Cyber Security Objective Q
Cyber Security Objective Q
Reference: https://www.sanfoundry.com/cyber-security-questions-answers-types-cyber-attacks/
Q7. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Answer: c
Explanation: The Indian legislature thought of adding a chapter that is dedicated to cyber law. This
finally brought India’s Information Technology (IT) Act, 2000 which deals with the different
cyber-crimes and their associated laws.
Q10. The Information Technology Act -2000 bill was passed by K. R. Narayanan.
a) True
b) False
Answer: b
Explanation: The bill was passed & signed by Dr. K. R. Narayanan on 9th May, in the year 2000.
The bill got finalized by head officials along with the Minister of Information Technology, Dr.
Pramod Mahajan.
Q11. Under which section of IT Act, stealing any digital asset or information is written a
cyber-crime.
a) 65
b) 65-D
c) 67
d) 70
Answer: a
Explanation: When a cyber-criminal steals any computer documents, assets or any software’s
source code from any organization, individual, or from any other means then the cyber crime falls
under section 65 of IT Act, 2000.
Q12. What is the punishment in India for stealing computer documents, assets or any
software’s source code from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000
Answer: d
Explanation: The punishment in India for stealing computer documents, assets or any software’s
source code from any organization, individual, or from any other means is 3 years of imprisonment
and a fine of Rs. 500,000.advertisement
Q15. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT
Act holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components
Answer: a
Explanation: Under section 66 of IT Act, 2000 which later came up with a much broader and
precise law says that cracking or illegally hacking into any victim’s computer is a crime. It covers
a wide range of cyber-crimes under this section of the IT Act.
Reference:https://www.sanfoundry.com/cyber-security-questions-answers-types-cyber-attacks/
Q18. _____________ is a code injecting method used for attacking the database of a system /
website.
a) HTML injection
b) SQL Injection
c) Malicious code injection
d) XML Injection
Answer: b
Explanation: SQLi (Structured Query Language Injection) is a popular attack where SQL code is
targeted or injected; for breaking the web application having SQL vulnerabilities. This allows the
attacker to run malicious code and take access to the database of that server.
Q20. This attack can be deployed by infusing a malicious code in a website’s comment
section. What is “this” attack referred to here?
a) SQL injection
b) HTML Injection
c) Cross Site Scripting (XSS)
d) Cross Site Request Forgery (XSRF)
Answer: c
Explanation: XSS attack can be infused by putting the malicious code (which gets automatically
run) in any comment section or feedback section of any webpage (usually a blogging page). This
can hamper the reputation of a site and the attacker may place any private data or personal
credentials.
Q21. When there is an excessive amount of data flow, which the system cannot handle, _____
attack takes place.
a) Database crash attack
b) DoS (Denial of Service) attack
c) Data overflow Attack
d) Buffer Overflow attack
Answer: d
Explanation: The Buffer overflow attack takes place when an excessive amount of data occurs in
the buffer, which it cannot handle and lead to data being over-flow into its adjoined storage. This
attack can cause a system or application crash and can lead to malicious entry-point.
Q22. Compromising a user’s session for exploiting the user’s data and do malicious activities
or misuse user’s credentials is called ___________.
a) Session Hijacking
b) Session Fixation
c) Cookie stuffing
d) Session Spying
Answer: a
Explanation: Using session hijacking, which is popularly known as cookie hijacking is an
exploitation method for compromising the user’s session for gaining unauthorized access to user’s
information.
Q25. An attempt to harm, damage or cause threat to a system or network is broadly termed
as ______.
a) Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
Answer: b
Explanation: Cyber attack is an umbrella term used to classify different computer & network
attacks or activities such as extortion, identity theft, email hacking, digital spying, stealing
hardware, mobile hacking and physical security breaching.
Q27. _________ are the special type of programs used for recording and tracking user’s
keystroke.
a) Keylogger
b) Trojans
c) Virus
d) Worms
Answer: a
Explanation: Key loggers are surveillance programs developed for both security purpose as well as
done for hacking passwords and other personal credentials and information. This type of programs
actually saves the keystrokes done using a keyboard and then sends the recorded keystroke file to
the creator of such programs.
Q29.Which of the following is part of the four main types for e‐commerce?
a.B2B
b.B2C
c.C2B
d. All of the above
Answer: D
Q30.Which segment do eBay, Amazon.com belong?
a.B2Bs
b.B2Cs
c.C2Bs
d.C2Cs
Answer: B
Q38. ______is the art of determining what is right and wrong and then doing the right thing.
a).Ethics
b).Crime
c).Cyber
d).Internet
Q70. ______________ refers to all the activities with criminal intention in cyber space.
a).Security
b).Electronic gazette
c). Cyber crime
d). Information
Q75. __________ ensures that the document originated with the person signing it.
a).Security
b).Electronic gazette
c). Digital Signature
d). Information
Q74. ____________must obey ethics and laws while developing their software.
a).Software
b). Freeware
c). Intellectual property
d). Computer programmers
Q76._________ property rights deals with issues of copyright, trademark and patenet
laws.
a).Software
b).Intellectual
c).Intellectual property
d). Public domain
Q77. Conversion of data into a secured format is called___________.
a).Software
b). Encryption.
c).Intellectual property
d). Public domain
Q78. __________ Software can be shared with other user with owner permission.
a).Software
b). Shareware
c).Intellectual property
d). Public domain
Q81. ___________ refers to all activities done with activity in cyber space.
a).Software
b).Copyright
c).Intellectual property
d). Cyber crime
Q82. __________provides the legal recognition for transaction carried out by means of
electronic data interchange and other means of electronic communication commonly
referred to as Electronic Commerce.
a). The IT Act 2000
b).Copyright
c).Intellectual property
d). Cyber crime