0% found this document useful (0 votes)
13 views3 pages

Unit2 GHDJ

The document contains multiple-choice questions (MCQs) related to cyber crime and cyber security in India. It covers topics such as types of cyber crimes, the IT Act of 2000, and various cybersecurity concepts. Additionally, it includes answers to the MCQs provided.

Uploaded by

nhtrodtqk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
13 views3 pages

Unit2 GHDJ

The document contains multiple-choice questions (MCQs) related to cyber crime and cyber security in India. It covers topics such as types of cyber crimes, the IT Act of 2000, and various cybersecurity concepts. Additionally, it includes answers to the MCQs provided.

Uploaded by

nhtrodtqk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
india cyber crime and cyber security. MCQs Question 1. Which of the following is not a type of cyber crime? a) Data theft b) Forgery c) Damage to data and systems ©) Installing antivirus for protection 2. Which of the following is not done by cyber criminals ? a) Unauthorized account access b) Mass attack using Trojans as botnets c) Email spoofing and spamming AX Report vulnerability in any system 3, What is the name of the IT law that India is having in the Indian legislature ? a) India’s Technology (IT) Act, 2000 b) _India’s Digital Information Technology (DIT) Act, 2000 India’s Information Technology (IT) Act, 2000 d) The Technology Act, 2008 4. In which year India’s IT Act came into existence ? 2000 b) 2001 c) 2002 d) 2003 5. Cyber Security provide security against what ? a. Against Malware b. Against cyber-terrorists c. Defends a device from threat 4 Alll of these 6. means ue security of data from tampering by unidentified users. a. Confidentiality 8. Integrity c. Authentication d. Non-repudiation 7 98 Sri Siddalingeshwara Prakashana Sri Siddalingeshwara Prakash@"? @ scanned with OKEN Scanner eee ion to Cyber-Crime and Cyber La duction © CY! yber La Cyber Security int ng with Computer Source Documents. 7 iii et ____ offence. a) Bailable 6) Non-bailable c) Non-cognizable d) Both (a) and (©) g, Onder passed by Controller is challengeable hefore a) High Court ) Cyber Appellate ‘Tribunal c) Adjudicatory Officer d) Supreme Court . Amefidment to IT Act 2000 came into effect on . 4) 2008 Oct. 2 b) 2009 July 3 c) 2008 June 1 4) 2009 Oct. 27 10, The term ISP stands for : a) International Services Provider sbY~ Internet Service Provider c) Internet Service Program d) Internet Social Policy 11. ICANN stands for : gy~“Tnternet Corporation for Assigned Names and Numbers b) International Commission for Assigned Names and Numbers c) International Corporation for Assisted Names and Numbers d) Internet Computer Assigned Names and Numbers 12. Which of the following is considered as the unsolicited commercial email ? a) Virus b) Malware Spam @) All of the above 13. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. ipis known as the a) Antivirus Firewall c) Cookies d) Malware 14. Which of the following refers to stealing ‘one’s idea or invention of others and use it for their own benefits ? a) Piracy b) Plagiarism ©) Intellectual property rights AAAI of the above 15. Which one of the following security controls is most effective against zero-day icati i -based antivirus Application control b. Signature-b: : d. Intrusion prevention systems ©. Vulnerability scans _ 99 ‘Siddalingeshwara Prakashana Si sri Siddalingeshwara Prakashana : @ scanned with OKEN Scanner Cyber Security Introduction to Cyber-Crime and Cyber la 4 16. Information Technology Act, 2000 describes the offence of child pornography prescribed punishment for it : and a) Under Section 67 b) Under Section 67 A —® Under Section 67 B d) Under Section 68 17. is a criminal offence of unlawfully obtaining money, property or services from a person, entity or institution, through coercion. a) Phishing b) Pornography c) Net or Cyber Extortion d) Credit Card Fraud 18. ICERT stands for : a) Indian Commercial and Economical b) Indian Commercial Emergency Response Team Indian Computer Emergency Response Team d) Indian Cyber Emergency Response Team 19. IPC Section 354 D is related to which of the following ? a) Assault or use of criminal force to woman with intent to disobe by stalking c) Sexual harassment and punishment for sexual harassment d) Voyeurism 20. Which of the following do not comes under Social Engineering ? a) Tailgating b) Phishing c) Pretexting Spamming MCQs Answers 1 2 3 4 5 6 7 8 9 10 D D c A D B B B A B u}2| of wifi | 6] 7 is | 19 A Cc B p{a {[c fa c B D @ scanned with OKEN Scanner

You might also like