Cyber MCQ

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

**Multiple Choice Questions (MCQs) on Cybercrime and Cyber Security:**

1. What is cybercrime?
a) Legal activities on the Internet
b) Authorized computer use
c) Illegal acts using a computer or networked device
d) None of the above
**Answer: c) Illegal acts using a computer or networked device**

2. Who are cyber criminals?


a) Individuals or organizations involved in legal computer activities
b) Ethical hackers
c) Individuals or teams committing cybercrimes
d) Government agencies
**Answer: c) Individuals or teams committing cybercrimes**

3. Major reasons for cybercrime include:


a) Only financial gain
b) Lack of awareness
c) Opportunism
d) All of the above
**Answer: d) All of the above**

4. What is the primary motive of black hat hackers?


a) Fixing identified weaknesses in systems
b) Personal gain through unauthorized access
c) Helping businesses improve digital defenses
d) Conducting cyber espionage
**Answer: b) Personal gain through unauthorized access**

5. What distinguishes white hat hackers from black hat hackers?


a) Both aim for personal gain
b) White hat hackers have permission to crack systems
c) Black hat hackers work for government agencies
d) White hat hackers engage in cyber espionage
**Answer: b) White hat hackers have permission to crack systems**

6. Who are organized hackers?


a) Government agencies
b) Ethical hackers
c) Teams of skilled criminals focused on control, power, and wealth
d) Internet stalkers
**Answer: c) Teams of skilled criminals focused on control, power, and wealth**

7. What do internet stalkers do?


a) Fix identified weaknesses in systems
b) Monitor web activity to acquire personal data
c) Conduct cyber espionage
d) Provide cybersecurity services
**Answer: b) Monitor web activity to acquire personal data**

8. Why do disgruntled employees become hackers?


a) To improve digital defenses
b) Ethical reasons
c) Personal gain
d) Government mandate
**Answer: c) Personal gain**

9. What is one of the major reasons for cybercrime mentioned in the passage?
a) Technological advancement
b) Lack of awareness
c) Global cooperation
d) Weather conditions
**Answer: b) Lack of awareness**
**Multiple Choice Questions (MCQs) on Classification of Cyber Crimes:**

1. How can cyber crimes be classified based on the groups they target?
a) Two heads
b) Three categories
c) Four heads
d) Five categories
**Answer: c) Four heads**

2. Which of the following is not one of the categories of cyber crimes mentioned in the passage?
a) Cyber crimes against individuals
b) Cyber crimes against organizations
c) Cyber crimes against society at large
d) Cyber crimes against government
**Answer: d) Cyber crimes against government**

3. What is the major objective of committing cyber crimes against individuals?


a) Gathering confidential data for personal use
b) Gathering confidential data for monetary, political, or personal motives
c) Enhancing online security measures
d) Improving internet infrastructure
**Answer: b) Gathering confidential data for monetary, political, or personal motives**

4. Which of the following is an example of cyber crime against individuals?


a) Salami attacks
b) Forgery
c) Email spoofing
d) Denial of Service Attack
**Answer: c) Email spoofing**

5. What does cyber stalking involve?


a) Browsing internet history
b) Sending vulgar content using social media
c) Email bombing
d) Salami attacks
**Answer: b) Sending vulgar content using social media**

6. What is the primary motive of cyber theft?


a) To gain control of websites
b) To gather confidential data like passwords, images, phone numbers, etc.
c) To commit forgery
d) To engage in cyber espionage
**Answer: b) To gather confidential data like passwords, images, phone numbers, etc.**

7. Which type of cyber attack prevents legal users from accessing computer systems?
a) Salami attacks
b) Denial of Service Attack
c) Data Diddling
d) Web Jacking
**Answer: b) Denial of Service Attack**

8. What is cyber terrorism primarily aimed at?


a) Gathering confidential data
b) Affecting the harmony between different groups
c) Committing forgery
d) Intellectual property theft
**Answer: b) Affecting the harmony between different groups**

