0% found this document useful (0 votes)
1K views2 pages

MCQ On It Act 2000

The document provides information about cyber crimes and the Information Technology Act 2000 of India through a series of multiple choice questions and explanations. It discusses different types of cyber crimes such as data theft, forgery, and damage to data/systems. Cyber crimes are categorized into two types: peer-to-peer attacks and using computers as weapons. Examples of peer-to-peer attacks include phishing and injecting trojans, while computer as weapon attacks include distributed denial of service attacks, intellectual property rights violations, and pornography. The document also covers India's Information Technology Act 2000, which came into effect on 17 October 2000 to address cyber crimes and e-commerce law in India.

Uploaded by

MohdMustafa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views2 pages

MCQ On It Act 2000

The document provides information about cyber crimes and the Information Technology Act 2000 of India through a series of multiple choice questions and explanations. It discusses different types of cyber crimes such as data theft, forgery, and damage to data/systems. Cyber crimes are categorized into two types: peer-to-peer attacks and using computers as weapons. Examples of peer-to-peer attacks include phishing and injecting trojans, while computer as weapon attacks include distributed denial of service attacks, intellectual property rights violations, and pornography. The document also covers India's Information Technology Act 2000, which came into effect on 17 October 2000 to address cyber crimes and e-commerce law in India.

Uploaded by

MohdMustafa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

For More Questions Click Here

1. Which of the following is not a type of cyber crime?


a) Data theft
b) Forgery
c) Damage to data and systems
d) Installing antivirus for protection
View Answer

Answer: d
Explanation: Cyber crimes is one of the most threatening terms that is an evolving phase. It is
said that major percentage of the World War III will be based on cyber-attacks by cyber
armies of different countries.

3. Cyber-crime can be categorized into ________ types.


a) 4
b) 3
c) 2
d) 6
View Answer

Answer: c
Explanation: Cyber crime can be categorized into 2 types. These are peer-to-peer attack and
computer as weapon. In peer-to-peer attack, attackers target the victim users; and in computer
as weapon attack technique, computers are used by attackers for a mass attack such as illegal
and banned photo leak, IPR violation, pornography, cyber terrorism etc.

4. Which of the following is not a type of peer-to-peer cyber-crime?


a) Phishing
b) Injecting Trojans to a target victim
c) MiTM
d) Credit card details leak in deep web
View Answer

Answer: d
Explanation: Phishing, injecting Trojans and worms to individuals comes under peer-to-peer
cyber crime. Whereas, leakage of credit card data of a large number of people in deep web
comes under computer as weapon cyber-crime.

5. Which of the following is not an example of a computer as weapon cyber-crime?


a) Credit card fraudulent
b) Spying someone using keylogger
c) IPR Violation
d) Pornography
View Answer

Answer: b
Explanation: DDoS (Distributed Denial of Service), IPR violation, pornography are mass
attacks done using a computer. Spying someone using keylogger is an example of peer-to-
peer attack.
6. Which of the following is not done by cyber criminals?
a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system
View Answer

Answer: d
Explanation: Cyber-criminals are involved in activities like accessing online accounts in
unauthorized manner; use Trojans to attack large systems, sending spoofed emails. But cyber-
criminals do not report any bug is found in a system, rather they exploit the bug for their
profit.

7. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
View Answer

Answer: c
Explanation: The Indian legislature thought of adding a chapter that is dedicated to cyber law.
This finally brought India’s Information Technology (IT) Act, 2000 which deals with the
different cyber-crimes and their associated laws.

8. In which year India’s IT Act came into existence?


a) 2000
b) 2001
c) 2002
d) 2003
View Answer

Answer: a
Explanation: On 17th Oct 2000, the Indian legislature thought of adding a chapter that is
dedicated to cyber law, for which India’s Information Technology (IT) Act, 2000 came into
existence.

9. What is the full form of ITA-2000?


a) Information Tech Act -2000
b) Indian Technology Act -2000
c) International Technology Act -2000
d) Information Technology Act -2000
View Answer

Answer: d
Explanation: Information Technology Act -2000 (ITA-2000), came into existence on 17th Oct
2000, that is dedicated to cyber-crime and e-commerce law in India.

You might also like