
c.C2B
d. All of the above
Answer: D
Q30.Which segment do eBay, Amazon.com belong?
a.B2Bs
b.B2Cs
c.C2Bs
d.C2Cs
Answer: B

Q31.Which type of e‐commerce focuses on consumers dealing with each other?


a.B2B
b.B2C
c.C2B
d.C2C
Answer: D

Q32.Which segment is eBay an example?


a.B2B
b.C2B
c.C2C
d. None of the above
Answer: D

Q33.Which type deals with auction?


a.B2B
b.B2C
c.C2B
d.C2C
Answer: D

Q35.In which website Global Easy Buy is facilitated?


a. Ebay.com
b. Amazon.com
c. Yepme.com
d. None of these
Answer: A

Q36.The best products to sell in B2C e‐commerce are:


a. Small products
b. Digital products
c. Specialty products
d. Fresh products
Answer: B

Q37. Ethics was invented by____________


a). Immanuel Kant.
b). Raffels.
c). Rozer.
d). None of These

Q38. ______is the art of determining what is right and wrong and then doing the right thing.
a).Ethics
b).Crime
c).Cyber
d).Internet

Q39.Code of ethics supplies norms and _______


a). Principles.
b).Law.
c). Code
d).Mapping

Q40.IT Act of India was framed in the year_________


a).2000.
b).2001
c). 2003
d).2004

Q41.Ethics is the _______ of determining what is right and wrong.


a). Art
b).Crime
c).Mapping
d).Act

Q42. __________ indicates rules and regulations to be obeyed in the organization.


a). Law
b).Crime
c).Mapping
d).Act

Q43. _______are set of standards, which decide right or wrong.


a). Morals
b).Digital Space
c).Cyber
d).Laws

Q44.Ethical principal based on _______ value.


a).Morals
b).Digital Space
c).Cyber
d).Laws
Q45._____ boosts transactional efficiency and gives new energy to improve the progress.
a).Morals
b).Digital Space
c). Ethics
d).Laws

Q46 . ______ value guides us how to behave.


a).Morals
b). Space
c).Report
d).Laws

Q47. ________ gives justice to each person according to individual effort.


a).Sites
b).Digital Space
c).Cyber Crime
d). Ethics

Q48.__________ is business cultivate strong teamwork and productivity.


a).E-Commerce
b).Online Bossiness
c).Cyber Space
d). Ethics

Q49.________ builds trust and teamwork.


a).Morals Values
b).Digital Space
c). Ethics
d).Laws

Q50. _________ indicates to treat each person on equal share basis.


a). Justice
b).Digital Space
c).Cyber
d).Laws

Q51_______ indicates the "fairness in distribution".


a).Morals
b).Digital Space
c). Justice
d).Laws

Q52. ________ is a standard of rightness or wrongness.


a).Morals
b).Digital Space
c).Cyber Crime
d).Laws
Q53. _________ is an unauthorized duplication, distribution and use of computer.
software.
a).Law
b).Digital Space
c).Cyber
d). Software Piracy

Q54. Accessing of data without having permission is called_________

a). unauthorized access.


b).Digital Space
c).Cyber
d).Laws

Q55. Intentionally trying to log to others computer system is called _____________


a).Morals
b).Digital Space
c). unauthorized access
d).Laws

Q56. Unauthorized duplication and use of software are called_______________


a).Morals values
b).Digital Space
c).Cyber
d). software piracy.

Q57. ___________ is an exact copy of a program in seconds.


a).Replicas
b).Photocopy
c). Piracy
d). Software piracy

Q58. _______________ is the variety of types of software error


a).Errors
b).Logical Error
c).Cyber Error
d). Bug_

Q58. Intentional damage to equipment, software or data of other users is termed


as_______________
a).Errors
b).Logical Error
c).Cyber Error
d). Unauthorized access

Q59. _____________ is not a victimless crime.


a).Errors
b).Logical Error
c).Cyber Error
d). Software piracy

Q60.__________ is a victim's condition.


a).Errors
b).Logical Error
c).Cyber Error
d). Liability

Q61. Biggest source of software piracy is____________


a).Cyber space
b).Digital Space
c). End user.
d). Laws

Q62. is an organizational concern.