9. What does internet time theft involve?


a) Theft of intellectual property
b) Unauthorized taking of credit card information
c) Unauthorized use of internet hours paid by another person
d) Sending a large number of emails to crash someone's account
**Answer: c) Unauthorized use of internet hours paid by another person**

10. What is the primary focus of cyber crime against women and children?
a) Theft of intellectual property
b) Cyber terrorism
c) Harassment and exploitation through online platforms
d) Denial of Service Attack
**Answer: c) Harassment and exploitation through online platforms**
**Multiple Choice Questions (MCQs) on Common Cyber Crimes:**

1. What role do mobile phones play in today's digital landscape?


a) They have limited data storage capacity
b) They are not used for internet transactions
c) They function as personal laptops and desktops with portability
d) They lack flexibility in data management
**Answer: c) They function as personal laptops and desktops with portability**
2. Which of the following is a missing feature in internet-enabled smartphones and tablets according
to the passage?
a) Flexibility
b) Portability
c) Security
d) Capacity
**Answer: c) Security**

3. What is the primary objective of hacking and unauthorized access in cyber crimes?
a) To enhance device operations
b) To gain unauthorized access for data theft or device control
c) To improve internet security
d) To promote rapid communication
**Answer: b) To gain unauthorized access for data theft or device control**

4. What is the main purpose of ransomware in both computer and mobile contexts?
a) To encrypt and lock data, demanding payment for release
b) To improve device operations
c) To promote secure communication
d) To enhance internet-enabled functions
**Answer: a) To encrypt and lock data, demanding payment for release**

5. How is identity theft defined in the context of cyber crimes?


a) Unauthorized access to computers for data theft
b) Unauthorized access to mobile devices for device control
c) Unauthorized access to steal personal information for criminal acts
d) Unauthorized access for rapid communication
**Answer: c) Unauthorized access to steal personal information for criminal acts**

6. What does Bluebugging allow hackers to do in mobile phones?


a) Improve device security
b) Access calendar and address book
c) Enhance internet-enabled functions
d) Make legitimate calls
**Answer: b) Access calendar and address book**

7. What is phishing in cyber crimes?


a) Legitimate institutions contacting individuals for information
b) Unauthorized access to mobile phones
c) Stealing personal information through fake communication
d) Enhancing device operations
**Answer: c) Stealing personal information through fake communication**

8. What is Vishing in the context of phishing?


a) Over the phone phishing
b) SMS phishing
c) Email phishing
d) Voice-activated phishing
**Answer: a) Over the phone phishing**

9. What precaution is recommended for securing cell phones?


a) Share personal information with strangers
b) Keep wireless connections always on
c) Disable geo-tagging feature
d) Use weak passwords
**Answer: c) Disable geo-tagging feature**

10. In SMS phishing, what are attackers attempting to achieve?


a) Encourage people to share information over the phone
b) Persuade people to click on suspicious links through text messages
c) Extract confidential information through voice calls
d) Lock and encrypt victim's data
**Answer: b) Persuade people to click on suspicious links through text messages**
**Multiple Choice Questions (MCQs) on Malware, Ransomware, and Social Engineering:**

**Malware and Ransomware Attack:**

1. What is malware?
a) Authorized software
b) Beneficial software
c) Malicious software
d) Security software
**Answer: c) Malicious software**

2. What can malware do if it successfully runs on a device?


a) Enhance device performance
b) Cause the device to become locked or unusable
c) Improve network connections
d) Promote secure communication
**Answer: b) Cause the device to become locked or unusable**

3. What is the primary demand made by attackers in ransomware attacks?


a) Access to personal information
b) Payment in a cryptocurrency like Bitcoin
c) Increase in internet security
d) Free access to infected devices
**Answer: b) Payment in a cryptocurrency like Bitcoin**

4. How does a computer virus infect other computers on the same network?
a) By improving device operations
b) By running infected programs on other computers
c) By enhancing internet-enabled functions
d) By securing network connections
**Answer: b) By running infected programs on other computers**

5. What are common ways viruses can spread?


a) Through physical contact
b) Through email and text message attachments, internet file downloads, and social media scam
links
c) Through voice calls
d) Through device charging
**Answer: b) Through email and text message attachments, internet file downloads, and social
media scam links**

