MCQ Cyber Law
MCQ Cyber Law
a. Data theft
b. Forgery
c. Damage to data and systems
d. Installing antivirus for protection
2. Cyber-crime can be categorized into ________ types.
a. 4
b. 3
c. 2
d. 6
3. Which of the following is not a type of peer-to-peer cyber-crime?
a. Phishing
b. Injecting Trojans to a target victim
c. MiTM
d. Credit card details leak in deep web
4. Which of the following is not done by cyber criminals?
a. Unauthorized account access
b. Mass attack using Trojans as botnets
c. Email spoofing and spamming
d. Report vulnerability in any system
5. What is the name of the IT law that India is having in the Indian legislature?
a. India’s Technology (IT) Act, 2000
b. India’s Digital Information Technology (DIT) Act, 2000
c. India’s Information Technology (IT) Act, 2000
d. The Technology Act, 2008
6. In which year India’s IT Act came into existence?
a. 2000
b. 2001
c. 2002
d. 2003
a. Life imprisonment
b. 5 years imprisonment or 5 lakh rupees penalty or both
c. 3 years imprisonment or 2 lakh rupees penalty or both
d. None of the above
18. Which are the section of the IT Act deals with Credit card fraud?
a. 66, 66C, 66D
b. 42, 67, 67A, 67B
c. 43, 66, 66C, 66D
d. None of the above
19. Which Act in India focuses on data privacy and information technology
a. IT Act 2000
b. Banking Regulation Act 1949
c. Indian Penal Code
d. IT (amendment) Act 2008
20. Which section of IT Act 2000 deals with the punishment for cheating by
impersonation by using computer resources?
a. Section 66D
b. Section 66C
c. Section 66F
d. Section 66B
21. What is the time limit for filing appeal against the order of Cyber appellate
tribunal?
a. 30 days
b. 60 days
c. 45 days
d. 90 days
22. In general how many key elements constitute the entire security structure?
a. 1
b. 2
c. 3
d. 4
23. According to the CIA Triad, which of the below-mentioned element is not
considered in the triad?
a. Confidentiality
b. Integrity
c. Authenticity
d. Availability
24. When you use the word _____ it means you are protecting your data from getting
disclosed.
a. Confidentiality
b. Integrity
c. Authentication
d. Availability
25. ______ means the protection of data from modification by unknown users.
a. Confidentiality
b. Integrity
c. Authentication
d. Non-repudiation
26. When integrity is lacking in a security system, _________ occurs.
a. Database hacking
b. Data deletion
c. Data tampering
d. Data leakage
27. _______ of information means, only authorised users are capable of accessing the
information.
a. Confidentiality
b. Integrity
c. Non-repudiation
d. Availability.
28. Why these 4 elements (confidentiality, integrity, authenticity & availability) are
considered fundamental?
a. They help understanding hacking better
b. They are key elements to a security breach
c. They help understands security and its components better
d. They help to understand the cyber-crime better
29. This helps in identifying the origin of information and authentic user. This referred
to here as __________
a. Confidentiality
b. Integrity
c. Authenticity
d. Availability
30. Data ___________ is used to ensure confidentiality.
a. Encryption
b. Locking
c. Deleting
d. Backup
31. Which of these is not a proper method of maintaining confidentiality?
a. Biometric verification
b. ID and password based verification
c. 2-factor authentication
d. Switching off the phone
32. Data integrity gets compromised when _____ and _____ are taken control off.
a. Access control, file deletion
b. Network, file permission
c. Access control, file permission
d. Network, system
33. One common way to maintain data availability is __________
a. Data clustering
b. Data backup
c. Data recovery
d. Data Altering
34. __________ is a special form of attack using which hackers’ exploit – human
psychology.
a. Cross Site Scripting
b. Insecure network
c. Social Engineering
d. Reverse Engineering
35. ________ involves scams where an individual (usually an attacker) lie to a person
(the target victim) to acquire privilege data.
a. Phishing
b. Pretexting
c. Spamming
d. Vishing
36. Which of the following is the technique used to look for information in trash or
around dustbin container?
a. Pretexting
b. Baiting
c. Quid Pro Quo
d. Dumpster diving
37. Which of the following is not an example of social engineering?
a. Dumpster diving
b. Shoulder surfing
c. Carding
d. Spear phishing
38. In a phishing, attackers target the ________ technology to so social engineering.
a. Emails
b. WI-FI network
c. Operating systems
d. Surveillance camera
39. Tailgating is also termed as ___________
a. Piggybacking
b. Pretexting
c. Phishing
d. Baiting
40. _____________ helps in protecting corporate data, communications and other
assets.
a. Snort
b. CipherCloud
c. Burp Suit
d. Wireshark
41. Which of the following tool is used for Blackjacking?
a. BBAttacker
b. BBProxy
c. Blackburried
d. BBJacking