CS (MCQ Qus) Unit 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

165

MULTIPLE CHOICE QUESTION (MCO)


WAetiscybererime9

rmofvirtual reality gaming


A
Iactivities conducted over the internet
RA typeofcomputer hardware
Onlineetiquette guidelines
Whichofthe foollowing is an
example of a cybercrime?
Playingonline video games
a] friends
Sendingemails to
Hackinginto someone's bank account
Posting photos on social media
jd
criminals use deceptive emails or websites to
for a cybercrime in which
Ihe term
personal information
rick individuals into revealing
s Phishing
b] Spamming
[d] Viral marketing
Hacking
illegally copying and distributing copyrighted digital
The cybercrime involves movies
naterial, such as music or
b] Phishing
(a] Hacking
(d] Digital piracy
el Cyberbullying
the context of cybercrime?
i What isa"botnet" in
la] Atype of computer virus by a remote attacker
infected computers controlled
b) Anetwork of
shopping website
le| Asecure online
(d]Asocial media platform cybercrime that involves harassing,
is a form of
Which of the following individuals online?
threatening, or targeting b] Digital piracy
la] Hacking [d] Phishing
iel Cyberbullying cybercrime
extortion, a common form of
The Primary motive behind cyber [b] Seeking revenge
la] Gaining notoriety [d]Political activism
le) Pinancial gain
I66
Cyber Security
The term for a cybererime that involves spreading false information or
about someone with the intent to harm their reputation rumors
[a] Cyberstalking b) Cyberbullying
(c] Oyberdefamation (d Cyberhacking
9. The cyber law primarily deal with
(a] Laws related to outer space
b] Legal issues involving computer networks and the internet
(c] Environmental regulations
[d] Criminal law
10. The primary goal of cyber law
a] To prevent all forms of online communication
b] To regulate social media usage
[c] To establish legal guidelines for internet-related activities
(d To promote online anonymity
11. The area of cyber law deals with intellectual property rights, copyright
infringement, and digital piracy
la] Cybersecurity law [b] Information technology law
[c] Cybercrime law [d] Intellectual property law
12. Ttype of cybercrime involves unauthorized access to computer systems or networks
with the intent to steal, alter, or destroy data
[a] Cyberbullying [b] Hacking
[c] Online fraud [d] Phishing
13. The primary objective of cybercrimes categorized as "fnancial cybercrimes"
[a] Spreading malware
[b]Gaining unauthorized access to systems
[c] Financial gain or theft
Id] Cyberbullying
14. The term for cybercrimes that involve spreading false or misleading information
with the intent to damage a person's reputation or credibility
la] Online fraud b) Cyberbullying
[c] Defamation [d] Hacking
and Cyber Law 167

Type of cybercrime involves


6
The
Compromise computer systems ordistributing malicious software that can damage
or data
alHacking
[b] Phishing
cl Malware distribution
(d] Identity theft
termfor cybercrimes that
16.
The target critical infrastructure systems, such as power
grids, water supplies, or transportation networks?
(al Cyberbullying b] Cyberterrorism
lc] Online fraud Id] Phishing
What is financial fraud?

[a) Legal.ffnancial transactions


a Unintentional financial errors
Intentional deceptive practices for financial gain
Financial assistance for those in need
of financial fraud involves creating fake financial documents or
18. Which type
gain?
records to deceive others for financial
[a] Identity theft [b] Money laundering
[d] Tax evasion
[c] Forgery
financial fraud involves intentionally providing false or misleading
19. Which type of liability?
tax
information on tax returns to reduce
b] Tax compliance
lal Tax evasion
[d] Tax credits
d Tax transparency
"malware"?
20. What is
hardware
la] A type of computer
b] A form of online shopping systems
designed to harm or infiltrate computer
lc] Malicious software
programming language software but contains
ld| A computer itself as legitimate
21. Which type of malware disguises computer or steal your data?
your
maliciouscode that can harm [b) Worm
la] Virus [djSpyware
lc) Trojan Horse
I68
Cyber Security
22. What is "ransomware"?
[a]Malware that records your keystrokes
b] Atype of online shopping platform
(c] Malware that encrypts your files and demands a ransom for their releaso
(d] Atype of antivirus software
23. The remedial measures in cybersecurity primarily focused on
[a] Preventing future cyberattacks
b] Detecting ongoing cyberattacks
(c] Responding to and recovering from cyberattacks
[d] Promoting ethical hacking
24. The primary purpose of the Information Technology Act of 2000in India
la]To regulate the sale of electronic devices
b] To promote the use of traditional paper-based documents
[c] To provide legal recognition to electronic transactions and digital
signatures
[d] To ban the use of computers for financial transactions
25. Which amendment to the Information
Technology Act in 2008 introduced
provisions related to data protection and privacy in India?
[al Amendment Act of 2005 b] Amendment Act of 2006
[c] Amendment Act of 2008 [d] Amendment Act of 2010
26. Which amendment to the IT Act
introduced provisions related to the punishment
for cyberterrorism and cyberattacks on critical
infrastructure a
[a]Amendment Act of 2005 b]Amendment Act of 2006
[c]Amendment Act of 2008 [dJAmendment Act of 2010
27. The purpose of the IT
of websites
(Amendment) Act of 2008's provision related to the blocking
a]To promote free access to all websites
bTo restrict access to specifc websites for
security reasons
[c|To ban all online content
(dTo limit access to government websites only
rme nd Cvber Lan

169

Which government agency is responsible for


2000and its amendments
in India? enforcing the provisions of the IT Act
[a<Ministry of Finance
D)Ministry of Health and Family Welfare
(cMinistry of Electronics and
aJMinistry of Education Information Technology
he legal framework that governs the
use of electronic signatures and
India. records n
fal Electronic Transactions Act. b]Electronic Records Act
clnformation Technology Act
[dCybersecurity and Privacy Act
The legal concept allows individuals to remain
silent and avoid selfincrimination
when questioned by law enforcement in
cybercrime cases
(a] Search and seizure
[b]Habeas corpus
[c]Right to privacy [d]Right toremain silent
Answer:

1. [b] 3. aj 4. [d| 5. b]
6. (c] 7. lc 8. d] 9.[b) 10. [c)
11. [d 12. b] 13.c} 14. [cl 16. lel
16. b) 17. dl 18. c 19. a 20. [cl
21. [c] 22. cl 23. (c} 24. (c 25. c
26. (d| 27. b] 28. (el 29. (c) 30. [d)

You might also like