**Financial Frauds:**

6. What is a common method of stealing credit card and calling card numbers?
a) Physical theft of cards
b) Online databases
c) In-person transactions
d) Social media networks
**Answer: b) Online databases**

7. What is "account takeover" in credit card fraud?


a) Unauthorized access to physical cards
b) Cloning cards for purchases
c) Stealing information to report a lost card and change address
d) Multiple imprints on credit cards
**Answer: c) Stealing information to report a lost card and change address**

**Social Engineering Attacks:**

8. What is the primary danger of social engineering attacks?


a) Rely on vulnerabilities in software
b) Rely on human error
c) Target only specific individuals
d) Require physical access to devices
**Answer: b) Rely on human error**

9. What is shoulder surfing in social engineering?


a) Direct observation to obtain information
b) Using software to manipulate data
c) Impersonating an employee
d) Colluding with merchants
**Answer: a) Direct observation to obtain information**

10. What is the purpose of fake emails in computer-based social engineering?


a) To improve internet security
b) To attract users for legitimate offers
c) To install malicious code or capture sensitive information
d) To encourage online transactions
**Answer: c) To install malicious code or capture sensitive information**

**Multiple Choice Questions (MCQs) on Zero-Day Attacks and Zero-Click Attacks:**


**Zero-Day Attacks:**

1. What is a zero-day vulnerability?


a) A security patch discovered by attackers
b) A known software vulnerability
c) A vulnerability discovered by attackers before the vendor is aware
d) A type of antivirus software
**Answer: c) A vulnerability discovered by attackers before the vendor is aware**

2. What is exploit code in the context of zero-day attacks?


a) Code to enhance software performance
b) Code to patch vulnerabilities
c) Code to take advantage of a zero-day vulnerability
d) Code for encryption purposes
**Answer: c) Code to take advantage of a zero-day vulnerability**

3. How might attackers exploit zero-day vulnerabilities through socially engineered emails?
a) By providing software patches
b) By convincing users to perform actions like opening files or visiting malicious websites
c) By sending friendly emails
d) By creating strong passwords for users
**Answer: b) By convincing users to perform actions like opening files or visiting malicious
websites**

4. What are common targets for zero-day attacks?


a) Physical locations
b) Social media platforms
c) Hardware, operating systems, web browsers, office applications, and Internet of Things (IoT)
devices
d) Weather forecast websites
**Answer: c) Hardware, operating systems, web browsers, office applications, and Internet of
Things (IoT) devices**

5. How can companies reduce their exposure to zero-day attacks?


a) Increase vulnerability windows
b) Ignore reported vulnerabilities
c) Install Next-Gen Antivirus Solutions (NGAV)
d) Avoid patch management
**Answer: c) Install Next-Gen Antivirus Solutions (NGAV)**

**Zero-Click Attacks:**

6. What distinguishes zero-click attacks from other attacks?


a) They require multiple clicks to execute
b) They involve physical contact with the target device
c) They don't need human action to start them
d) They only target specific individuals
**Answer: c) They don't need human action to start them**

7. In the WhatsApp zero-click attack, how was the intrusion triggered?


a) Opening a suspicious email
b) Responding to a phishing message
c) Receiving a missed call
d) Visiting an infected website
**Answer: c) Receiving a missed call**

8. How did attackers compromise Jeff Bezos' iPhone in a zero-click attack?


a) Sending a malicious email
b) Manipulating a vulnerability through a missed call
c) Installing a malicious app
d) Physical theft of the device
**Answer: b) Manipulating a vulnerability through a missed call**

9. What is a preventive measure against zero-click attacks?


a) Actively searching your phone
b) Jailbreaking your phone
c) Uninstalling unused programs
d) Ignoring security updates
**Answer: c) Uninstalling unused programs**

10. Why is updating operating systems, firmware, and apps important in preventing zero-click
attacks?
a) It improves device performance
b) It enhances network connections
c) It reduces exposure windows to vulnerabilities
d) It increases vulnerability windows
**Answer: c) It reduces exposure windows to vulnerabilities**