a). Security
b).Logical Error
c).Cyber Error
d). Liability
Q63.________ refers to all the legal and regulatory aspects of the internet and
WWW.
a). Security
b).Logical Error
c).Cyber Error
d). Cyber Law

Q64. ___________means the official gazette published in electronic form.


a).Security
b). Electronic gazette
c).Cyber Error
d). Cyber Law

Q65. __________means a person who is intended by the originator to receive the


electronic record but does not include any intermediary.
a).Security
b).Electronic gazette
c). Addressee
d). Cyber Law
Q66. _________and private key makes the key of key pair to create digital certificate.
a).Security
b).Electronic gazette
c).Addressee
d). Public

Q67. __________ means authentication of any electronic records by a subscriber by the


means of an electronic method.
a).Security
b).Electronic gazette
c).Addressee
d). Digital signature

Q68. Rules for computing are called as____________


a).Security
b).Electronic gazette
c). commandments.
d). Digital signature

Q69.____________ includes data, text, images, sound and voice etc.


a).Security
b).Electronic gazette
c). commandments.
d). Information

Q70. ______________ refers to all the activities with criminal intention in cyber space.
a).Security
b).Electronic gazette
c). Cyber crime
d). Information

Q71__________provides legal recognition of transaction carried out by means of


electronic commerce.
a). IT Act
b).Electronic gazette
c). Cyber crime
d). Information

Q72. ______Software is used to protect the companies’ information


from external and internal threats.
a).Security
b).Electronic gazette
c). Cyber crime
d). Firewall
Q73. Today many disturbing and unethical things are happening in the cyber space
called_____.
a).Security
b).Electronic gazette
c). Cyber crime
d). Information

Q74. means a representation of information,knowledge,facts,concept or instructions.


a).Security
b). Data
c). Cyber crime
d). Information

Q75. __________ ensures that the document originated with the person signing it.
a).Security
b).Electronic gazette
c). Digital Signature
d). Information

Q76. The receiving of product from originator is called as_______________.


a).Security
b).Electronic gazette
c). Acknowledgement.
d). Information

Q77. ____________ is non-copyrighted software without restriction.


a).Security
b).Electronic gazette
c). Public domain software
d). Information

Q78. ______________right is a discipline which protects the copyrights, trademarks of


the inventors.
a).Security
b).Electronic gazette
c). Intellectual property
d). Information

Q79. © is a________ symbol.


a).Security
b).Copyright
c). Intellectual property
d). Information
Q70._____________ is related to sender who sends the product to other person.
a).Security
b). Attribution
c). Intellectual property
d). Information

Q71. __________means copying of limited amount of material without permission.


a).Security
b). Attribution
c). Intellectual property
d). Fairuse

Q72 _________-is the protection that covers original work.


a).Security
b). Copyright
c). Intellectual property
d). Fairuse

Q73. Linux is __________ type of software.


a).Software
b). Freeware
c). Intellectual property
d). Firmware

Q74. ____________must obey ethics and laws while developing their software.
a).Software
b). Freeware
c). Intellectual property
d). Computer programmers

Q75. ___________software is software that is not copyright.


a).Software
b).Freeware
c).Intellectual property
d). Public domain

Q76._________ property rights deals with issues of copyright, trademark and patenet
laws.
a).Software
b).Intellectual
c).Intellectual property
d). Public domain
Q77. Conversion of data into a secured format is called___________.
a).Software
b). Encryption.
c).Intellectual property
d). Public domain

Q78. __________ Software can be shared with other user with owner permission.
a).Software
b). Shareware
c).Intellectual property
d). Public domain

Q79.___________ is a protection that covers published and unpublished literary,


scientific and artistic work.
a).Software
b).Copyright
c).Intellectual property
d). Public domain

Q80.____________ provides legal recognition of transaction carried out by means of


ecommerce.
a).Software
b).Copyright
c).Intellectual property
d). IT Act 2000

Q81. ___________ refers to all activities done with activity in cyber space.
a).Software
b).Copyright
c).Intellectual property
d). Cyber crime

Q82. __________provides the legal recognition for transaction carried out by means of
electronic data interchange and other means of electronic communication commonly
referred to as Electronic Commerce.
a). The IT Act 2000
b).Copyright
c).Intellectual property
d). Cyber crime

You might also like