For More Questions Click Here
1. Which of the following is not a type of cyber crime?
a) Data theft
b) Forgery
c) Damage to data and systems
d) Installing antivirus for protection
View Answer
Answer: d
Explanation: Cyber crimes is one of the most threatening terms that is an evolving phase. It is
said that major percentage of the World War III will be based on cyber-attacks by cyber
armies of different countries.
3. Cyber-crime can be categorized into ________ types.
a) 4
b) 3
c) 2
d) 6
View Answer
Answer: c
Explanation: Cyber crime can be categorized into 2 types. These are peer-to-peer attack and
computer as weapon. In peer-to-peer attack, attackers target the victim users; and in computer
as weapon attack technique, computers are used by attackers for a mass attack such as illegal
and banned photo leak, IPR violation, pornography, cyber terrorism etc.
4. Which of the following is not a type of peer-to-peer cyber-crime?
a) Phishing
b) Injecting Trojans to a target victim
c) MiTM
d) Credit card details leak in deep web
View Answer
Answer: d
Explanation: Phishing, injecting Trojans and worms to individuals comes under peer-to-peer
cyber crime. Whereas, leakage of credit card data of a large number of people in deep web
comes under computer as weapon cyber-crime.
5. Which of the following is not an example of a computer as weapon cyber-crime?
a) Credit card fraudulent
b) Spying someone using keylogger
c) IPR Violation
d) Pornography
View Answer
Answer: b
Explanation: DDoS (Distributed Denial of Service), IPR violation, pornography are mass
attacks done using a computer. Spying someone using keylogger is an example of peer-to-
peer attack.
6. Which of the following is not done by cyber criminals?
a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system
View Answer
Answer: d
Explanation: Cyber-criminals are involved in activities like accessing online accounts in
unauthorized manner; use Trojans to attack large systems, sending spoofed emails. But cyber-
criminals do not report any bug is found in a system, rather they exploit the bug for their
profit.
7. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
View Answer
Answer: c
Explanation: The Indian legislature thought of adding a chapter that is dedicated to cyber law.
This finally brought India’s Information Technology (IT) Act, 2000 which deals with the
different cyber-crimes and their associated laws.
8. In which year India’s IT Act came into existence?
a) 2000
b) 2001
c) 2002
d) 2003
View Answer
Answer: a
Explanation: On 17th Oct 2000, the Indian legislature thought of adding a chapter that is
dedicated to cyber law, for which India’s Information Technology (IT) Act, 2000 came into
existence.
9. What is the full form of ITA-2000?
a) Information Tech Act -2000
b) Indian Technology Act -2000
c) International Technology Act -2000
d) Information Technology Act -2000
View Answer
Answer: d
Explanation: Information Technology Act -2000 (ITA-2000), came into existence on 17th Oct
2000, that is dedicated to cyber-crime and e-commerce law in India.