Download PDF
Free download in PDF Cyber Crime Objective Type Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, SSC, NDA etc. These short solved questions or quizzes are provided by Gkseries.
(21)
What are hybrid attacks?
[A]
An attempt to crack passwords using words that can be found in dictionary
[B]
An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
[C]
An attempt to crack passwords using a combination of characters, numbers, and symbols
[D]
An attempt to crack passwords by replacing characters with numbers and symbols
Answer: An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
(22)
Which database is queried by Whois?
[A]
ICANN
[B]
ARIN
[C]
APNIC
[D]
DNS
(23)
Which of the following is not a type of cyber crime?
[A]
Data theft
[B]
Forgery
[C]
Damage to data and systems
[D]
Installing antivirus for protection
Answer: Installing antivirus for protection
(24)
Which of the following is not an example of a computer as weapon cyber-crime?
[A]
Credit card fraudulent
[B]
Spying someone using keylogger
[C]
IPR Violation
[D]
None of the above
Answer: Spying someone using keylogger
(25)
Which of the following is not done by cyber criminals?
[A]
Unauthorized account access
[B]
Mass attack using Trojans as botnets
[C]
Email spoofing and spamming
[D]
Report vulnerability in any system
Answer: Report vulnerability in any system
(26)
What is the name of the IT law that India is having in the Indian legislature?
[A]
India’s Technology (IT) Act, 2000
[B]
India’s Digital Information Technology (DIT) Act, 2000
[C]
India’s Information Technology (IT) Act, 2000
[D]
The Technology Act, 2008
Answer: India’s Information Technology (IT) Act, 2000
(27)
What is the full form of ITA-2000?
[A]
Information Tech Act -2000
[B]
Indian Technology Act -2000
[C]
International Technology Act -2000
[D]
Information Technology Act -2000
Answer: Information Technology Act -2000
(28)
What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
[A]
6 months of imprisonment and a fine of Rs. 50,000
[B]
1 year of imprisonment and a fine of Rs. 100,000
[C]
2 years of imprisonment and a fine of Rs. 250,000
[D]
3 years of imprisonment and a fine of Rs. 500,000
Answer: 3 years of imprisonment and a fine of Rs. 500,000
(29)
What is the updated version of the IT Act, 2000?
[A]
IT Act, 2007
[B]
Advanced IT Act, 2007
[C]
IT Act, 2008
[D]
None of the Above
(30)
In which year the Indian IT Act, 2000 got updated?
[A]
2006
[B]
2008
[C]
2010
[D]
2012
31
Which of the following is not a factor in securing the environment against an attack on
security?
[A]
The education of the attacker
[B]
The system configuration
[C]
The network architecture
[D]
The business strategy of the company
Answer: To identify live systems
32
To hide information inside a picture, what technology is used?
[A]
Rootkits
[B]
Bitmapping
[C]
Steganography
[D]
Image Rendering
33
Which phase of hacking performs actual attack on a network or system?
[A]
Reconnaissance
[B]
Maintaining Access
[C]
Scanning
[D]
Gaining Access
34
Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking.
[A]
Local networking
[B]
Social engineering
[C]
Physical entry
[D]
Remote networking
35
Which Federal Code applies the consequences of hacking activities that disrupt subway transit
systems?
[A]
Electronic Communications Interception of Oral Communications
[B]
18 U.S.C. § 1029
[C]
Cyber Security Enhancement Act 2002
[D]
18 U.S.C. § 1030
Answer: Cyber Security Enhancement Act 2002
36
What type of attack uses a fraudulent server with a relay address?
[A]
NTLM
[B]
MITM
[C]
NetBIOS
[D]
None of the above
37
What type of symmetric key algorithm using a streaming cipher to encrypt information?
[A]
RC4
[B]
Blowfish
[C]
SHA
[D]
MD5
38
Why would a hacker use a proxy server?
[A]
To create a stronger connection with the target
[B]
To create a ghost server on the network
[C]
To obtain a remote access connection
[D]
To hide malicious activity on the network
Answer: To hide malicious activity on the network
39
What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
[A]
Cracking or illegally hack into any system
[B]
Putting antivirus into the victim
[C]
Stealing data
[D]
Stealing hardware components
Answer: Cracking or illegally hack into any system
40
In which year India’s IT Act came into existence?
[A]
2000
[B]
2001
[C]
2002
[D]
2003
Please share this page