**Multiple Choice Questions (MCQs) on Reporting Cyber Crimes and Remedial Measures:**

**Reporting Cyber Crimes:**

1. What is the first step in reporting a cybercrime in India?


a) File a complaint with the National Consumer Helpline
b) Contact local law enforcement
c) Uninstall unused programs
d) Ignore the incident
**Answer: b) Contact local law enforcement**

2. What is the role of the National Cyber Crime Reporting Portal (NCCRP) in India?
a) Investigating cybercrimes
b) Coordinating responses to significant cybersecurity incidents
c) Providing cybersecurity training
d) Uninstalling malware
**Answer: b) Coordinating responses to significant cybersecurity incidents**
3. If you encounter a cybercrime related to online fraud, where can you file a complaint in India?
a) National Cyber Crime Reporting Portal
b) Indian Computer Emergency Response Team (CERT-In)
c) National Consumer Helpline
d) Social Media Platforms
**Answer: c) National Consumer Helpline**

4. What is the purpose of preserving evidence in reporting cybercrimes?


a) To share on social media
b) To use as blackmail
c) To aid in investigation and prosecution
d) To delete any traces of the crime
**Answer: c) To aid in investigation and prosecution**

5. What is CERT-In's role in responding to cybersecurity incidents in India?


a) Investigating crimes directly
b) Coordinating responses to significant incidents
c) Providing legal assistance
d) Selling cybersecurity products
**Answer: b) Coordinating responses to significant incidents**

**Remedial and Mitigation Measures:**

6. What is the purpose of an Incident Response Plan in cybersecurity?


a) Developing software patches
b) Outlining steps to address and alleviate the impact of cyber threats
c) Conducting security audits
d) Deleting sensitive data
**Answer: b) Outlining steps to address and alleviate the impact of cyber threats**

7. What does regular data backups help in?


a) Deleting critical data
b) Increasing exposure windows
c) Recovery in case of data loss
d) Installing malware
**Answer: c) Recovery in case of data loss**

8. What does Network Segmentation contribute to in cybersecurity?


a) Increasing vulnerability windows
b) Reducing exposure to vulnerabilities
c) Deleting sensitive data
d) Installing malware
**Answer: b) Reducing exposure to vulnerabilities**

9. What is the purpose of Multi-Factor Authentication (MFA)?


a) Removing authentication measures
b) Adding an extra layer of security
c) Deleting user accounts
d) Ignoring security updates
**Answer: b) Adding an extra layer of security**

10. What is the significance of Continuous Monitoring in cybersecurity?


a) Ignoring network activities
b) Detecting and responding to suspicious or malicious behavior in real-time
c) Increasing vulnerability windows
d) Deleting system logs
**Answer: b) Detecting and responding to suspicious or malicious behavior in real-time**
**Multiple Choice Questions (MCQs) on Cyber Law (Crime) and the Information Technology Act,
2000:**

**Cyber Law (Crime):**

1. What is the essence of cyber law?


a) Regulating physical world crimes
b) Ignoring technology-related offenses
c) Integrating challenges from human activity on the Internet with existing laws
d) Promoting anonymity online
**Answer: c) Integrating challenges from human activity on the Internet with existing laws**

2. How does cyber law intersect with other legal fields?


a) By promoting criminal activities
b) By focusing only on intellectual property
c) As an isolated field of law
d) As an intersection of many legal fields
**Answer: d) As an intersection of many legal fields**

3. What is the primary purpose of cyber law in today's environment?


a) Regulating traditional crimes
b) Addressing challenges in the physical world
c) Integrating challenges from human activity on the Internet
d) Ignoring technological advancements
**Answer: c) Integrating challenges from human activity on the Internet**

4. In the context of cyber law, what is "cyberspace"?


a) A physical location
b) A distinct field of law
c) The Internet environment
d) An isolated legal concept
**Answer: c) The Internet environment**

5. How does cyber law relate to freedom of expression?


a) It restricts freedom of expression
b) It has no relation to freedom of expression
c) It promotes freedom of expression
d) It is against freedom of expression
**Answer: a) It restricts freedom of expression**

