Cyber MCQ
Cyber MCQ
Cyber MCQ
1. What is cybercrime?
a) Legal activities on the Internet
b) Authorized computer use
c) Illegal acts using a computer or networked device
d) None of the above
**Answer: c) Illegal acts using a computer or networked device**
9. What is one of the major reasons for cybercrime mentioned in the passage?
a) Technological advancement
b) Lack of awareness
c) Global cooperation
d) Weather conditions
**Answer: b) Lack of awareness**
**Multiple Choice Questions (MCQs) on Classification of Cyber Crimes:**
1. How can cyber crimes be classified based on the groups they target?
a) Two heads
b) Three categories
c) Four heads
d) Five categories
**Answer: c) Four heads**
2. Which of the following is not one of the categories of cyber crimes mentioned in the passage?
a) Cyber crimes against individuals
b) Cyber crimes against organizations
c) Cyber crimes against society at large
d) Cyber crimes against government
**Answer: d) Cyber crimes against government**
7. Which type of cyber attack prevents legal users from accessing computer systems?
a) Salami attacks
b) Denial of Service Attack
c) Data Diddling
d) Web Jacking
**Answer: b) Denial of Service Attack**
10. What is the primary focus of cyber crime against women and children?
a) Theft of intellectual property
b) Cyber terrorism
c) Harassment and exploitation through online platforms
d) Denial of Service Attack
**Answer: c) Harassment and exploitation through online platforms**
**Multiple Choice Questions (MCQs) on Common Cyber Crimes:**
3. What is the primary objective of hacking and unauthorized access in cyber crimes?
a) To enhance device operations
b) To gain unauthorized access for data theft or device control
c) To improve internet security
d) To promote rapid communication
**Answer: b) To gain unauthorized access for data theft or device control**
4. What is the main purpose of ransomware in both computer and mobile contexts?
a) To encrypt and lock data, demanding payment for release
b) To improve device operations
c) To promote secure communication
d) To enhance internet-enabled functions
**Answer: a) To encrypt and lock data, demanding payment for release**
1. What is malware?
a) Authorized software
b) Beneficial software
c) Malicious software
d) Security software
**Answer: c) Malicious software**
4. How does a computer virus infect other computers on the same network?
a) By improving device operations
b) By running infected programs on other computers
c) By enhancing internet-enabled functions
d) By securing network connections
**Answer: b) By running infected programs on other computers**
**Financial Frauds:**
6. What is a common method of stealing credit card and calling card numbers?
a) Physical theft of cards
b) Online databases
c) In-person transactions
d) Social media networks
**Answer: b) Online databases**
3. How might attackers exploit zero-day vulnerabilities through socially engineered emails?
a) By providing software patches
b) By convincing users to perform actions like opening files or visiting malicious websites
c) By sending friendly emails
d) By creating strong passwords for users
**Answer: b) By convincing users to perform actions like opening files or visiting malicious
websites**
**Zero-Click Attacks:**
10. Why is updating operating systems, firmware, and apps important in preventing zero-click
attacks?
a) It improves device performance
b) It enhances network connections
c) It reduces exposure windows to vulnerabilities
d) It increases vulnerability windows
**Answer: c) It reduces exposure windows to vulnerabilities**
**Multiple Choice Questions (MCQs) on Reporting Cyber Crimes and Remedial Measures:**
2. What is the role of the National Cyber Crime Reporting Portal (NCCRP) in India?
a) Investigating cybercrimes
b) Coordinating responses to significant cybersecurity incidents
c) Providing cybersecurity training
d) Uninstalling malware
**Answer: b) Coordinating responses to significant cybersecurity incidents**
3. If you encounter a cybercrime related to online fraud, where can you file a complaint in India?
a) National Cyber Crime Reporting Portal
b) Indian Computer Emergency Response Team (CERT-In)
c) National Consumer Helpline
d) Social Media Platforms
**Answer: c) National Consumer Helpline**
6. What is the primary goal of the Information Technology Act, 2000 in India?
a) To restrict data transmission over the internet
b) To promote cybercrime
c) To improve transmission of data over the internet while keeping it safe
d) To ignore cyber security
**Answer: c) To improve transmission of data over the internet while keeping it safe**
7. How many chapters and sections does the Information Technology Act, 2000 have?
a) 5 chapters, 50 sections
b) 10 chapters, 100 sections
c) 13 chapters, 94 sections
d) 15 chapters, 150 sections
**Answer: c) 13 chapters, 94 sections**
8. What does the First Schedule of the IT Act, 2000 deal with?
a) Electronic signatures
b) Documents to which the Act shall not apply
c) Cybersecurity measures
d) Legal proceedings
**Answer: b) Documents to which the Act shall not apply**
9. Which schedule of the IT Act, 2000 deals with electronic signatures or electronic authentication
methods?
a) First Schedule
b) Second Schedule
c) Third Schedule
d) Fourth Schedule
**Answer: b) Second Schedule**
**Section 43 – Penalty and Compensation for damage to computer, computer system, etc:**
1. In the Mphasis BPO Fraud case, what type of unauthorized access was involved?
a) Unauthorized data sharing
b) Unauthorized disclosure
c) Unauthorized access to commit transactions
d) Unauthorized server access
**Answer: c) Unauthorized access to commit transactions**
2. In the Syed Asifuddin and Ors. vs. The State of Andhra Pradesh case, what did Tata Indicom
employees manipulate?
a) Social media accounts
b) Electronic signatures
c) Computer source documents
d) Financial records
**Answer: c) Computer source documents**
3. In the Kumar v/s Whiteley case, what did the accused do?
a) Sent offensive messages
b) Manipulated computer source documents
c) Tampered with computer source code
d) Committed fraud in financial transactions
**Answer: c) Tampered with computer source code**
**Section 66A – Punishment for sending offensive messages through communication service:**
4. In the case of the fake profile of President Pratibha Devi Patil, what offenses were registered under
the IT Act?
a) Section 43 and Section 65
b) Section 66A
c) Section 66F
d) Section 67B
**Answer: b) Section 66A**
5. In the case of the Bomb Hoax mail by a 15-year-old, what was the basis for registration under the
IT Act?
a) Section 66
b) Section 66A
c) Section 66F
d) Section 67B
**Answer: b) Section 66A**
6. In the Mumbai case of cyber terrorism, what was the suspect challenging through email?
a) Financial institutions
b) Security agencies to prevent a terror attack
c) Social media platforms
d) Government authorities
**Answer: b) Security agencies to prevent a terror attack**
**Section 67B – Punishment for publishing or transmitting material depicting children in sexually
explicit act, etc. in electronic form:**
7. In the Janhit Manch & Ors. v. The Union of India case, what did the NGO seek?
a) Punishment for terrorism
b) Blanket ban on pornographic websites
c) Protection of freedom of speech
d) Legalization of explicit content
**Answer: b) Blanket ban on pornographic websites**
8. In the case of Lakshmana Kailash K., what was the reason for his detention for 50 days?
a) Unauthorized access to confidential information
b) Posting insulting images on social media
c) Fraudulent financial transactions
d) Hacking into government databases
**Answer: b) Posting insulting images on social media**