**Information Technology Act, 2000 (India):**

6. What is the primary goal of the Information Technology Act, 2000 in India?
a) To restrict data transmission over the internet
b) To promote cybercrime
c) To improve transmission of data over the internet while keeping it safe
d) To ignore cyber security
**Answer: c) To improve transmission of data over the internet while keeping it safe**

7. How many chapters and sections does the Information Technology Act, 2000 have?
a) 5 chapters, 50 sections
b) 10 chapters, 100 sections
c) 13 chapters, 94 sections
d) 15 chapters, 150 sections
**Answer: c) 13 chapters, 94 sections**

8. What does the First Schedule of the IT Act, 2000 deal with?
a) Electronic signatures
b) Documents to which the Act shall not apply
c) Cybersecurity measures
d) Legal proceedings
**Answer: b) Documents to which the Act shall not apply**

9. Which schedule of the IT Act, 2000 deals with electronic signatures or electronic authentication
methods?
a) First Schedule
b) Second Schedule
c) Third Schedule
d) Fourth Schedule
**Answer: b) Second Schedule**

10. What is the main objective of the IT Act, 2000?


a) To increase cybercrime
b) To restrict digital transactions
c) To carry lawful and trustworthy electronic, digital, and online transactions and reduce
cybercrimes
d) To avoid legal proceedings
**Answer: c) To carry lawful and trustworthy electronic, digital, and online transactions and reduce
cybercrimes**
**Multiple Choice Questions (MCQs) on Cyber Law (IT Act Sections) - Case Studies:**

**Section 43 – Penalty and Compensation for damage to computer, computer system, etc:**

1. In the Mphasis BPO Fraud case, what type of unauthorized access was involved?
a) Unauthorized data sharing
b) Unauthorized disclosure
c) Unauthorized access to commit transactions
d) Unauthorized server access
**Answer: c) Unauthorized access to commit transactions**

**Section 65 – Tampering with Computer Source Documents:**

2. In the Syed Asifuddin and Ors. vs. The State of Andhra Pradesh case, what did Tata Indicom
employees manipulate?
a) Social media accounts
b) Electronic signatures
c) Computer source documents
d) Financial records
**Answer: c) Computer source documents**

**Section 66 – Computer Related Offenses:**

3. In the Kumar v/s Whiteley case, what did the accused do?
a) Sent offensive messages
b) Manipulated computer source documents
c) Tampered with computer source code
d) Committed fraud in financial transactions
**Answer: c) Tampered with computer source code**

**Section 66A – Punishment for sending offensive messages through communication service:**

4. In the case of the fake profile of President Pratibha Devi Patil, what offenses were registered under
the IT Act?
a) Section 43 and Section 65
b) Section 66A
c) Section 66F
d) Section 67B
**Answer: b) Section 66A**

5. In the case of the Bomb Hoax mail by a 15-year-old, what was the basis for registration under the
IT Act?
a) Section 66
b) Section 66A
c) Section 66F
d) Section 67B
**Answer: b) Section 66A**

**Section 66F – Cyber Terrorism:**

6. In the Mumbai case of cyber terrorism, what was the suspect challenging through email?
a) Financial institutions
b) Security agencies to prevent a terror attack
c) Social media platforms
d) Government authorities
**Answer: b) Security agencies to prevent a terror attack**

**Section 67B – Punishment for publishing or transmitting material depicting children in sexually
explicit act, etc. in electronic form:**

7. In the Janhit Manch & Ors. v. The Union of India case, what did the NGO seek?
a) Punishment for terrorism
b) Blanket ban on pornographic websites
c) Protection of freedom of speech
d) Legalization of explicit content
**Answer: b) Blanket ban on pornographic websites**

**Section 69 – Powers to issue directions for interception or monitoring or decryption of any


information through any computer resource:**

8. In the case of Lakshmana Kailash K., what was the reason for his detention for 50 days?
a) Unauthorized access to confidential information
b) Posting insulting images on social media
c) Fraudulent financial transactions
d) Hacking into government databases
**Answer: b) Posting insulting images on social media**

You might also like